exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2019-05-27

Typora 0.9.9.24.6 Directory Traversal
Posted May 27, 2019
Authored by Dhiraj Mishra

Typora version 0.9.9.24.6 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2019-12137
SHA-256 | d701e0872d46eff9fc856c8428a213430d7d1c726d700916ecbb1772e5e4f60e
Red Hat Security Advisory 2019-1278-01
Posted May 27, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-1278-01 - The Pacemaker cluster resource manager is a collection of technologies working together to maintain data integrity and application availability in the event of failures. Issues addressed include denial of service, information leakage, and use-after-free vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
advisories | CVE-2018-16877, CVE-2018-16878, CVE-2019-3885
SHA-256 | 0e135f17b3765f202d2a89491dcc2b769dbf1e71b955b09f7ddac4773c2da49f
Crowd / Crowd Data Center pdkinstall Enabled
Posted May 27, 2019
Authored by Atlassian

Crowd and Crowd Data Center had the pdkinstall development plugin incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. Versions of Crowd and Crowd Data Center starting with version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x), from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2019-11580
SHA-256 | 985c2d75d6a00aea412d56a69bb859b3edd00658270d8705e9aa0d84f96b275d
Ubuntu Security Notice USN-3976-4
Posted May 27, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3976-4 - USN-3976-1 fixed a vulnerability in Samba. The update introduced a regression causing Samba to occasionally crash. This update fixes the problem. Isaac Boukris and Andrew Bartlett discovered that Samba incorrectly checked S4U2Self packets. In certain environments, a remote attacker could possibly use this issue to escalate privileges. Various other issues were also addressed.

tags | advisory, remote
systems | linux, ubuntu
SHA-256 | 82c6e4a625ca6c1d609e15a9fd856e2251b6b0189c2cad0ac57edabde763c2ef
Red Hat Security Advisory 2019-1279-01
Posted May 27, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-1279-01 - The Pacemaker cluster resource manager is a collection of technologies working together to maintain data integrity and application availability in the event of failures. Issues addressed include denial of service, information leakage, and use-after-free vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
advisories | CVE-2018-16877, CVE-2018-16878, CVE-2019-3885
SHA-256 | 7a05d125130c1df4d51bedc27605da4d8a11ae06788bc388eb16613fb6cab048
Kanboard 1.2.7 Cross Site Scripting
Posted May 27, 2019
Authored by Mithat Gogebakan | Site netsparker.com

Kanboard version 1.2.7 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2019-7324
SHA-256 | a58b7d6eeb41ea41e14a67f936e8739705bd08162e668835de7bf2b9bb704ad7
Deltek Maconomy 2.2.5 Local File Inclusion
Posted May 27, 2019
Authored by Jameel Nabbo

Deltek Maconomy version 2.2.5 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
advisories | CVE-2019-12314
SHA-256 | f2cecf22cbc31eab8ed4e6c44b59435d507f9fbc96f52b16c9d342cea5cf19d5
MacOS X 10.14.5 Gatekeeper Bypass
Posted May 27, 2019
Authored by Filippo Cavallarin

MacOS X versions 10.14.5 and below suffer from a Gatekeeper bypass vulnerability.

tags | exploit, bypass
SHA-256 | 76e6187e250514c50b8fb1fa0a230303592e3a59928db823711053d46ba942c4
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close