exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2019-10-28

Stegano 0.9.7
Posted Oct 28, 2019
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: Fixed markdown of the previous release.
tags | tool, encryption, steganography, python
systems | unix
SHA-256 | 815698777c2f3f079d972fabf9f944194febb1efa769ea2a8940dd41d5d1667f
Microsoft Windows Insecure CSharedStream Object Privilege Escalation
Posted Oct 28, 2019
Authored by James Forshaw, Google Security Research

Microsoft Windows suffers from an insecure CSharedStream object privilege escalation vulnerability.

tags | exploit
systems | windows
SHA-256 | 9abd67b8467f3e60623b8e86d9c7f4d8fade22c3b12d417cba3715c52580f6f9
WebKit HTMLFrameElementBase::isURLAllowed Universal Cross Site Scripting
Posted Oct 28, 2019
Authored by Google Security Research, Glazvunov

WebKit suffers from an HTMLFrameElementBase::isURLAllowed universal cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 408eee81bf05626112665dd417b2dde7924a6d1ed0dadfd93c8ea516c4f61b79
Infosysta Jira 1.6.13_J8 User Name Disclosure
Posted Oct 28, 2019
Authored by Erik Steltzner, Sascha Heider, Fabian Krone | Site syss.de

Infosysta Jira version 1.6.13_J8 suffers from a user name disclosure vulnerability.

tags | exploit
advisories | CVE-2019-16907
SHA-256 | 506fa47855ab00052d2c3b374f021b09caf1e85be4e4a010161eed8775c5f5b8
Infosysta Jira 1.6.13_J8 Project List Authentication Bypass
Posted Oct 28, 2019
Authored by Erik Steltzner, Sascha Heider, Fabian Krone | Site syss.de

Infosysta Jira version 1.6.13_J8 suffers from an authentication bypass vulnerability that allows you to see project lists.

tags | exploit, bypass
advisories | CVE-2019-16908, CVE-2019-16909
SHA-256 | 5759cf071d560c4da28fae8baa88ebacb2d306e5d1cfc0ae9d1a454907d296b8
Infosysta Jira 1.6.13_J8 Push Notification Authentication Bypass
Posted Oct 28, 2019
Authored by Erik Steltzner, Sascha Heider, Fabian Krone | Site syss.de

Infosysta Jira version 1.6.13_J8 suffers from an authentication bypass vulnerability that allows you to see push notifications for a given user.

tags | exploit, bypass
advisories | CVE-2019-16906
SHA-256 | 01fd0ed65d6bb484afc3a2b833eae1e73bda43947aa08a133d177919fadef778
Ubuntu Security Notice USN-4166-1
Posted Oct 28, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4166-1 - It was discovered that PHP incorrectly handled certain paths when being used in FastCGI configurations. A remote attacker could possibly use this issue to execute arbitrary code.

tags | advisory, remote, arbitrary, php
systems | linux, ubuntu
advisories | CVE-2019-11043
SHA-256 | e143091751be9bfe1dfc212b61e56fc89b156a66fdac6f4080c1243bdbc409c0
Red Hat Security Advisory 2019-3209-01
Posted Oct 28, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-3209-01 - The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. A privilege escalation vulnerability was addressed.

tags | advisory, root
systems | linux, redhat
advisories | CVE-2019-14287
SHA-256 | b2c78ef601cf2bdfcef34a0c5b3e7e351dcb97f43120a2c60d9873a427019a64
Gentoo Linux Security Advisory 201910-01
Posted Oct 28, 2019
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201910-1 - A vulnerability in PHP might allow an attacker to execute arbitrary code. Versions less than 7.1.33 are affected.

tags | advisory, arbitrary, php
systems | linux, gentoo
advisories | CVE-2019-11043
SHA-256 | a6d82ade737db57082fff3a1c19c65c1890fcde1110a0bf7f1952217ef2a3e9d
ChaosPro 2.0 Buffer Overflow
Posted Oct 28, 2019
Authored by Chase Hatch

ChaosPro version 2.0 SEH buffer overflow exploit.

tags | exploit, overflow
SHA-256 | ddd69b766e659956f62f3d710f3028d2e19dcc240bbf9bd5d345931c410c2237
waldronmatt FullCalendar-BS4-PHP-MySQL-JSON 1.21 Cross Site Scripting
Posted Oct 28, 2019
Authored by Cakes

waldronmatt FullCalendar-BS4-PHP-MySQL-JSON version 1.21 suffers from a cross site scripting vulnerability.

tags | exploit, php, xss
SHA-256 | 7bd33179e72f3eb2716b76f370cbc499c313b43e1c9a043a65fb9a2c48300585
delpino73 Blue-Smiley-Organizer 1.32 SQL Injection
Posted Oct 28, 2019
Authored by Cakes

delpino73 Blue-Smiley-Organizer version 1.32 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 32f0e28bc7a0f69a86e68df77f94360461fc1a684a6c9f86312004b882c4bc41
waldronmatt FullCalendar-BS4-PHP-MySQL-JSON 1.21 SQL Injection
Posted Oct 28, 2019
Authored by Cakes

waldronmatt FullCalendar-BS4-PHP-MySQL-JSON version 1.21 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 353b3794ce8cd52da8c65e4a0d393d9bec71817e1bfd4c802b7c9b29fa1c3310
Intelbras Router WRN150 1.0.18 Cross Site Request Forgery
Posted Oct 28, 2019
Authored by Prof. Joas Antonio

Intelbras Router WRN150 version 1.0.18 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | ef7c930d6c05d382986bea588e3f4b50bf4fd0628135a875fbd8fe63e70686cd
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close