exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 33 RSS Feed

Files Date: 2024-08-15

Debian Security Advisory 5749-1
Posted Aug 15, 2024
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5749-1 - Chris Williams discovered a flaw in the handling of mounts for persistent directories in Flatpak, an application deployment framework for desktop apps. A malicious or compromised Flatpak app using persistent directories could take advantage of this flaw to access files outside of the sandbox.

tags | advisory
systems | linux, debian
advisories | CVE-2024-42472
SHA-256 | 49a4d77eea8ea35889feae10e2fadeec7696c09090cf0416837385589db5c828
LG Simple Editor 3.21.0 Command Injection
Posted Aug 15, 2024
Authored by rgod, Michael Heinzl | Site metasploit.com

LG Simple Editor versions 3.21.0 and below suffer from an unauthenticated command injection vulnerability. The vulnerability can be exploited by a remote attacker to inject arbitrary operating system commands which will get executed in the context of NT AUTHORITY\SYSTEM.

tags | exploit, remote, arbitrary
advisories | CVE-2023-40504
SHA-256 | 1545a24bd538b0cf083c22f759cc58d69ea50fc039903cf220c2e8a20cefba46
OpenMetadata 1.2.3 Authentication Bypass / SpEL Injection
Posted Aug 15, 2024
Authored by Alvaro Munoz, h00die-gr3y | Site metasploit.com

This Metasploit module exploits OpenMetadata versions 1.2.3 and below by chaining an API authentication bypass using JWT tokens along with a SpEL injection vulnerability to achieve arbitrary command execution.

tags | exploit, arbitrary
advisories | CVE-2024-28254, CVE-2024-28255
SHA-256 | 713b618c2038aeb7f9469836947b05f8ccdf1cf0b8060c24f46869e85e9e93cd
Apache HugeGraph Gremlin Remote Code Execution
Posted Aug 15, 2024
Authored by jheysel-r7, 6right | Site metasploit.com

This Metasploit module exploits CVE-2024-27348, a remote code execution vulnerability that exists in Apache HugeGraph Server in versions before 1.3.0. An attacker can bypass the sandbox restrictions and achieve remote code execution through Gremlin, resulting in complete control over the server.

tags | exploit, remote, code execution
advisories | CVE-2024-27348
SHA-256 | b97d3ebb5977b249d01dc6eda8963e68e3e2fb294c007a301ee0a7f467c4e02d
Ubuntu Security Notice USN-6961-1
Posted Aug 15, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6961-1 - It was discovered that BusyBox did not properly validate user input when performing certain arithmetic operations. If a user or automated system were tricked into processing a specially crafted file, an attacker could possibly use this issue to cause a denial of service, or execute arbitrary code. It was discovered that BusyBox incorrectly managed memory when evaluating certain awk expressions. An attacker could possibly use this issue to cause a denial of service, or execute arbitrary code. This issue only affected Ubuntu 24.04 LTS.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2022-48174
SHA-256 | 032e3b951d2c4a3d5616153f6ad7f551b1b064e6766e37c7e54cc6e5d999d625
Clam AntiVirus Toolkit 1.4.0
Posted Aug 15, 2024
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software. This is the LTS source code release.

Changes: Added support for extracting ALZ archives. Added support for extracting LHA/LZH archives. Added the ability to disable image fuzzy hashing, if needed. Added cross-compiling instructions for targeting ARM64/aarch64 processors for Windows. Improved the Freshclam warning messages when. Various other updates and modifications.
tags | tool, virus
systems | unix
SHA-256 | d67ab299e5ca05dad3da299a5ea73d60209372a5becd7f13b9a33c290338a4e6
GNU Transport Layer Security Library 3.8.7.1
Posted Aug 15, 2024
Authored by Simon Josefsson, Nikos Mavrogiannopoulos | Site gnu.org

GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.

Changes: New configure option to compile out DSA support in libgnutls. Experimental support added for X25519Kyber768Draft00 key exchange in TLS in libgnutls. No modifications to API or ABI.
tags | protocol, library
SHA-256 | 9ca0ddaccce28a74fa18d738744190afb3b0daebef74e6ad686bf7bef99abd60
Red Hat Security Advisory 2024-5418-03
Posted Aug 15, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-5418-03 - An update for bind9.16 is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-1737
SHA-256 | c7d702e6f25f2c9be85e5d742c89a8b129957d7a6edb735119b0adcf87546676
Red Hat Security Advisory 2024-5411-03
Posted Aug 15, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-5411-03 - An update for OpenShift Jenkins is now available for Red Hat Product OCP Tools 4.14. Red Hat Product Security has rated this update as having a security impact of critical. A Common Vulnerability Scoring System base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link in the References section.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-43044
SHA-256 | 068e4971be0ae9f67e2e1098b8d7d7b931eec474ff5000fc99f1fd09a52b5db5
Feberr 13.4 Insecure Settings
Posted Aug 15, 2024
Authored by indoushka

Feberr version 13.4 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | 2e393c441ce609493774dac1c3e5f681c5ce98d1b3702bb114041fdb03335768
Red Hat Security Advisory 2024-5410-03
Posted Aug 15, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-5410-03 - An update for OpenShift Jenkins is now available for Red Hat Product OCP Tools 4.12. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link in the References section.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-43044
SHA-256 | eb18e0ae04d57031458b02850dcf16f3d15d47b1f69b7c3e2bd0ce55d7adfc56
Ubuntu Security Notice USN-6960-1
Posted Aug 15, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6960-1 - Nick Browning discovered that RMagick incorrectly handled memory under certain operations. An attacker could possibly use this issue to cause a denial of service through memory exhaustion.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2023-5349
SHA-256 | d8fb4e58635a7b08d39335638b93c2207f742867e7703c2b45154b56063f9b45
Farmacia Gama 1.0 Cross Site Scripting
Posted Aug 15, 2024
Authored by indoushka

Farmacia Gama version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 2caf36ad25ddb5e5fcd4a26fd8ac2e62e0dee3d76fbd95e698130d2b8730632e
Red Hat Security Advisory 2024-5406-03
Posted Aug 15, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-5406-03 - An update for OpenShift Jenkins is now available for Red Hat Product OCP Tools 4.13. Red Hat Product Security has rated this update as having a security impact of critical. A Common Vulnerability Scoring System base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link in the References section.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-43044
SHA-256 | ebc166c50f26fb0b417e894435c5b45a9476ead6a4e3b5918dbe1f7abdb30746
Ecommerce 1.15 Insecure Settings
Posted Aug 15, 2024
Authored by indoushka

Ecommerce version 1.15 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | 58fa74be204710f788c9686f571d322e9e021b828a468d977d0fd4a321e926aa
Red Hat Security Advisory 2024-5405-03
Posted Aug 15, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-5405-03 - An update for OpenShift Jenkins is now available for Red Hat Product OCP Tools 4.15. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link in the References section.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-43044
SHA-256 | 663a4609326d571bebbb166ff0bf2010076f838204e7b0ccdd0d93918af8667b
Ubuntu Security Notice USN-6951-2
Posted Aug 15, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6951-2 - Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.

tags | advisory, kernel
systems | linux, ubuntu
advisories | CVE-2022-48674, CVE-2023-52434, CVE-2023-52752, CVE-2024-27398, CVE-2024-27401, CVE-2024-31076, CVE-2024-33621, CVE-2024-35947, CVE-2024-35976, CVE-2024-36014, CVE-2024-36015, CVE-2024-36286, CVE-2024-36883, CVE-2024-36886
SHA-256 | 40333bcb6bfcef7ef0b04b1f7dd14dc7bd1927d82916fa3e2c056ec935a480dd
Covid-19 Contact Tracing System 1.0 Cross Site Scripting
Posted Aug 15, 2024
Authored by indoushka

Covid-19 Contact Tracing System version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | daa17a59d2ea2f605f71d11b3ba6860a33f90c5ea08d666ce8a3af42e59af5fa
Red Hat Security Advisory 2024-5402-03
Posted Aug 15, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-5402-03 - An update for thunderbird is now available for Red Hat Enterprise Linux 8. Issues addressed include out of bounds read and use-after-free vulnerabilities.

tags | advisory, vulnerability
systems | linux, redhat
advisories | CVE-2024-7518
SHA-256 | 87f6e5a9338154d5d05e5c0879da5ab7e24370cf7ca44814bc7c8a909cf40b4c
Red Hat Security Advisory 2024-5396-03
Posted Aug 15, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-5396-03 - An update for thunderbird is now available for Red Hat Enterprise Linux 9.2 Extended Update Support. Issues addressed include out of bounds read and use-after-free vulnerabilities.

tags | advisory, vulnerability
systems | linux, redhat
advisories | CVE-2024-7518
SHA-256 | dfedab7cda430f6109fa56dadc489bc25762e6c1275dd075d77106e1bffded6f
Car Rental Management System 1.0 Cross Site Scripting
Posted Aug 15, 2024
Authored by indoushka

Car Rental Management System version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5fa10fefdc9cde30dce20a655fe24cebef24d4c036fcbee0b4bb1c708bc895ed
BloodBank 1.1 Insecure Settings
Posted Aug 15, 2024
Authored by indoushka

BloodBank version 1.1 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | e7484cc3dee661f45c55f97b4e23233108b80b1c4fe04adf3e05b62052052b97
Red Hat Security Advisory 2024-5395-03
Posted Aug 15, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-5395-03 - An update for thunderbird is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions. Issues addressed include out of bounds read and use-after-free vulnerabilities.

tags | advisory, vulnerability
systems | linux, redhat
advisories | CVE-2024-7518
SHA-256 | 46a7b8e3d0be756d884c46e1b9b7654fe5d640c70be8175dd7eeda94436f54de
Bhojon Restaurant Management System 2.9 Insecure Settings
Posted Aug 15, 2024
Authored by indoushka

Bhojon Restaurant Management System version 2.9 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | d6e06dde4900dda1d73c9d43d3fd7bdc675753e54128cdc173c7bd195c2bae96
FlatPress 1.3.1 Path Traversal
Posted Aug 15, 2024
Authored by indoushka

FlatPress version 1.3.1 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 93132facf1686cadc1ae8f70b92c43ad1314fd717d542ca0f3d2460a2af23e80
Page 1 of 2
Back12Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close