what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 135,173 RSS Feed

Files

Ubuntu Security Notice USN-7017-1
Posted Sep 18, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7017-1 - Iggy Frankovic discovered that Quagga incorrectly handled certain BGP messages. A remote attacker could possibly use this issue to cause Quagga to crash, resulting in a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2024-44070
SHA-256 | 5de28707d33411664b92640aa20a05b15c3f1883532c98f677b861e05322fb02
Ubuntu Security Notice USN-7016-1
Posted Sep 18, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7016-1 - Iggy Frankovic discovered that FRR incorrectly handled certain BGP messages. A remote attacker could possibly use this issue to cause FRR to crash, resulting in a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2024-44070
SHA-256 | c16b067412f887ca443d01cd624f103aea4a4b7ba0c3c6ee59cf33092e6de7a9
Membership Management System 1.1 SQL Injection
Posted Sep 18, 2024
Authored by indoushka

Membership Management System version 1.1 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection, bypass
SHA-256 | 6a15cdedf00f0b752cebff83c346b7c042814e903684ee4884b3896ad044391b
HYSCALE System 1.9 Add Administrator / Cross Site Request Forgery
Posted Sep 18, 2024
Authored by indoushka

HYSCALE System version 1.9 suffers from add administrator and cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | be1be6516ccdabbe67428de5ef0e49fca374004dda69f00f5fe8c675baa3d990
Furniture Master 2 SQL Injection
Posted Sep 18, 2024
Authored by indoushka

Furniture Master version 2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | de62e37b3de6cb06ff4294692fa90d5dbfd158a0153c79993900f1fcc28b6789
Food Ordering And Table Reservation System For Restaurants 1.0 Insecure Settings
Posted Sep 18, 2024
Authored by indoushka

Food Ordering and Table Reservation System for Restaurants version 1.0 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | bc2fab72834ac56fe6948d05d57dea4c287fd8500fe999daf8cd8d910200f7a3
Beauty Parlour And Saloon Management System 1.1 Insecure Settings
Posted Sep 18, 2024
Authored by indoushka

Beauty Parlour and Saloon Management System version 1.1 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | d6660c1c6980ef3268d1a22cf2f264a4cca0ec4b56c1477c7fef4007d4b6424a
Microsoft Windows TOCTOU Local Privilege Escalation
Posted Sep 17, 2024
Authored by jheysel-r7, tykawaii98 | Site metasploit.com

CVE-2024-30088 is a Windows kernel elevation of privilege vulnerability which affects many recent versions of Windows 10, Windows 11 and Windows Server 2022. The vulnerability exists inside the function called AuthzBasepCopyoutInternalSecurityAttributes specifically when the kernel copies the _AUTHZBASEP_SECURITY_ATTRIBUTES_INFORMATION of the current token object to user mode. When the kernel performs the copy of the SecurityAttributesList, it sets up the list of the SecurityAttributes structure directly to the user supplied pointed. It then calls RtlCopyUnicodeString and AuthzBasepCopyoutInternalSecurityAttributeValues to copy out the names and values of the SecurityAttribute leading to multiple Time Of Check Time Of Use (TOCTOU) vulnerabilities in the function.

tags | exploit, kernel, vulnerability
systems | windows
advisories | CVE-2024-30038
SHA-256 | a4e521839032a10c16e91b79eb43b6f9620dcc27482be434b0d2b62d5ac92e66
WordPress LiteSpeed Cache Cookie Theft
Posted Sep 17, 2024
Authored by jheysel-r7, Rafie Muhammad | Site metasploit.com

This Metasploit module exploits an unauthenticated account takeover vulnerability in LiteSpeed Cache, a WordPress plugin that currently has around 6 million active installations. In LiteSpeed Cache versions prior to 6.5.0.1, when the Debug Logging feature is enabled, the plugin will log admin cookies to the /wp-content/debug.log endpoint which is accessible without authentication. The Debug Logging feature in the plugin is not enabled by default. The admin cookies found in the debug.log can be used to upload and execute a malicious plugin containing a payload.

tags | exploit
advisories | CVE-2024-44000
SHA-256 | 6e09b750ae1a9a0b2b8f3c6e3aa95c6c27115a13bd3431b2f9fa3155e9f1d346
GibbonEdu Core 26.0.00 Cross Site Scripting
Posted Sep 17, 2024
Authored by enzored | Site github.com

GibbonEdu Core version 26.0.00 suffers from a cross site scripting vulnerability that can lead to privilege escalation.

tags | exploit, xss
advisories | CVE-2024-34831
SHA-256 | 55a116c03d9b7b070c43d09aaf32571f24950ed2afe7ec231624d9fb0a220996
TP-Link Archer AX50 Cross Site Scripting
Posted Sep 17, 2024
Authored by hacefresko | Site github.com

TP-Link Archer AX50 router with firmware version 1.0.11 build 2022052 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2024-2188
SHA-256 | 25ff26ec2bb983142b60be6c6850961636a672ee8e4a79e14449322abbb2d5cc
HTMLy 2.9.9 Cross Site Scripting
Posted Sep 17, 2024
Authored by Andrey Stoykov | Site msecureltd.blogspot.com

HTMLy version 2.9.9 suffers from a persistent cross site scripting vulnerability that can lead to account takeover.

tags | exploit, xss
SHA-256 | 6bb08fb3fda4692b34b179dbafc8e6a3f67eca89052852c0d0f06bb6f11cdaa8
Dockwatch Remote Command Execution
Posted Sep 17, 2024
Authored by Jeremy Brown

Dockwatch is a container management web UI for docker. It runs by default without authentication, although guidance is available for how to setup credentials for access. It has a Commands feature that allows a user to run docker commands such as inspect, network, ps. Prior to fix, it did not restrict input for parameters, so both container and parameters for the dockerInspect command were vulnerable to shell command injection on the container as the abc user with (limited) command output. See commits 23df366 and c091e4c for fixes.

tags | exploit, web, shell
SHA-256 | 4dc88e4bbab7011783c0ecfab89efa0414dbb5928fb33b19bb6580f2eaabe3c2
Ubuntu Security Notice USN-7001-2
Posted Sep 17, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7001-2 - USN-7001-1 fixed vulnerabilities in xmltol library. This update provides the corresponding updates for Ubuntu 24.04 LTS. Shang-Hung Wan discovered that Expat, contained within the xmltok library, did not properly handle certain function calls when a negative input length was provided. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, ubuntu
advisories | CVE-2024-45490, CVE-2024-45491
SHA-256 | e8e28f2f9097ce08c9631f1af9eb47b3fb56c0e9466585153477ebbeb1f2ce61
Apple Security Advisory 09-16-2024-10
Posted Sep 17, 2024
Authored by Apple | Site apple.com

Apple Security Advisory 09-16-2024-10 - macOS Ventura 13.7 addresses buffer overflow, bypass, out of bounds access, out of bounds read, and spoofing vulnerabilities.

tags | advisory, overflow, spoof, vulnerability
systems | apple
advisories | CVE-2024-27876, CVE-2024-27886, CVE-2024-40791, CVE-2024-40797, CVE-2024-40814, CVE-2024-40844, CVE-2024-40847, CVE-2024-40848, CVE-2024-40850, CVE-2024-44128, CVE-2024-44129, CVE-2024-44151, CVE-2024-44158, CVE-2024-44160
SHA-256 | 83bec15ab00978bb0f11e5f9e97e565cb578510b79514deba529887e8947a015
MSI Analyzer
Posted Sep 17, 2024
Authored by Michael Baer | Site github.com

This Python script for Linux can analyze Microsoft Windows .msi Installer files and point out potential vulnerabilities.

tags | vulnerability, python
systems | linux, windows
SHA-256 | 5acb6c6d8634611b63c2c7dbe9d099afc2807b183f5f065ed3557bc52c57aa7d
Red Hat Security Advisory 2024-6726-03
Posted Sep 17, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6726-03 - An update for fence-agents is now available for Red Hat Enterprise Linux 9.4 Extended Update Support. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2024-6345
SHA-256 | 8da1af33ccd27fdce30013232ee0f14bc2b96116f470eac2a05cf2734e08afbe
Apple Security Advisory 09-16-2024-9
Posted Sep 17, 2024
Authored by Apple | Site apple.com

Apple Security Advisory 09-16-2024-9 - macOS Sonoma 14.7 addresses buffer overflow, bypass, out of bounds access, out of bounds read, out of bounds write, and spoofing vulnerabilities.

tags | advisory, overflow, spoof, vulnerability
systems | apple
advisories | CVE-2024-27876, CVE-2024-27880, CVE-2024-40791, CVE-2024-40797, CVE-2024-40801, CVE-2024-40841, CVE-2024-40844, CVE-2024-40845, CVE-2024-40846, CVE-2024-40847, CVE-2024-40848, CVE-2024-40850, CVE-2024-40860, CVE-2024-44125
SHA-256 | 8c7c598c2151ce639d355f21defbebd09be8b2089b0d7ca88eaa2eab7d02cc0a
Ubuntu Security Notice USN-7011-2
Posted Sep 17, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7011-2 - USN-7011-1 fixed several vulnerabilities in ClamAV. This update provides the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. It was discovered that ClamAV incorrectly handled certain PDF files. A remote attacker could possibly use this issue to cause ClamAV to crash, resulting in a denial of service.

tags | advisory, remote, denial of service, vulnerability
systems | linux, ubuntu
advisories | CVE-2024-20505, CVE-2024-20506
SHA-256 | 8eab588cda40b015f2993c6befd64881bea3df23eba9fc2f37d8135f1ca86eb5
Red Hat Security Advisory 2024-6723-03
Posted Sep 17, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6723-03 - An update for thunderbird is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-7652
SHA-256 | a8c871abfcdf00df34c3a055130cd59682a642cba44f2eef56e53f98b415d5c2
Red Hat Security Advisory 2024-6722-03
Posted Sep 17, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6722-03 - An update for thunderbird is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-7652
SHA-256 | bc990a117e524d785b33bafdfa035a954c557ee4cc0585dd70b456feb3b70148
Red Hat Security Advisory 2024-6721-03
Posted Sep 17, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6721-03 - An update for thunderbird is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-7652
SHA-256 | 3b884d8963ac1b4827a95580bdbd6a3af1fa012cb4d849a2d15cdf9cc5091c28
Ubuntu Security Notice USN-7015-1
Posted Sep 17, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7015-1 - It was discovered that the Python email module incorrectly parsed email addresses that contain special characters. A remote attacker could possibly use this issue to bypass certain protection mechanisms. It was discovered that Python allowed excessive backtracking while parsing certain tarfile headers. A remote attacker could possibly use this issue to cause Python to consume resources, leading to a denial of service.

tags | advisory, remote, denial of service, python
systems | linux, ubuntu
advisories | CVE-2023-27043, CVE-2024-6232, CVE-2024-6923, CVE-2024-7592, CVE-2024-8088
SHA-256 | 0224b04ebdd855ff165cab147873523db9bc82d1b5c8fdecef438adbabb325b4
Ubuntu Security Notice USN-7010-1
Posted Sep 17, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7010-1 - Jinsheng Ba discovered that DCMTK incorrectly handled certain requests. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS. Sharon Brizinov and Noam Moshe discovered that DCMTK incorrectly handled pointers. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2021-41687, CVE-2022-2121, CVE-2022-43272, CVE-2024-28130, CVE-2024-34509
SHA-256 | c9f04b5ecfe6737ab3cb550780a5ecb52fe8dfc68f3c8b7ca996331ca6ac4f3f
Apple Security Advisory 09-16-2024-8
Posted Sep 17, 2024
Authored by Apple | Site apple.com

Apple Security Advisory 09-16-2024-8 - iOS 17.7 and iPadOS 17.7 addresses bypass, out of bounds access, and out of bounds read vulnerabilities.

tags | advisory, vulnerability
systems | apple, ios
advisories | CVE-2024-27876, CVE-2024-27879, CVE-2024-27880, CVE-2024-40791, CVE-2024-40844, CVE-2024-40850, CVE-2024-44127, CVE-2024-44158, CVE-2024-44164, CVE-2024-44165, CVE-2024-44169, CVE-2024-44171, CVE-2024-44176, CVE-2024-44183
SHA-256 | 4993b0fd28e2f9894d9a7a6b11b76fd5ab68a695255e84e47ffc88d2865ddeaf
Page 5 of 5,407
Back34567Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close