what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2022-01-12

Log4Shell HTTP Header Injection
Posted Jan 12, 2022
Authored by sinn3r, Michael Schierl, Spencer McIntyre, juan vazquez | Site metasploit.com

This Metasploit module will exploit an HTTP end point with the Log4Shell vulnerability by injecting a format message that will trigger an LDAP connection to Metasploit and load a payload. The Automatic target delivers a Java payload using remote class loading. This requires Metasploit to run an HTTP server in addition to the LDAP server that the target can connect to. The targeted application must have the trusted code base option enabled for this technique to work. The non-Automatic targets deliver a payload via a serialized Java object. This does not require Metasploit to run an HTTP server and instead leverages the LDAP server to deliver the serialized object. The target application in this case must be compatible with the user-specified JAVA_GADGET_CHAIN option.

tags | exploit, java, remote, web
advisories | CVE-2021-44228
SHA-256 | fb881ade3573c4c3970acc27f51ba1d3ac1aaff25446ea8e525ce3aca4d0ca4d
Proxmark3 4.14831
Posted Jan 12, 2022
Authored by Christian Herrmann | Site github.com

This is a custom firmware written for the Proxmark3 device. It extends the currently available firmware. This release is nicknamed Frostbit.

Changes: This version brings full support of Gallagher DESFire, command autocomplete in client, new standalone modes, and bug fixes.
tags | tool
systems | unix
SHA-256 | 36006cf30c30a533027de851fe9a96593a093e2e03cddf1703aa81940b9bb9a9
Crestron HD-MD4X2-4K-E 1.0.0.2159 Credential Disclosure
Posted Jan 12, 2022
Site redteam-pentesting.de

Crestron HD-MD4X2-4K-E version 1.0.0.2159 suffers from a credential disclosure vulnerability. When the administrative web interface of the Crestron HDMI switcher is accessed unauthenticated, user credentials are disclosed which are valid to authenticate to the web interface.

tags | exploit, web
advisories | CVE-2022-23178
SHA-256 | 2cdcf800ce58540afa4f5cf6fc99e149ababce5250885bbed00e0cc15d0c8f70
Ubuntu Security Notice USN-5225-1
Posted Jan 12, 2022
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 5225-1 - It was discovered that lxml incorrectly handled certain XML and HTML files. An attacker could possibly use this issue to execute arbitrary code.

tags | advisory, arbitrary
systems | linux, ubuntu
advisories | CVE-2021-43818
SHA-256 | 111c525b7c9322f2745be34576bb382936329f2efb2b527c225ddc974a2572d7
Ubuntu Security Notice USN-5224-1
Posted Jan 12, 2022
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 5224-1 - It was discovered that Ghostscript incorrectly handled certain PostScript files. If a user or automated system were tricked into processing a specially crafted file, a remote attacker could possibly use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2021-45944
SHA-256 | 24ad327510e8f49e04073b77dbbe1ec1e7ddf2d663af9f190eb187869b4a92dc
Red Hat Security Advisory 2022-0072-05
Posted Jan 12, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0072-05 - The kernel packages contain the Linux kernel, the core of any Linux operating system.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2020-36322
SHA-256 | db0c1d9fb0fadbe8bf92ab5570f32acd96d76cb09a70a3a73352fec7efca0658
Red Hat Security Advisory 2022-0065-05
Posted Jan 12, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0065-05 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, kernel
systems | linux, redhat
advisories | CVE-2020-25704, CVE-2020-36322, CVE-2021-42739
SHA-256 | 40e4a0ec6d21c586409f55a567705f5d041db004a9c79906afa098e121353a07
Red Hat Security Advisory 2022-0075-03
Posted Jan 12, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0075-03 - WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Issues addressed include code execution and use-after-free vulnerabilities.

tags | advisory, web, vulnerability, code execution
systems | linux, redhat
advisories | CVE-2021-30858
SHA-256 | 3719291aaf7e31a07ab6664ae487b616f0ae4dfe2dd92c9873d71a0d324490c0
Red Hat Security Advisory 2022-0076-03
Posted Jan 12, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0076-03 - Red Hat Identity Management is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-25719
SHA-256 | f34aa13db584b198989ec88113b005c89876833a002fd516acb370e73c659553
Red Hat Security Advisory 2022-0078-04
Posted Jan 12, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0078-04 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2020-36322
SHA-256 | d1130001d6743536e17d1f412bacaa8c6bbd388276846e49b256ee9437cb87e8
Red Hat Security Advisory 2022-0081-03
Posted Jan 12, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0081-03 - The Advanced Virtualization module provides the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-20257, CVE-2021-3930
SHA-256 | ed2aa200711dad8069fe7e18296db0ca281fe1d5f8e59fd39f90bfeb17cac0c3
Red Hat Security Advisory 2022-0082-01
Posted Jan 12, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0082-01 - Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services. This release of Red Hat Process Automation Manager 7.11.1 serves as an update to Red Hat Process Automation Manager 7.11.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2021-44228
SHA-256 | a92a8bec4e4bb08b576106882778eec3289082354d6ea4d7e170ec45c4a09d7a
Red Hat Security Advisory 2022-0073-02
Posted Jan 12, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0073-02 - The cpio packages provide the GNU cpio utility for creating and extracting archives, or copying files from one place to another.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-14866
SHA-256 | df53c246da972f560f9a2aa42d41fa8438516c3a2fc0295342aa1f6ed2b1c3f8
Red Hat Security Advisory 2022-0064-02
Posted Jan 12, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0064-02 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library.

tags | advisory, protocol
systems | linux, redhat
advisories | CVE-2021-3712
SHA-256 | 864bb2902300ac462339d439cb2ee5f229a9df235da8c7da659952dbcd2eb8bb
Red Hat Security Advisory 2022-0059-03
Posted Jan 12, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0059-03 - WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. Issues addressed include code execution and use-after-free vulnerabilities.

tags | advisory, web, vulnerability, code execution
systems | linux, redhat
advisories | CVE-2021-30858
SHA-256 | 7ea78cedc610b96d2b09e66441450b9b5966b969e4b6258e9c87fac6ae033798
Ubuntu Security Notice USN-5222-1
Posted Jan 12, 2022
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 5222-1 - It was discovered that Apache Log4j 2 was vulnerable to remote code execution attack when configured to use a JDBC Appender with a JNDI LDAP data source URI. A remote attacker could possibly use this issue to cause a crash, leading to a denial of service. Hideki Okamoto and Guy Lederfein discovered that Apache Log4j 2 did not protect against infinite recursion in lookup evaluation. A remote attacker could possibly use this issue to cause Apache Log4j 2 to crash, leading to a denial of service. This issue only affected Ubuntu 18.04 LTS.

tags | advisory, remote, denial of service, code execution
systems | linux, ubuntu
advisories | CVE-2021-44832, CVE-2021-45105
SHA-256 | ee5846a036c0891754e7ed626465c8bd6a55f3bf5eeff467765c614fef6b1fd6
WordPress Frontend Uploader 1.3.2 Cross Site Scripting
Posted Jan 12, 2022
Authored by Veshraj Ghimire

WordPress Frontend Uploader plugin version 1.3.2 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2021-24563
SHA-256 | 31fdddd89c8c546e099a752449bf6d534e404e26ed3609d80d15dbb37db02350
DMCA.com Improper Access Control / Cross Site Scripting
Posted Jan 12, 2022
Authored by Joel Aviad Ossi | Site websec.nl

DMCA.com suffers from improper access control, persistent cross site scripting, and improper input validation vulnerabilities.

tags | exploit, vulnerability, xss, bypass
SHA-256 | f9c2e08984f6bc9930ffb841c085d3f0b8e12d90c94c81c7a3fe48baafd08bd8
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close