exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2022-10-24

Debian Security Advisory 5260-1
Posted Oct 24, 2022
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5260-1 - Igor Ponomarev discovered that LAVA, a continuous integration system for deploying operating systems onto physical and virtual hardware for running tests, used exec() on input passed to the server component.

tags | advisory
systems | linux, debian
advisories | CVE-2022-42902
SHA-256 | 8d7af12785c3d0a89415518ecb456a32bb0666b172393a6eaaa1cb90b13d69d5
Backdoor.Win32.Psychward.10 MVID-2022-0651 Remote Command Execution
Posted Oct 24, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Psychward.10 malware suffers from an unauthenticated remote command execution vulnerability.

tags | exploit, remote
systems | windows
SHA-256 | 50c8d45b439f940960ae1c8f607103a266bf0e358d5a088cf19752880f976bdf
Red Hat Security Advisory 2022-7077-01
Posted Oct 24, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-7077-01 - Updated CVE security packages are now available for Red Hat Certificate System 9.7.

tags | advisory
systems | linux, redhat
advisories | CVE-2022-2393
SHA-256 | deb0ecc95b22487376a970df9720990c59ed4f4999353b017efc609b30d2e8b3
MutableSecurity 0.4.0
Posted Oct 24, 2022
Authored by MutableSecurity | Site mutablesecurity.io

MutableSecurity is a Linux CLI program for making cybersecurity solution management easier and more accessible, from deployment and configuration to monitoring. It supports multiple solutions (teler as web IDS, Fail2ban as host IPS, Let's Encrypt for generating SSL certificates, and ClamAV as antimalware), password-based and key-based SSH authentication, and parallel deployment to multiple remote hosts.

Changes: Adds support for Let's Encrypt x Certbot and ClamAV.
tags | tool, remote, web
systems | linux, unix
SHA-256 | d3847e2b262ecf876f62497edbddf483e0a440a5a45baaabc6a3e5663502e780
Email-Worm.Win32.Kipis.c MVID-2022-0652 File Write / Code Execution
Posted Oct 24, 2022
Authored by malvuln | Site malvuln.com

Email-Worm.Win32.Kipis.c malware suffers from a remote file write vulnerability that allows for remote code execution.

tags | exploit, worm, remote, code execution
systems | windows
SHA-256 | a928474123c62826be6937b0f16cc3bd810a092305c80c11b1dba87312f0d8be
Debian Security Advisory 5257-2
Posted Oct 24, 2022
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5257-2 - The security update announced as DSA 5257-1 caused regressions on certain systems using the amdgpu driver. Updated packages are now available to correct this issue.

tags | advisory
systems | linux, debian
SHA-256 | 31df1a13a472fb9920be07dd6def1cfe5cc5fa4533aedbce2d08deabd63b4e3c
Pega Platform 8.7.3 Remote Code Execution
Posted Oct 24, 2022
Authored by Marcin Wolak

Pega Platform versions 8.1.0 through 8.7.3 suffer from a remote code execution vulnerability. If an on-premise installation of the Pega Platform is configured with the port for the JMX interface exposed to the Internet and port filtering is not properly configured, then it may be possible to upload serialized payloads to attack the underlying system. This does not affect systems running on PegaCloud due to its design and architecture.

tags | exploit, remote, code execution
advisories | CVE-2022-24082
SHA-256 | 14f97e39b3b48a9075da1f6e66862a187e036b509ff25bfce33fb66bb645c604
Backdoor.Win32.Delf.arh MVID-2022-0650 Authentication Bypass
Posted Oct 24, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Delf.arh malware suffers from an authentication bypass vulnerability.

tags | exploit, bypass
systems | windows
SHA-256 | e5c413409b33c8c771245af2c651a2554e93871a2544df61fe5e997eedfd885b
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close