what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

Files from EQSTLab

First Active2024-08-28
Last Active2024-10-24
Vendure Arbitrary File Read / Denial Of Service
Posted Oct 24, 2024
Authored by EQSTLab, Rajesh Sharma | Site github.com

Vendure is an open-source headless commerce platform. Prior to versions 3.0.5 and 2.3.3, a vulnerability in Vendure's asset server plugin allows an attacker to craft a request which is able to traverse the server file system and retrieve the contents of arbitrary files, including sensitive data such as configuration files, environment variables, and other critical data stored on the server. In the same code path is an additional vector for crashing the server via a malformed URI. Patches are available in versions 3.0.5 and 2.3.3. Some workarounds are also available. One may use object storage rather than the local file system, e.g. MinIO or S3, or define middleware which detects and blocks requests with urls containing /../.

tags | exploit, arbitrary, local
advisories | CVE-2024-48914
SHA-256 | 44947878b2d27713e2c8036a90034febca1e8b498dc37d99f640f1008b48d55c
pfSense 2.5.2 Cross Site Scripting
Posted Oct 24, 2024
Authored by EQSTLab, physicszq | Site github.com

A cross site scripting vulnerability in pfsense version 2.5.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the $pconfig variable at interfaces_groups_edit.php.

tags | exploit, web, arbitrary, php, xss
advisories | CVE-2024-46538
SHA-256 | 8ffa9a2a9e36932b192f5259bd78d63cc5dfdd4bd174ea8cf7e0b3c07013638f
pgAdmin 8.11 Information Disclosure
Posted Sep 26, 2024
Authored by EQSTLab | Site github.com

pgAdmin versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data.

tags | exploit
advisories | CVE-2024-9014
SHA-256 | 518f56e4049ab1c116b1d55d1a7662e998277cad57c401bcecbaa7035abe00a8
WordPress GiveWP Donation / Fundraising Platform 3.14.1 File Deletion / Command Execution
Posted Aug 28, 2024
Authored by EQSTLab | Site github.com

WordPress GiveWP Donation and Fundraising Platform plugins versions 3.14.1 and below suffer from file deletion and remote command execution vulnerabilities.

tags | exploit, remote, vulnerability
advisories | CVE-2024-5932
SHA-256 | eaeb551ca6bae154ce48a02a6a679c0510edf97f25dc92f22dbf3038183c0dc8
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close