<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <title>Files &#8776; Packet Storm</title>
  <description>Packet Storm - Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers</description>
  <link>https://packetstormsecurity.com/</link>
  <language>en-us</language>
  <lastBuildDate>Mon, 14 Oct 2019 16:23:31 GMT</lastBuildDate>

  <image>
    <title>Packet Storm</title>
    <width>144</width><height>400</height>
    <link>https://packetstormsecurity.com/</link>
    <url>https://ssl.google-analytics.com/__utm.gif?utmwv=1.3&amp;utmn=1910904596&amp;utmcs=ISO-8859-1&amp;utmsr=31337x31337&amp;utmsc=32-bit&amp;utmul=en-us&amp;utmje=0&amp;utmfl=-&amp;utmcn=1&amp;utmdt=Files%u2248%20Packet%20Storm&amp;utmhn=packetstormsecurity.com&amp;utmr=-&amp;utmp=%2Ffiles%2F&amp;utmac=UA-18885198-1&amp;utmcc=__utma%3D32867617.1910904596.1571070211.1571070211.1571070211.1%3B%2B__utmz%3D32867617.1571070211.1.1.utmccn%3D(direct)%7Cutmcsr%3D(direct)%7Cutmcmd%3D(none)</url>
  </image>
 
<item>
<title>Botan C++ Crypto Algorithms Library 2.12.1</title>
<link>https://packetstormsecurity.com/files/154842/Botan-2.12.1.tar.xz</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154842/Botan-2.12.1.tar.xz</guid>
<comments>https://packetstormsecurity.com/files/154842/Botan-C-Crypto-Algorithms-Library-2.12.1.html</comments>
<pubDate>Mon, 14 Oct 2019 15:16:36 GMT</pubDate>
<description>Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release.</description>
<category></category>
</item>
<item>
<title>Red Hat Security Advisory 2019-2989-01</title>
<link>https://packetstormsecurity.com/files/154841/RHSA-2019-2989-01.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154841/RHSA-2019-2989-01.txt</guid>
<comments>https://packetstormsecurity.com/files/154841/Red-Hat-Security-Advisory-2019-2989-01.html</comments>
<pubDate>Mon, 14 Oct 2019 15:11:40 GMT</pubDate>
<description>Red Hat Security Advisory 2019-2989-01 - Red Hat OpenShift Container Platform is Red Hat&#39;s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. TLS verification and SSH host key verification issues were addressed.</description>
<category></category>
</item>
<item>
<title>ASUS RT-N10+ 2.0.3.4 CSRF / XSS / Command Execution</title>
<link>https://packetstormsecurity.com/files/154840/asusrtn10-xssxsrfexec.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154840/asusrtn10-xssxsrfexec.txt</guid>
<comments>https://packetstormsecurity.com/files/154840/ASUS-RT-N10-2.0.3.4-CSRF-XSS-Command-Execution.html</comments>
<pubDate>Mon, 14 Oct 2019 15:10:11 GMT</pubDate>
<description>ASUS RT-N10+ with firmware version 2.0.3.4 suffers from cross site request forgery and cross site scripting vulnerabilities that can assist with achieving command execution.</description>
<category></category>
</item>
<item>
<title>Apple Security Advisory 2019-10-11-1</title>
<link>https://packetstormsecurity.com/files/154839/APPLE-SA-2019-10-11-1.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154839/APPLE-SA-2019-10-11-1.txt</guid>
<comments>https://packetstormsecurity.com/files/154839/Apple-Security-Advisory-2019-10-11-1.html</comments>
<pubDate>Mon, 14 Oct 2019 15:08:24 GMT</pubDate>
<description>Apple Security Advisory 2019-10-11-1 - Swift 5.1.1 for Ubuntu is now available and addresses an issue with data disclosure.</description>
<category></category>
</item>
<item>
<title>Kirona-DRS 5.5.3.5 Information Disclosure</title>
<link>https://packetstormsecurity.com/files/154838/kironadrs5535-disclose.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154838/kironadrs5535-disclose.txt</guid>
<comments>https://packetstormsecurity.com/files/154838/Kirona-DRS-5.5.3.5-Information-Disclosure.html</comments>
<pubDate>Mon, 14 Oct 2019 15:07:09 GMT</pubDate>
<description>Kirona-DRS version 5.5.3.5 suffers from an information disclosure vulnerability.</description>
<category></category>
</item>
<item>
<title>Express Invoice 7.12 Cross Site Scripting</title>
<link>https://packetstormsecurity.com/files/154837/expressinvoice712-xss.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154837/expressinvoice712-xss.txt</guid>
<comments>https://packetstormsecurity.com/files/154837/Express-Invoice-7.12-Cross-Site-Scripting.html</comments>
<pubDate>Mon, 14 Oct 2019 14:56:48 GMT</pubDate>
<description>Express Invoice version 7.12 suffers from a persistent cross site scripting vulnerability.</description>
<category></category>
</item>
<item>
<title>Debian Security Advisory 4539-3</title>
<link>https://packetstormsecurity.com/files/154836/dsa-4539-3.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154836/dsa-4539-3.txt</guid>
<comments>https://packetstormsecurity.com/files/154836/Debian-Security-Advisory-4539-3.html</comments>
<pubDate>Mon, 14 Oct 2019 14:56:07 GMT</pubDate>
<description>Debian Linux Security Advisory 4539-3 - The update for openssl released as DSA 4539-1 introduced a regression where AES-CBC-HMAC-SHA ciphers were not enabled. Updated openssl packages are now available to correct this issue.</description>
<category></category>
</item>
<item>
<title>ActiveFax Server 6.92 Build 0316 Denial Of Service</title>
<link>https://packetstormsecurity.com/files/154827/activefax692pop3-dos.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154827/activefax692pop3-dos.txt</guid>
<comments>https://packetstormsecurity.com/files/154827/ActiveFax-Server-6.92-Build-0316-Denial-Of-Service.html</comments>
<pubDate>Mon, 14 Oct 2019 14:47:46 GMT</pubDate>
<description>ActiveFax Server version 6.92 build 0316 POP3 server denial of service exploit.</description>
<category></category>
</item>
<item>
<title>Open-Xchange OX App Suite SSRF / XSS / Information Disclosure / Access Controls</title>
<link>https://packetstormsecurity.com/files/154826/oxappsuite-ssrfxssdisclose.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154826/oxappsuite-ssrfxssdisclose.txt</guid>
<comments>https://packetstormsecurity.com/files/154826/Open-Xchange-OX-App-Suite-SSRF-XSS-Information-Disclosure-Access-Controls.html</comments>
<pubDate>Mon, 14 Oct 2019 14:44:16 GMT</pubDate>
<description>Various Open-Xchange OX App Suite versions suffer from server-side request forgery, cross site scripting, information disclosure, and improper access control vulnerabilities.</description>
<category></category>
</item>
<item>
<title>SpotAuditor 5.3.1.0 Denial Of Service</title>
<link>https://packetstormsecurity.com/files/154825/spotauditor5310-dos.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154825/spotauditor5310-dos.txt</guid>
<comments>https://packetstormsecurity.com/files/154825/SpotAuditor-5.3.1.0-Denial-Of-Service.html</comments>
<pubDate>Mon, 14 Oct 2019 14:39:39 GMT</pubDate>
<description>SpotAuditor version 5.3.1.0 suffers from a denial of service vulnerability.</description>
<category></category>
</item>
<item>
<title>Uplay 92.0.0.6280 Local Privilege Escalation</title>
<link>https://packetstormsecurity.com/files/154824/uplay92-escalate.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154824/uplay92-escalate.txt</guid>
<comments>https://packetstormsecurity.com/files/154824/Uplay-92.0.0.6280-Local-Privilege-Escalation.html</comments>
<pubDate>Mon, 14 Oct 2019 14:38:07 GMT</pubDate>
<description>Uplay version 92.0.0.6280 suffers from a local privilege escalation vulnerability.</description>
<category></category>
</item>
<item>
<title>Joomla Sumoku 3.9.8 SQL Injection</title>
<link>https://packetstormsecurity.com/files/154834/joomlasumoku398-sql.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154834/joomlasumoku398-sql.txt</guid>
<comments>https://packetstormsecurity.com/files/154834/Joomla-Sumoku-3.9.8-SQL-Injection.html</comments>
<pubDate>Sun, 13 Oct 2019 12:22:22 GMT</pubDate>
<description>Joomla Sumoku component version 3.9.8 suffers from a remote SQL injection vulnerability.</description>
<category></category>
</item>
<item>
<title>Joomla Vemod News Mailer 1.0 SQL Injection</title>
<link>https://packetstormsecurity.com/files/154833/joomlavemodnewsmailer10-sql.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154833/joomlavemodnewsmailer10-sql.txt</guid>
<comments>https://packetstormsecurity.com/files/154833/Joomla-Vemod-News-Mailer-1.0-SQL-Injection.html</comments>
<pubDate>Sun, 13 Oct 2019 11:11:11 GMT</pubDate>
<description>Joomla Vemod News Mailer component version 1.0 suffers from a remote SQL injection vulnerability.</description>
<category></category>
</item>
<item>
<title>Joomla MediaLibrary 1.5.26 SQL Injection</title>
<link>https://packetstormsecurity.com/files/154832/joomlamedialibrary1526-sql.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154832/joomlamedialibrary1526-sql.txt</guid>
<comments>https://packetstormsecurity.com/files/154832/Joomla-MediaLibrary-1.5.26-SQL-Injection.html</comments>
<pubDate>Sun, 13 Oct 2019 10:11:11 GMT</pubDate>
<description>Joomla MediaLibrary component version 1.5.26 suffers from a remote SQL injection vulnerability.</description>
<category></category>
</item>
<item>
<title>Joomla MisterEstate 1.5.26 SQL Injection</title>
<link>https://packetstormsecurity.com/files/154831/joomlamisterestate1526-sql.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154831/joomlamisterestate1526-sql.txt</guid>
<comments>https://packetstormsecurity.com/files/154831/Joomla-MisterEstate-1.5.26-SQL-Injection.html</comments>
<pubDate>Sun, 13 Oct 2019 09:22:22 GMT</pubDate>
<description>Joomla MisterEstate component version 1.5.26 suffers from a remote SQL injection vulnerability.</description>
<category></category>
</item>
<item>
<title>Joomla Google Maps 1.0.4 SQL Injection</title>
<link>https://packetstormsecurity.com/files/154830/joomlagooglemaps104-sql.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154830/joomlagooglemaps104-sql.txt</guid>
<comments>https://packetstormsecurity.com/files/154830/Joomla-Google-Maps-1.0.4-SQL-Injection.html</comments>
<pubDate>Sat, 12 Oct 2019 14:44:44 GMT</pubDate>
<description>Joomla Google Maps component version 1.0.4 suffers from a remote SQL injection vulnerability.</description>
<category></category>
</item>
<item>
<title>Joomla Mad4Joomla 1.1.x SQL Injection</title>
<link>https://packetstormsecurity.com/files/154829/joomlamad4joomla11x-sql.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154829/joomlamad4joomla11x-sql.txt</guid>
<comments>https://packetstormsecurity.com/files/154829/Joomla-Mad4Joomla-1.1.x-SQL-Injection.html</comments>
<pubDate>Sat, 12 Oct 2019 14:22:22 GMT</pubDate>
<description>Joomla Mad4Joomla component version 1.1.x suffers from a remote SQL injection vulnerability.</description>
<category></category>
</item>
<item>
<title>Joomla Cactus 1.2.0 SQL Injection</title>
<link>https://packetstormsecurity.com/files/154828/joomlacactus120-sql.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154828/joomlacactus120-sql.txt</guid>
<comments>https://packetstormsecurity.com/files/154828/Joomla-Cactus-1.2.0-SQL-Injection.html</comments>
<pubDate>Sat, 12 Oct 2019 13:13:13 GMT</pubDate>
<description>Joomla Cactus component version 1.2.0 suffers from a remote SQL injection vulnerability.</description>
<category></category>
</item>
<item>
<title>Joomla SwPhotoGallery 1.5.26 SQL Injection</title>
<link>https://packetstormsecurity.com/files/154835/joomlaswphotogallery1526-sql.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154835/joomlaswphotogallery1526-sql.txt</guid>
<comments>https://packetstormsecurity.com/files/154835/Joomla-SwPhotoGallery-1.5.26-SQL-Injection.html</comments>
<pubDate>Sat, 12 Oct 2019 10:11:11 GMT</pubDate>
<description>Joomla SwPhotoGallery component version 1.5.26 suffers from a remote SQL injection vulnerability.</description>
<category></category>
</item>
<item>
<title>Openfire 4.4.1 Cross Site Scripting</title>
<link>https://packetstormsecurity.com/files/154823/NS-19-015.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154823/NS-19-015.txt</guid>
<comments>https://packetstormsecurity.com/files/154823/Openfire-4.4.1-Cross-Site-Scripting.html</comments>
<pubDate>Fri, 11 Oct 2019 17:35:02 GMT</pubDate>
<description>Openfire version 4.4.1 suffers from multiple cross site scripting vulnerabilities.</description>
<category></category>
</item>
<item>
<title>SugarCRM 9.0.1 Phar Deserialization</title>
<link>https://packetstormsecurity.com/files/154821/KIS-2019-09.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154821/KIS-2019-09.txt</guid>
<comments>https://packetstormsecurity.com/files/154821/SugarCRM-9.0.1-Phar-Deserialization.html</comments>
<pubDate>Fri, 11 Oct 2019 15:18:50 GMT</pubDate>
<description>SugarCRM versions 9.0.1 and below suffer from multiple phar deserialization vulnerabilities.</description>
<category></category>
</item>
<item>
<title>SugarCRM 9.0.1 PHP Object Injection</title>
<link>https://packetstormsecurity.com/files/154820/KIS-2019-08.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154820/KIS-2019-08.txt</guid>
<comments>https://packetstormsecurity.com/files/154820/SugarCRM-9.0.1-PHP-Object-Injection.html</comments>
<pubDate>Fri, 11 Oct 2019 15:17:36 GMT</pubDate>
<description>SugarCRM versions 9.0.1 and below suffer from multiple php object injection vulnerabilities.</description>
<category></category>
</item>
<item>
<title>SugarCRM 9.0.1 PHP Code Injection</title>
<link>https://packetstormsecurity.com/files/154818/KIS-2019-07.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154818/KIS-2019-07.txt</guid>
<comments>https://packetstormsecurity.com/files/154818/SugarCRM-9.0.1-PHP-Code-Injection.html</comments>
<pubDate>Fri, 11 Oct 2019 15:14:30 GMT</pubDate>
<description>SugarCRM versions 9.0.1 and below suffer from multiple PHP code injection vulnerabilities.</description>
<category></category>
</item>
<item>
<title>SugarCRM 9.0.1 Path Traversal</title>
<link>https://packetstormsecurity.com/files/154817/KIS-2019-06.txt</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154817/KIS-2019-06.txt</guid>
<comments>https://packetstormsecurity.com/files/154817/SugarCRM-9.0.1-Path-Traversal.html</comments>
<pubDate>Fri, 11 Oct 2019 15:13:05 GMT</pubDate>
<description>SugarCRM versions 9.0.1 and below suffer from multiple path traversal vulnerabilities.</description>
<category></category>
</item>
<item>
<title>Visual Studio Code Remote Debugger Enabled</title>
<link>https://packetstormsecurity.com/files/154822/GS20191011151944.tgz</link>
<guid isPermaLink="true">https://packetstormsecurity.com/files/154822/GS20191011151944.tgz</guid>
<comments>https://packetstormsecurity.com/files/154822/Visual-Studio-Code-Remote-Debugger-Enabled.html</comments>
<pubDate>Fri, 11 Oct 2019 15:11:11 GMT</pubDate>
<description>Visual Studio Code enables its remote debugger by default when installed.</description>
<category></category>
</item>


</channel>
</rss>

