1 Red Hat Security Advisory 2020-0870-01 By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 15:15:11 GMT Red Hat Security Advisory 2020-0870-01 - Flask is a lightweight but extensible web development framework for Python based on the Werkzeug WSGI toolkit, and the Jinja 2 template engine. Issues addressed include a denial of service vulnerability. Full Article
1 Red Hat Security Advisory 2020-0898-01 By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 15:17:13 GMT Red Hat Security Advisory 2020-0898-01 - The Python Imaging Library adds image processing capabilities to your Python interpreter. This library provides extensive file format support, an efficient internal representation, and powerful image processing capabilities. An issue where improperly restricted operations on a memory buffer in libImaging/PcxDecode.c were addressed. Full Article
1 Red Hat Security Advisory 2020-1131-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:07:37 GMT Red Hat Security Advisory 2020-1131-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include an incorrect parsing vulnerability. Full Article
1 Red Hat Security Advisory 2020-1132-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:11:58 GMT Red Hat Security Advisory 2020-1132-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages. Issues addressed include an incorrect parsing vulnerability. Full Article
1 Red Hat Security Advisory 2020-1091-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:18:38 GMT Red Hat Security Advisory 2020-1091-01 - Twisted is an event-based framework for internet applications. Twisted Web is a complete web server, aimed at hosting web applications using Twisted and Python, but fully able to serve static pages too. Issues addressed include an improper neutralization vulnerability. Full Article
1 Red Hat Security Advisory 2020-1324-01 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:39:14 GMT Red Hat Security Advisory 2020-1324-01 - Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY principle. Issues addressed include denial of service, memory exhaustion, and remote SQL injection vulnerabilities. Full Article
1 Neowise CarbonFTP 1.4 Insecure Proprietary Password Encryption By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 14:18:20 GMT Neowise CarbonFTP version 1.4 suffers from an insecure proprietary password encryption implementation. Second version of this exploit that is updated to work with Python 3. Full Article
1 Ubuntu Security Notice USN-4333-1 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 14:34:57 GMT Ubuntu Security Notice 4333-1 - It was discovered that Python incorrectly stripped certain characters from requests. A remote attacker could use this issue to perform CRLF injection. It was discovered that Python incorrectly handled certain HTTP requests. An attacker could possibly use this issue to cause a denial of service. Full Article
1 Red Hat Security Advisory 2020-1916-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:26:20 GMT Red Hat Security Advisory 2020-1916-01 - pip is a package management system used to install and manage software packages written in Python. Many packages can be found in the Python Package Index. pip is a recursive acronym that can stand for either "Pip Installs Packages" or "Pip Installs Python". Issues addressed include crlf injection and cross-host redirect vulnerabilities. Full Article
1 Red Hat Security Advisory 2020-1764-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:28:12 GMT Red Hat Security Advisory 2020-1764-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include an incorrect parsing vulnerability. Full Article
1 Red Hat Security Advisory 2020-1605-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:30:14 GMT Red Hat Security Advisory 2020-1605-01 - Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Issues addressed include crlf injection, cross-host redirect, and incorrect parsing vulnerabilities. Full Article
1 Kim Dotcom Plans 2017 Relaunch Of Megaupload By packetstormsecurity.com Published On :: Mon, 11 Jul 2016 14:04:42 GMT Full Article headline riaa mpaa
1 Oracle Patches 218 Security Vulnerabilities By packetstormsecurity.com Published On :: Thu, 17 Oct 2019 14:06:58 GMT Full Article headline database flaw patch oracle
1 Red Hat Security Advisory 2020-1577-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:22:21 GMT Red Hat Security Advisory 2020-1577-01 - The exiv2 packages provide a command line utility which can display and manipulate image metadata such as EXIF, LPTC, and JPEG comments. Issues addressed include buffer overflow, denial of service, integer overflow, null pointer, and out of bounds read vulnerabilities. Full Article
1 Red Hat Security Advisory 2020-1686-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:24:37 GMT Red Hat Security Advisory 2020-1686-01 - The libmspack packages contain a library providing compression and extraction of the Cabinet file format used by Microsoft. Issues addressed include a buffer overflow vulnerability. Full Article
1 Red Hat Security Advisory 2020-1567-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:29:58 GMT Red Hat Security Advisory 2020-1567-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include denial of service, information leakage, integer overflow, null pointer, out of bounds read, and use-after-free vulnerabilities. Full Article
1 Red Hat Security Advisory 2020-1766-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:30:39 GMT Red Hat Security Advisory 2020-1766-01 - GNOME is the default desktop environment of Red Hat Enterprise Linux. Issues addressed include buffer overflow and bypass vulnerabilities. Full Article
1 Red Hat Security Advisory 2020-1708-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:34:54 GMT Red Hat Security Advisory 2020-1708-01 - Liblouis is an open source braille translator and back-translator named in honor of Louis Braille. It features support for computer and literary braille, supports contracted and uncontracted translation for many languages and has support for hyphenation. New languages can easily be added through tables that support a rule or dictionary based approach. Liblouis also supports math braille. Issues addressed include a buffer overflow vulnerability. Full Article
1 Red Hat Security Advisory 2020-1636-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:35:04 GMT Red Hat Security Advisory 2020-1636-01 - libsndfile is a C library for reading and writing files containing sampled sound, such as AIFF, AU, or WAV. Issues addressed include a buffer overflow vulnerability. Full Article
1 Red Hat Security Advisory 2020-1688-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:40:52 GMT Red Hat Security Advisory 2020-1688-01 - The libtiff packages contain a library of functions for manipulating Tagged Image File Format files. Issues addressed include an integer overflow vulnerability. Full Article
1 FlashGet 1.9.6 Buffer Overflow Proof Of Concept By packetstormsecurity.com Published On :: Sat, 02 May 2020 09:22:22 GMT FlashGet version 1.9.6 remote buffer overflow proof of concept exploit. Full Article
1 weplab-0.1.3.tar.gz By packetstormsecurity.com Published On :: Fri, 10 Dec 2004 04:32:50 GMT Weplab Win32 is a windows tool to review the security of WEP encryption in wireless networks from an educational point of view. Several attacks are available to help measure the effectiveness and minimum requirements necessary to succeed. Full Article
1 Technical Cyber Security Alert 2007-163A By packetstormsecurity.com Published On :: Wed, 13 Jun 2007 01:25:48 GMT Technical Cyber Security Alert TA07-163A - Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Windows Secure Channel, Internet Explorer, Win32 API, Windows Mail and Outlook Express. Exploitation of these vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on a vulnerable system. Full Article
1 MSF-XB11.rar By packetstormsecurity.com Published On :: Mon, 27 Oct 2008 22:29:03 GMT MSF eXploit Builder is a Windows GUI to build Metasploit Framework exploit modules. It will help you to edit/modify/create/test exploit modules for the Metasploit Framework. Full source release. It includes a built-in fuzzer, a win32 debugger, and a lot of tools used in the process of exploit development. Full Article
1 Quarks PwDump 0.1b By packetstormsecurity.com Published On :: Sun, 20 May 2012 18:11:11 GMT Quarks PwDump is a native Win32 tool to extract credentials from Windows operating systems. It currently extracts local accounts NT/LM hashes and history, domain accounts NT/LM hashes and history, cached domain password, and Bitlocker recovery information. Full Article
1 CentOS-WebPanel.com Control Web Panel (CWP) 0.9.8.851 Arbitrary Database Drop By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:05:24 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.851 suffers from an arbitrary database dropping vulnerability. Full Article
1 CentOS-WebPanel.com Control Web Panel (CWP) 0.9.8.851 phpMyAdmin Password Change By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:06:49 GMT CentOS-WebPanel.com Control Web Panel (CWP) version 0.9.8.851 allows an attacker to change arbitrary passwords. Full Article
1 CentOS 7.6.1810 Control Web Panel 0.9.8.837 Cross Site Scripting By packetstormsecurity.com Published On :: Mon, 26 Aug 2019 15:59:03 GMT CentOS version 7.6.1810 with Control Web Panel version 0.9.8.837 suffers from a persistent cross site scripting vulnerability. Full Article
1 CentOS 7.6.1810 Control Web Panel 0.9.8.837 Cross Site Request Forgery By packetstormsecurity.com Published On :: Mon, 26 Aug 2019 16:01:11 GMT CentOS version 7.6.1810 with Control Web Panel version 0.9.8.837 suffers from a cross site request forgery vulnerability. Full Article
1 Xorg X11 Server SUID modulepath Privilege Escalation By packetstormsecurity.com Published On :: Tue, 22 Oct 2019 21:07:40 GMT This Metasploit module attempts to gain root privileges with SUID Xorg X11 server versions 1.19.0 up to 1.20.3. A permission check flaw exists for -modulepath and -logfile options when starting Xorg. This allows unprivileged users that can start the server the ability to elevate privileges and run arbitrary code under root privileges. This module has been tested with CentOS 7 (1708). CentOS default install will require console auth for the users session. Xorg must have SUID permissions and may not start if running. On successful exploitation artifacts will be created consistent with starting Xorg. Full Article
1 Home Office Issued 10,000 Fake UK Passports Last Year By packetstormsecurity.com Published On :: Tue, 20 Mar 2007 16:00:13 GMT Full Article britain passport
1 Red Hat Security Advisory 2020-0464-01 By packetstormsecurity.com Published On :: Mon, 10 Feb 2020 21:03:06 GMT Red Hat Security Advisory 2020-0464-01 - 389 Directory Server is an LDAP version 3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line utilities for server administration. Issues addressed include a bypass vulnerability. Full Article
1 WordPress WooCommerce CardGate Payment Gateway 3.1.15 Bypass By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:08:32 GMT WordPress WooCommerce CardGate Payment Gateway plugin version 3.1.15 suffers from a payment process bypass vulnerability. Full Article
1 TP-Link TL-WR849N 0.9.1 4.16 Authentication Bypass By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:29:26 GMT TP-Link TL-WR849N version 0.9.1 4.16 suffers from a firmware upload authentication bypass vulnerability. Full Article
1 Intelbras Wireless N 150Mbps WRN240 Authentication Bypass By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:33:24 GMT Intelbras Wireless N 150Mbps WRN240 suffers from a configuration upload authentication bypass vulnerability. Full Article
1 Red Hat Security Advisory 2020-0734-01 By packetstormsecurity.com Published On :: Thu, 05 Mar 2020 20:56:21 GMT Red Hat Security Advisory 2020-0734-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. Issues addressed include a bypass vulnerability. Full Article
1 Red Hat Security Advisory 2020-0652-01 By packetstormsecurity.com Published On :: Thu, 05 Mar 2020 20:56:29 GMT Red Hat Security Advisory 2020-0652-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a bypass vulnerability. Full Article
1 Citrix Gateway 11.1 / 12.0 / 12.1 Cache Bypass By packetstormsecurity.com Published On :: Mon, 09 Mar 2020 17:09:14 GMT Citrix Gateway versions 11.1, 12.0, and 12.1 suffer from a caching bypass vulnerability. Full Article
1 CyberArk PSMP 10.9.1 Policy Restriction Bypass By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 16:02:22 GMT CyberArk PSMP versions 10.9.1 and below suffer from a policy restriction bypass vulnerability. Full Article
1 Red Hat Security Advisory 2020-1021-01 By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 20:22:22 GMT Red Hat Security Advisory 2020-1021-01 - GNOME is the default desktop environment of Red Hat Enterprise Linux. Issues addressed include a bypass vulnerability. Full Article
1 Red Hat Security Advisory 2020-1268-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:21:44 GMT Red Hat Security Advisory 2020-1268-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability. Full Article
1 Red Hat Security Advisory 2020-1346-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:41:40 GMT Red Hat Security Advisory 2020-1346-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability. Full Article
1 Red Hat Security Advisory 2020-1462-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 23:04:44 GMT Red Hat Security Advisory 2020-1462-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability. Full Article
1 Red Hat Security Advisory 2020-1475-01 By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 00:13:27 GMT Red Hat Security Advisory 2020-1475-01 - Red Hat CodeReady Workspaces 2.1.0 provides a cloud developer-workspace server and a browser-based IDE built for teams and organizations. CodeReady Workspaces runs in OpenShift and is well-suited for container-based development. Issues addressed include a bypass vulnerability. Full Article
1 QRadar Community Edition 7.3.1.6 Authorization Bypass By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:28:15 GMT QRadar Community Edition version 7.3.1.6 suffers from an authorization bypass vulnerability. Full Article
1 Online Scheduling System 1.0 Authentication Bypass By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 20:32:22 GMT Online Scheduling System version 1.0 suffers from an authentication bypass vulnerability. Full Article
1 File Explorer 1.4 Access Bypass By packetstormsecurity.com Published On :: Mon, 04 May 2020 17:26:58 GMT File Explorer for iOS version 1.4 suffers from an access bypass vulnerability. Full Article
1 Ubuntu Security Notice USN-4171-5 By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 15:20:58 GMT Ubuntu Security Notice 4171-5 - USN-4171-1 fixed vulnerabilities in Apport. This caused a regression in autopkgtest and python2 compatibility. This update fixes the problem. Kevin Backhouse discovered Apport would read its user-controlled settings file as the root user. This could be used by a local attacker to possibly crash Apport or have other unspecified consequences. Sander Bos discovered a race-condition in Apport during core dump creation. This could be used by a local attacker to generate a crash report for a privileged process that is readable by an unprivileged user. Sander Bos discovered Apport mishandled crash dumps originating from containers. This could be used by a local attacker to generate a crash report for a privileged process that is readable by an unprivileged user. Sander Bos discovered Apport mishandled lock-file creation. This could be used by a local attacker to cause a denial of service against Apport. Kevin Backhouse discovered Apport read various process-specific files with elevated privileges during crash dump generation. This could could be used by a local attacker to generate a crash report for a privileged process that is readable by an unprivileged user. Various other issues were also addressed. Full Article
1 Mandos Encrypted File System Unattended Reboot Utility 1.8.10 By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 16:10:50 GMT The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system. Full Article
1 Ubuntu Security Notice USN-4312-1 By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:49:27 GMT Ubuntu Security Notice 4312-1 - Matthias Gerstner discovered that Timeshift did not securely create temporary files. An attacker could exploit a race condition in Timeshift and potentially execute arbitrary commands as root. Full Article