This Metasploit module will exploit an HTTP end point with the Log4Shell vulnerability by injecting a format message that will trigger an LDAP connection to Metasploit and load a payload. The Automatic target delivers a Java payload using remote class loading. This requires Metasploit to run an HTTP server in addition to the LDAP server that the target can connect to. The targeted application must have the trusted code base option enabled for this technique to work. The non-Automatic targets deliver a payload via a serialized Java object. This does not require Metasploit to run an HTTP server and instead leverages the LDAP server to deliver the serialized object. The target application in this case must be compatible with the user-specified JAVA_GADGET_CHAIN option.
fb881ade3573c4c3970acc27f51ba1d3ac1aaff25446ea8e525ce3aca4d0ca4d
This is a custom firmware written for the Proxmark3 device. It extends the currently available firmware. This release is nicknamed Frostbit.
36006cf30c30a533027de851fe9a96593a093e2e03cddf1703aa81940b9bb9a9
Crestron HD-MD4X2-4K-E version 1.0.0.2159 suffers from a credential disclosure vulnerability. When the administrative web interface of the Crestron HDMI switcher is accessed unauthenticated, user credentials are disclosed which are valid to authenticate to the web interface.
2cdcf800ce58540afa4f5cf6fc99e149ababce5250885bbed00e0cc15d0c8f70
Ubuntu Security Notice 5225-1 - It was discovered that lxml incorrectly handled certain XML and HTML files. An attacker could possibly use this issue to execute arbitrary code.
111c525b7c9322f2745be34576bb382936329f2efb2b527c225ddc974a2572d7
Ubuntu Security Notice 5224-1 - It was discovered that Ghostscript incorrectly handled certain PostScript files. If a user or automated system were tricked into processing a specially crafted file, a remote attacker could possibly use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code.
24ad327510e8f49e04073b77dbbe1ec1e7ddf2d663af9f190eb187869b4a92dc
Red Hat Security Advisory 2022-0072-05 - The kernel packages contain the Linux kernel, the core of any Linux operating system.
db0c1d9fb0fadbe8bf92ab5570f32acd96d76cb09a70a3a73352fec7efca0658
Red Hat Security Advisory 2022-0065-05 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a buffer overflow vulnerability.
40e4a0ec6d21c586409f55a567705f5d041db004a9c79906afa098e121353a07
Red Hat Security Advisory 2022-0075-03 - WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Issues addressed include code execution and use-after-free vulnerabilities.
3719291aaf7e31a07ab6664ae487b616f0ae4dfe2dd92c9873d71a0d324490c0
Red Hat Security Advisory 2022-0076-03 - Red Hat Identity Management is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
f34aa13db584b198989ec88113b005c89876833a002fd516acb370e73c659553
Red Hat Security Advisory 2022-0078-04 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
d1130001d6743536e17d1f412bacaa8c6bbd388276846e49b256ee9437cb87e8
Red Hat Security Advisory 2022-0081-03 - The Advanced Virtualization module provides the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.
ed2aa200711dad8069fe7e18296db0ca281fe1d5f8e59fd39f90bfeb17cac0c3
Red Hat Security Advisory 2022-0082-01 - Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services. This release of Red Hat Process Automation Manager 7.11.1 serves as an update to Red Hat Process Automation Manager 7.11.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include a code execution vulnerability.
a92a8bec4e4bb08b576106882778eec3289082354d6ea4d7e170ec45c4a09d7a
Red Hat Security Advisory 2022-0073-02 - The cpio packages provide the GNU cpio utility for creating and extracting archives, or copying files from one place to another.
df53c246da972f560f9a2aa42d41fa8438516c3a2fc0295342aa1f6ed2b1c3f8
Red Hat Security Advisory 2022-0064-02 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library.
864bb2902300ac462339d439cb2ee5f229a9df235da8c7da659952dbcd2eb8bb
Red Hat Security Advisory 2022-0059-03 - WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Issues addressed include code execution and use-after-free vulnerabilities.
7ea78cedc610b96d2b09e66441450b9b5966b969e4b6258e9c87fac6ae033798
Ubuntu Security Notice 5222-1 - It was discovered that Apache Log4j 2 was vulnerable to remote code execution attack when configured to use a JDBC Appender with a JNDI LDAP data source URI. A remote attacker could possibly use this issue to cause a crash, leading to a denial of service. Hideki Okamoto and Guy Lederfein discovered that Apache Log4j 2 did not protect against infinite recursion in lookup evaluation. A remote attacker could possibly use this issue to cause Apache Log4j 2 to crash, leading to a denial of service. This issue only affected Ubuntu 18.04 LTS.
ee5846a036c0891754e7ed626465c8bd6a55f3bf5eeff467765c614fef6b1fd6
WordPress Frontend Uploader plugin version 1.3.2 suffers from a persistent cross site scripting vulnerability.
31fdddd89c8c546e099a752449bf6d534e404e26ed3609d80d15dbb37db02350
DMCA.com suffers from improper access control, persistent cross site scripting, and improper input validation vulnerabilities.
f9c2e08984f6bc9930ffb841c085d3f0b8e12d90c94c81c7a3fe48baafd08bd8