This is a vulnerability detection and exploitation tool design to take in a list of targets and check for the arbitrary file read vulnerability in Check Point Security Gateways.
d575146be656412f5d17d26c369d9200409d3065c0231f09c6d7c748bf983278
Proof of concept exploit for Check Point Security Gateways that allows an unauthenticated remote attacker to read the contents of an arbitrary file located on the affected appliance.
7bb4866aa20c857a3bde162427591e069c170227d7fad3568d19f0f03e9a2e1e
Debian Linux Security Advisory 5703-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
1476333bf5c1e2baed03920f541d970630980c5dab7ff43468471a8a13244d8e
Debian Linux Security Advisory 5702-1 - An integer overflow in the EXIF metadata parsing was discovered in the GStreamer media framework, which may result in denial of service or potentially the execution of arbitrary code if a malformed file is processed.
49549d83b64002c3eecffa31a3c209c6e5c93494c0d9069cb4e8a66a6873588a
Debian Linux Security Advisory 5701-1 - Security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.
02fed5c43638fe4ae91ef3bc5445fdecf0491a21def3562d073c512f4e018893
Employee and Visitor Gate Pass Logging System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
9c936df9aedfba4ee02079a19110a8da4a419eb7463d59ebef4165413ade5ad5
FreePBX suffers from a remote code execution vulnerability. Versions 14, 15, and 16 are all affected.
8a76cbe87b89aed2980170456b99fdd949a2de334f092d279c5e92f4439320cf
Sitefinity version 15.0 suffers from a persistent cross site scripting vulnerability.
e3828dd1dfdea72d17946ff9f4387ec885ff60da39add68c558e1ebdc4eb08ba
Red Hat Security Advisory 2024-3530-03 - An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Issues addressed include a use-after-free vulnerability.
ed09e0573d4a0572af0fa640d2e2b2f34a230591c27dc2da0471536d664ee93f
Red Hat Security Advisory 2024-3529-03 - An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Issues addressed include a use-after-free vulnerability.
a8cf916ee8a4e394ad0a8a63906c83d748d4688eec5248523a8e0672bdcee86c
Red Hat Security Advisory 2024-3528-03 - An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support. Issues addressed include null pointer and use-after-free vulnerabilities.
11dbcdd57869cfb7f238e07fae0ca544abaa4ca6f7ff75bd067219be202eee13
Red Hat Security Advisory 2024-3349-03 - Red Hat OpenShift Container Platform release 4.12.58 is now available with updates to packages and images that fix several bugs and add enhancements.
32a9d79aeb2244051df3b0c11bba093fa1747407d1a53136390eafccf1ed9683
appRain CMF version 4.0.5 suffers from a remote shell upload vulnerability.
150b0bf28e81180f2bea66aa77d9ae646c69f2c2d09640f9ef3477d1cdf70df0
CMSimple version 5.15 suffers from a remote shell upload vulnerability.
f740b3160f11b64153001e8b65b4b9a4f4d16802360708386c3dab3810a647b4
Monstra CMS version 3.0.4 suffers from a remote code execution vulnerability. Original discovery of code execution in this version is attributed to Ishaq Mohammed in December of 2017.
ecdaacc5d64c3df6a515bd411fa2cd1b164854a39e01dce8606349d6e5669d56
Dotclear version 2.29 suffers from a remote code execution vulnerability.
81b7d1534691862ca5b2ef7344f06090a593b246e528201acda3e1a7ba2b027c
WBCE CME version 1.6.2 suffers from a remote code execution vulnerability.
d8bc0f70b106171c6c0f3fd81661377e48a23799e2d26e12b200383fd6bd587a
Serendipity version 2.5.0 suffers from a remote code execution vulnerability.
991539511b03067d0e9782280ba1d5e5d8e51fe07d86878d4a2937f13f0904ba