exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 26 RSS Feed

Files Date: 2024-04-02

Computer Laboratory Management System 1.0 Cross Site Scripting
Posted Apr 2, 2024
Authored by SoSPiro

Computer Laboratory Management System version 1.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2024-3140
SHA-256 | bf5815c0f1d58d3958bef3adb0e854fe8a2586b75a2f18b16645f513f75c79a1
Computer Laboratory Management System 1.0 Insecure Direct Object Reference
Posted Apr 2, 2024
Authored by SoSPiro

Computer Laboratory Management System version 1.0 suffers from an insecure direct object reference vulnerability.

tags | exploit
advisories | CVE-2024-3139
SHA-256 | b5f987918b9d2242034cb3cfce143ca22eb5711d723578856d21b0e5fbbf07e5
Debian Security Advisory 5652-1
Posted Apr 2, 2024
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5652-1 - A directory traversal vulnerability was discovered in py7zr, a library and command-line utility to process 7zip archives.

tags | advisory
systems | linux, debian
advisories | CVE-2022-44900
SHA-256 | cf39e37e49a6b5c0e4e1f61550e0dc46ea96194e20c41beaa1aa0e365b5444eb
Hospital Management System 1.0 Cross Site Scripting
Posted Apr 2, 2024
Authored by Sandeep Vishwakarma

Hospital Management System version 1.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2024-29412
SHA-256 | b0b5ba54aa37873d47d36df07fd16afcfb575f17d07da9cdcd5d7b51d3cb12e1
PowerVR RGXCreateZSBufferKM2 Use-After-Free
Posted Apr 2, 2024
Authored by Jann Horn, Google Security Research

PowerVR has an issue where the RGXCreateZSBufferKM2 error path frees object while on list.

tags | exploit
SHA-256 | b77c7757a3ce5ef36d49453304cff99bfbbd56c1ff428ecdf3cd2b4c3033e628
Ubuntu Security Notice USN-6720-1
Posted Apr 2, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6720-1 - Kentaro Kawane discovered that Cacti incorrectly handled user provided input sent through request parameters to the graph_view.php script. A remote authenticated attacker could use this issue to perform SQL injection attacks.

tags | advisory, remote, php, sql injection
systems | linux, ubuntu
advisories | CVE-2023-39361
SHA-256 | 72a1060cc659927cdff0d3fabd91138203688e06b807e728473d37ed3e99a9d3
E-Insurance 1.0 Cross Site Scripting
Posted Apr 2, 2024
Authored by Sandeep Vishwakarma

E-Insurance version 1.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2024-29411
SHA-256 | 2406f7a2a5b0e1d7a42e0a17b9b16051a07748a1a40df70eaddfa04ad1ec98fd
GL-iNet MT6000 4.5.5 Arbitrary File Download
Posted Apr 2, 2024
Authored by Bandar Alharbi

GL-iNet MT6000 version 4.5.5 suffers from an arbitrary file download vulnerability.

tags | exploit, arbitrary
advisories | CVE-2024-27356
SHA-256 | e3ac85e1aa3ca84b8c1cb8ba2f06777fa8a4ef188ab561304e9fe0ce4f1732cc
Red Hat Security Advisory 2024-1612-03
Posted Apr 2, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-1612-03 - An update for kpatch-patch is now available for Red Hat Enterprise Linux 8. Issues addressed include a privilege escalation vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2023-6546
SHA-256 | b5f4816e4701437e35e7acea5098545870b5bbebffa7ead59d676e0fbc766582
Red Hat Security Advisory 2024-1610-03
Posted Apr 2, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-1610-03 - An update for less is now available for Red Hat Enterprise Linux 8.

tags | advisory
systems | linux, redhat
advisories | CVE-2022-48624
SHA-256 | 89c3d882ad9d18d5834541980ef305c842d20d6f78bb1e5bf1f5bb42fca44acd
Red Hat Security Advisory 2024-1608-03
Posted Apr 2, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-1608-03 - An update for opencryptoki is now available for Red Hat Enterprise Linux 8.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-0914
SHA-256 | ef1315df97ab0764a9da1beb3697e4dd576c660a0762c6d11b75496778f28c4b
Red Hat Security Advisory 2024-1607-03
Posted Apr 2, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-1607-03 - An update for kernel is now available for Red Hat Enterprise Linux 8. Issues addressed include code execution, null pointer, privilege escalation, and use-after-free vulnerabilities.

tags | advisory, kernel, vulnerability, code execution
systems | linux, redhat
advisories | CVE-2021-33631
SHA-256 | 5f51f818d2acee63a892562591ef19aec0b934ee6653b63e9f021616f882c253
Red Hat Security Advisory 2024-1601-03
Posted Apr 2, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-1601-03 - An update for curl is now available for Red Hat Enterprise Linux 8. Issues addressed include an information leakage vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2023-28322
SHA-256 | 2e8ac22152907c39e9381f748fe4cffe8c0e877488f619bc5b2d3257ab8a2f82
Rapid7 Nexpose 6.6.240 Unquoted Service Path
Posted Apr 2, 2024
Authored by Saud Alenazi

Rapid7 Nexpose version 6.6.240 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | bd66c5b0bd02e2c88afcc8696040621293f023ddcf7cd49b4df89984f1b1deed
Blood Bank 1.0 Cross Site Scripting
Posted Apr 2, 2024
Authored by Ersin Erenler

Blood Bank version 1.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2023-46020
SHA-256 | ba0ad0ae015b32793ff56d721804fc5356cd2254b484e026f743cfee280d208a
Backdoor.Win32.Agent.ju (PSYRAT) MVID-2024-0677 Bypass / Command Execution
Posted Apr 2, 2024
Authored by malvuln | Site malvuln.com

The PsyRAT 0.01 malware listens on random high TCP ports 53297, 53211, 532116 and so forth. Connecting to an infected host returns a logon prompt for PASS. However, you can enter anything or nothing at all and execute commands made available by the backdoor.

tags | exploit, tcp
SHA-256 | 49c1a96716eb6676ee82286681b7ec240f24504e592bcf642a8225b45349d927
Daily Habit Tracker 1.0 Broken Access Control
Posted Apr 2, 2024
Authored by Yevhenii Butenko

Daily Habit Tracker version 1.0 suffers from an access control vulnerability.

tags | exploit
advisories | CVE-2024-24496
SHA-256 | 41fffd804f16c75eac78837bfdfd6a20b0fa6cc6d55f44cf072a40546e836709
Daily Habit Tracker 1.0 SQL Injection
Posted Apr 2, 2024
Authored by Yevhenii Butenko

Daily Habit Tracker version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2024-24495
SHA-256 | cd7b10f9c3d3198234448508b8bd3971e255165331cb45675cc34ec55a085e1c
Daily Habit Tracker 1.0 Cross Site Scripting
Posted Apr 2, 2024
Authored by Yevhenii Butenko

Daily Habit Tracker version 1.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2024-24494
SHA-256 | 465774e1e015b47c2df3f4655c8cba2863933ca17aa6baec9c048f8810cb89ff
Employee Management System 1.0 SQL Injection
Posted Apr 2, 2024
Authored by Yevhenii Butenko

Employee Management System version 1.0 suffers from additional remote SQL injection vulnerabilities. Original discovery of this finding is attributed to Ozlem Balci in January of 2024.

tags | exploit, remote, vulnerability, sql injection
advisories | CVE-2024-24499
SHA-256 | 0c0393923d3df1c0633d25e433d1f3d236c329b41f5056207cc820b47be87eae
WordPress Simple Backup Path Traversal / Arbitrary File Download
Posted Apr 2, 2024
Authored by Ven3xy

WordPress Simple Backup plugin versions prior to 2.7.10 suffer from file download and path traversal vulnerabilities.

tags | exploit, vulnerability, file inclusion
SHA-256 | f57a12da9297027e3773452968be51ac7ced5f4c62bc2a03d3a8a87db3b83fae
OpenCart Core 4.0.2.3 SQL Injection
Posted Apr 2, 2024
Authored by Saud Alenazi

OpenCart Core version 4.0.2.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4e62c24dfb4857453f8503bda030c60fd230c642a59bc3d770a2f4bd0cab12e2
Online Hotel Booking In PHP 1.0 SQL Injection
Posted Apr 2, 2024
Authored by Gian Paris C. Agsam

Online Hotel Booking in PHP version 1.0 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | dba5f6da9bbb1db4830270fe91b72c0f36ec37923f4911d24100811a4c3c40db
ASUS Control Center Express 01.06.15 Unquoted Service Path
Posted Apr 2, 2024
Authored by Alaa Kachouh

ASUS Control Center Express version 01.06.15 suffers from an unquoted service path vulnerability.

tags | exploit
advisories | CVE-2024-27673
SHA-256 | 46266851a73ecc2b82bae221982b47e9b0424f7ba04367b4b5248bec99f9f696
Microsoft Windows 10.0.17763.5458 Privilege Escalation
Posted Apr 2, 2024
Authored by E1.Coders

Microsoft Windows version 10.0.17763.5458 kernel IOCTL privilege escalation exploit.

tags | exploit, kernel
systems | windows
advisories | CVE-2024-21338
SHA-256 | 8707efbb61bde9a6bad7e9f41e2e2aa406ec325770b5e4cf2822308facf677cb
Page 1 of 2
Back12Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close