Quantcast
Channel: Files Date: 2019-05-21 to 2019-05-22 ≈ Packet Storm
Browsing latest articles
Browse All 21 View Live

WordPress WPGraphQL 0.2.3 Authentication Bypass / Information Disclosure

WordPress WPGraphQL plugin version 0.2.3 suffers from authentication bypass and information disclosure vulnerabilities.

View Article


Moodle Jmol Filter 6.1 Cross Site Scripting / Directory Traversal

Moodle Jmol Filter version 6.1 suffers from cross site scripting and directory traversal vulnerabilities.

View Article


Deluge 1.3.15 Webseeds / URL Denial Of Service

Deluge version 1.3.15 Webseeds and URL proof of concept denial of service exploits.

View Article

Oracle CTI Web Service XML Injection

Oracle CTI Web Service suffers from an EBS_ASSET_HISTORY_OPERATIONS XML external entity injection vulnerability.

View Article

Slims CMS Akasia 8.3.1 SQL Injection

Slims CMS Akasia version 8.3.1 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

View Article


TP-LINK TL-WR840N Cross Site Scripting

TP-LINK TL-WR840N version 5 00000005 suffers from a cross site scripting vulnerability.

View Article

PHP PHP_INI_SYSTEM Ineffective Controls

Security controls configured via php.ini directives at the PHP_INI_SYSTEM level are ineffective as they could be bypassed by malicious scripts via writing their own process memory on the Linux...

View Article

JavaScriptCore AIR Optimization Incorrectly Removes Assignment To Register

JavaScriptCore AIR optimization incorrectly removes assignment to register.

View Article


JavaScriptCore LICM Uninitialized Stack Variable

JavaScriptCore loop-invariant code motion (LICM) in DFG JIT leaves a stack variable uninitialized.

View Article


Microsoft Windows CmKeyBodyRemapToVirtualForEnum Arbitrary Key Enumeration

The Microsoft Windows kernel's Registry Virtualization does not safely open the real key for a virtualization location leading to enumerating arbitrary keys resulting in privilege escalation.

View Article

XNU stf_ioctl Bad Cast

XNU suffers from a wild-read (and possible corruption) due to bad cast in stf_ioctl.

View Article

Ubuntu Security Notice USN-3990-1

Ubuntu Security Notice 3990-1 - It was discovered that urllib3 incorrectly removed Authorization HTTP headers when handled cross-origin redirects. This could result in credentials being sent to...

View Article

Ubuntu Security Notice USN-3989-1

Ubuntu Security Notice 3989-1 - It was discovered that LibRaw incorrectly handled photo files. If a user or automated system were tricked into processing a specially crafted photo file, a remote...

View Article


Red Hat Security Advisory 2019-1258-01

Red Hat Security Advisory 2019-1258-01 - MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL.

View Article

Ubuntu Security Notice USN-3991-1

Ubuntu Security Notice 3991-1 - Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to...

View Article


WebKitGTK+ / WPE WebKit Code Execution

WebKitGTK+ and WPE WebKit suffer from multiple memory corruption vulnerabilities and various other issues that can lead to code execution. Multiple versions are affected.

View Article

Darktrace Enterpise Immune System 3.0.9 / 3.0.10 Cross Site Request Forgery

Darktrace Enterprise Immune System versions 3.0.9 and 3.0.10 contain multiple cross site request forgery vulnerabilities. It is highly likely that older versions are affected as well, but this has not...

View Article


Revive Adserver Weak PRNG Cryptography

Revive Adserver versions prior to 4.2.1 make use of a cryptographically weak pseudo-random number generator.

View Article

JSC DFG Incorrect Decision On Behavior

JSC DFG's doesGC() is incorrect about the HasIndexedProperty operation's behavior on StringObjects.

View Article

Visual Voicemail For iPhone IMAP NAMESPACE Use-After-Free

Visual Voicemail for iPhone suffers from a use-after-free vulnerability in IMAP NAMESPACE processing.

View Article

XNU Stale Pointer Use-After-Free

XNU suffers from a use-after-free vulnerability due to a stale pointer left by in6_pcbdetach.

View Article

Browsing latest articles
Browse All 21 View Live