exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2022-02-24

Packet Fence 11.2.0
Posted Feb 24, 2022
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: PacketFence v11.2 now directly integrates with TIP OpenWiFi. TIP OpenWiFi access points are now natively supported network/switch devices in PacketFence with the ability to provision out-of-band subscriber service networks, IoT networks and secured networks. It sees its device management (MDM) integration nicely enhanced with the addition of Kandji. More automated tests were added through Venom. It also provides additional important improvements such as floating devices support for Brocade/Ruckus switches, role-base access for VPNs, an ISO-based Debian 11 installer and much more.
tags | tool, remote
systems | unix
SHA-256 | 14e0915c5ade0f452ed74540b6e34a54e94e728680e3f09293dde36bfc98c6a8
Ubuntu Security Notice USN-5292-4
Posted Feb 24, 2022
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 5292-4 - USN-5292-1 fixed a vulnerability in snapd. Unfortunately that update introduced a regression that could break the fish shell. This update fixes the problem. James Troup discovered that snap did not properly manage the permissions for the snap directories. A local attacker could possibly use this issue to expose sensitive information. Ian Johnson discovered that snapd did not properly validate content interfaces and layout paths. A local attacker could possibly use this issue to inject arbitrary AppArmor policy rules, resulting in a bypass of intended access restrictions. The Qualys Research Team discovered that snapd did not properly validate the location of the snap-confine binary. A local attacker could possibly use this issue to execute other arbitrary binaries and escalate privileges. The Qualys Research Team discovered that a race condition existed in the snapd snap-confine binary when preparing a private mount namespace for a snap. A local attacker could possibly use this issue to escalate privileges and execute arbitrary code.

tags | advisory, arbitrary, shell, local
systems | linux, ubuntu
advisories | CVE-2021-3155, CVE-2021-4120, CVE-2021-44730, CVE-2021-44731
SHA-256 | 169abf80da0290c7a605e413fa2b7a41d8a2c57ded0ed852147dda380b2de9a5
Red Hat Security Advisory 2022-0663-01
Posted Feb 24, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0663-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information. Issues addressed include a code execution vulnerability.

tags | advisory, code execution, protocol
systems | linux, redhat
advisories | CVE-2021-44142
SHA-256 | 24dda6271dda80c5868174e0e36df55396478a74dc320200b6051d3e05894fea
Red Hat Security Advisory 2022-0664-01
Posted Feb 24, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0664-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information. Issues addressed include a code execution vulnerability.

tags | advisory, code execution, protocol
systems | linux, redhat
advisories | CVE-2021-44142
SHA-256 | 9b25509fe631ffce124b1c6daf151996ea9dae6960cdb31b554da6529fc46fb4
Red Hat Security Advisory 2022-0561-01
Posted Feb 24, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0561-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.9.22.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-29923, CVE-2021-36221
SHA-256 | 0e7af326f0f271460b04fc1779109d6262a541fffb8de50ba313da361668f52e
Red Hat Security Advisory 2022-0557-01
Posted Feb 24, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0557-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-29923, CVE-2021-36221
SHA-256 | 2e91b3452fdbc421c55f50de8a4dcf470d0a33611a06ac8632dffe83b77b8e6a
Red Hat Security Advisory 2022-0658-01
Posted Feb 24, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0658-01 - The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer. SASL is a method for adding authentication support to connection-based protocols.

tags | advisory, protocol
systems | linux, redhat
advisories | CVE-2022-24407
SHA-256 | 1f899de6f90fec4d374d03cac15ac5ef7c78f7d8a99a66268ae66792e4a631e7
Red Hat Security Advisory 2022-0661-01
Posted Feb 24, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0661-01 - This release of Red Hat Fuse 7.10.1 serves as a replacement for Red Hat Fuse 7.10, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, deserialization, and remote SQL injection vulnerabilities.

tags | advisory, remote, vulnerability, code execution, sql injection
systems | linux, redhat
advisories | CVE-2021-4104, CVE-2022-23302, CVE-2022-23305, CVE-2022-23307
SHA-256 | f479c300fc79084c051684b2216b5a70471bf4d2ef7a53e18336b4968c31b24c
Simple Mobile Comparison Website 1.0 SQL Injection
Posted Feb 24, 2022
Authored by nu11secur1ty

Simple Mobile Comparison Website version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 695bf39dcd0d3744026fcb148bfc24bfa5cf5578621d80e3431287638536eca1
VMware Security Advisory 2022-0006
Posted Feb 24, 2022
Authored by VMware | Site vmware.com

VMware Security Advisory 2022-0006 - VMware Workspace ONE Boxer update addresses a persistent cross site scripting vulnerability.

tags | advisory, xss
advisories | CVE-2022-22944
SHA-256 | 5a32a12f1a08cf58e9548b3c22be85570f889ee77785c88393248b2b7f9be9fb
Wondershare MirrorGo 2.0.11.346 Insecure File Permissions
Posted Feb 24, 2022
Authored by Luis Martinez

Wondershare MirrorGo version 2.0.11.346 suffers from an insecure permissions vulnerability.

tags | exploit
SHA-256 | 7c357903c71131608d611e554bd946d3f3f155a0d469502402e051e43742df02
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close