exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2019-07-04

Karenderia CMS 5.1 Local File Inclusion
Posted Jul 4, 2019
Authored by Mehmet Emiroglu

Karenderia CMS version 5.1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 66911b9440da83c05ddb77b309de708541fbacc689745a0a86637b21aaef7bf3
Ubuntu Security Notice USN-4038-3
Posted Jul 4, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4038-3 - USN-4038-1 fixed a vulnerability in bzip2. The update introduced a regression causing bzip2 to incorrect raises CRC errors for some files. It was discovered that bzip2 incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code. Various other issues were also addressed.

tags | advisory, arbitrary
systems | linux, ubuntu
SHA-256 | fe6866ffbd5abcb3d34fe106fd937f2c657a1bc56dad862a4247f449ea5ce04f
I2P 0.9.41
Posted Jul 4, 2019
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Bug fix release.
tags | tool
systems | unix
SHA-256 | f988877940b2cff1a90534c47b78343de49cd6290817edb57c0142eecf1d164e
iPhone iMessage Malformed Message Bricking
Posted Jul 4, 2019
Authored by Google Security Research, natashenka

An issue exists where a malformed iMessage can brick an iPhone. A method in IMCore can throw an NSException due to a malformed message containing a property with key IMExtensionPayloadLocalizedDescriptionTextKey with a value that is not a NSString.

tags | exploit
systems | apple, iphone
advisories | CVE-2019-8664
SHA-256 | 386b80597a37e396ddf40dd708c4b4c2f1bb231ffc13b70144ae69977d215d60
WolfVision Cynap 1.18g / 1.28j Hardcoded Credential
Posted Jul 4, 2019
Authored by Gerhard Klostermeier, Manuel Stotz | Site syss.de

WolfVision Cynap versions 1.18g and 1.28j suffer from a hardcoded credential vulnerability.

tags | exploit
advisories | CVE-2019-13352
SHA-256 | d6b2f3a38c59dff4dc8014904e4bc9fb7be3b0831749657f9c23488cc4c0a1ff
Karenderia CMS 5.1 Content Injection
Posted Jul 4, 2019
Authored by Mehmet Emiroglu

Karenderia CMS version 5.1 suffers from an iframe injection vulnerability.

tags | exploit
SHA-256 | 78d64b12346d678086f6f06817f1306e1f359c387348df6a3811e4be5d8c46d9
Microsoft File Checksum Verifier 2.05 DLL Hijacking
Posted Jul 4, 2019
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft File Checksum Verifier version 2.05 suffers from a dll hijacking vulnerability.

tags | exploit
SHA-256 | 17fc362e8e18414dd114c21009fd8fff819c0c7c6e6e529a0ec24d3b4887e2ce
Apache Camel Exploitation
Posted Jul 4, 2019
Authored by Nick Aliferopoulos

Whitepaper called Apache Camel Exploitation. It discusses how unvalidated input in Apache Camel endpoints can result in information exposure.

tags | paper
SHA-256 | 7ed20d8d1893d6d7876e248a8838efd2c8bd000ecac1c0bbcd721d515d9128bd
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close