exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2024-11-07

Red Hat Security Advisory 2024-8690-03
Posted Nov 7, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-8690-03 - Red Hat OpenShift Container Platform release 4.13.53 is now available with updates to packages and images that fix several bugs and add enhancements. Issues addressed include denial of service and traversal vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
advisories | CVE-2024-9341
SHA-256 | 59bcb81375a80ff3531481dee82043f601f2c96c069d194dd3c82c2d409d30c4
WordPress Meetup 0.1 Authentication Bypass
Posted Nov 7, 2024
Site github.com

WordPress Meetup plugin versions 0.1 and below suffer from an authentication bypass vulnerability.

tags | exploit, bypass
advisories | CVE-2024-50483
SHA-256 | 89ac429be4764b94bf641a570c41c31bddf5b9a683ddf1aeac67f0ca453b0bb8
CyberPanel upgrademysqlstatus Arbitrary Command Execution
Posted Nov 7, 2024
Site github.com

Proof of concept remote command execution exploit for CyberPanel versions prior to 5b08cd6.

tags | exploit, remote, proof of concept
advisories | CVE-2024-51567
SHA-256 | cc940e99f4e4ef4ac83ab7b84fe7d3f90ff95549ed54049913abec4f7582bf85
Ubuntu Security Notice USN-7088-4
Posted Nov 7, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7088-4 - Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux kernel contained an integer overflow vulnerability. A local attacker could use this to cause a denial of service. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.

tags | advisory, denial of service, overflow, kernel, local
systems | linux, ubuntu
advisories | CVE-2021-47212, CVE-2022-36402, CVE-2023-52531, CVE-2023-52918, CVE-2024-26668, CVE-2024-26669, CVE-2024-26891, CVE-2024-27051, CVE-2024-38602, CVE-2024-40929, CVE-2024-41011, CVE-2024-41012, CVE-2024-41015, CVE-2024-41022
SHA-256 | d8177c3b5ff3c3d3fda97932c7f3da74d07c7efb90a9240a35307b994d06b627
Ubuntu Security Notice USN-7095-1
Posted Nov 7, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7095-1 - Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2023-52887, CVE-2023-52888, CVE-2024-25741, CVE-2024-39487, CVE-2024-41010, CVE-2024-41012, CVE-2024-41015, CVE-2024-41017, CVE-2024-41018, CVE-2024-41020, CVE-2024-41022, CVE-2024-41023, CVE-2024-41025, CVE-2024-41030
SHA-256 | a4c004e708b8e009bd474230b3de263f849417dad8771ca66e1ac6f371604336
Ubuntu Security Notice USN-7089-3
Posted Nov 7, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7089-3 - Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A local attacker could possibly use this to cause a denial of service. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2023-52887, CVE-2023-52888, CVE-2024-25741, CVE-2024-39487, CVE-2024-41010, CVE-2024-41015, CVE-2024-41020, CVE-2024-41021, CVE-2024-41025, CVE-2024-41027, CVE-2024-41028, CVE-2024-41030, CVE-2024-41034, CVE-2024-41037
SHA-256 | 10729d56a83995eb3098226ea10515d8f81f274ad50de359cbac115b9ca988c3
TestRail CLI FieldsParser eval Injection
Posted Nov 7, 2024

While parsing test result XML files with the TestRail CLI, the presence of certain TestRail-specific fields can cause untrusted data to flow into an eval() statement, leading to arbitrary code execution. In order to exploit this, an attacker would need to be able to cause the TestRail CLI to parse a malicious XML file. Normally an attacker with this level of control would already have other avenues of gaining code execution.

tags | exploit, arbitrary, code execution
SHA-256 | 23defc505c60d8487fbaa6cc446dcdfe879f30097f49592151de5e51f416f7ff
Red Hat Security Advisory 2024-8977-03
Posted Nov 7, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-8977-03 - An update for the python39:3.9 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-6232
SHA-256 | f3f1e97a24dd2ea06fa00a3d50d3e41636cbc30cceb3055348871b1f56f13000
Red Hat Security Advisory 2024-8694-03
Posted Nov 7, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-8694-03 - Red Hat OpenShift Container Platform release 4.12.68 is now available with updates to packages and images that fix several bugs and add enhancements. Issues addressed include denial of service and traversal vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
advisories | CVE-2024-9341
SHA-256 | cfc95fcddcb056c4904e248f0096a0c29027218a4d80eb9e1d73314e513098b0
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close