exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2024-05-31

RansomLord Anti-Ransomware Exploit Tool 3.1
Posted May 31, 2024
Authored by hyp3rlinx, malvuln | Site malvuln.com

RansomLord is a proof-of-concept tool that automates the creation of PE files, used to compromise ransomware pre-encryption. This tool uses dll hijacking to defeat ransomware by placing PE files in the x32 or x64 directories where the program is run from.

Changes: Stability enhancements. Updated some export functions for the x32 exploit DLL. Added -r flag to output a Sigma rule for detecting RansomLord activity using Windows event log.
tags | tool, encryption
SHA-256 | 647494bda466e645768d6f7d1cd051097aee319f88018d1a80547d8d538c98db
Red Hat Security Advisory 2024-3527-03
Posted May 31, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-3527-03 - Red Hat AMQ Streams 2.7.0 is now available from the Red Hat Customer Portal. Issues addressed include buffer overflow, denial of service, integer overflow, memory leak, and resource exhaustion vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability, memory leak
systems | linux, redhat
advisories | CVE-2021-3520
SHA-256 | f7976b8e170be546f0ae90244875124b0d4dbae1498c74c776b4c1380ae64a0d
Red Hat Security Advisory 2024-3513-03
Posted May 31, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-3513-03 - An update for less is now available for Red Hat Enterprise Linux 9. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2024-32487
SHA-256 | 251dd556f26343b061eb6615219c2ae27b1ff872ff5eced27823edeeab298cb7
Red Hat Security Advisory 2024-3501-03
Posted May 31, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-3501-03 - An update for nghttp2 is now available for Red Hat Enterprise Linux 8. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2024-28182
SHA-256 | 2259ed3c98bb1958e22876aeeb7b02063f28b9dab1b85e7ad5768608d11e5562
Red Hat Security Advisory 2024-3500-03
Posted May 31, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-3500-03 - An update for the ruby:3.0 module is now available for Red Hat Enterprise Linux 8. Issues addressed include HTTP response splitting and denial of service vulnerabilities.

tags | advisory, web, denial of service, vulnerability, ruby
systems | linux, redhat
advisories | CVE-2021-33621
SHA-256 | 07018912af2cc2a30a1a8c489f204ef85a96a2eef4d3c15d2dfd7fdd867a602f
Red Hat Security Advisory 2024-3497-03
Posted May 31, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-3497-03 - An update for edk2 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow
systems | linux, redhat
advisories | CVE-2023-45230
SHA-256 | 843acaf0f746a1a8840e4560f9d9f7ea650a214c6e15a1b3c3ffc0d0cc80cde1
Packet Storm New Exploits For May, 2024
Posted May 31, 2024
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 68 exploits added to Packet Storm in May, 2024.

tags | exploit
SHA-256 | 753ccfd5242ce49f15443887fb69c5c38c00091bb52bdafe46e28e7762f1d5c9
Ubuntu Security Notice USN-6804-1
Posted May 31, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6804-1 - It was discovered that GNU C Library nscd daemon contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service. It was discovered that GNU C Library nscd daemon did not properly check the cache content, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service.

tags | advisory, denial of service, overflow, local
systems | linux, ubuntu
advisories | CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602
SHA-256 | 9dc17726191c1e8d25af731e1c1a582fe7b554d3f505d4bab60a6459bb305c87
Ubuntu Security Notice USN-6803-1
Posted May 31, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6803-1 - Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 24.04 LTS. Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS.

tags | advisory, denial of service, arbitrary, code execution
systems | linux, ubuntu
advisories | CVE-2023-49501, CVE-2023-49502, CVE-2023-49528, CVE-2023-50007, CVE-2023-50008, CVE-2023-50009, CVE-2023-50010, CVE-2023-51793, CVE-2023-51794, CVE-2024-31578, CVE-2024-31582, CVE-2024-31585
SHA-256 | 791bb40a4c8f9acb0292a309c51863cc9ae4a462faabf1d22932877c8c7196c1
jSQL Injection 0.97
Posted May 31, 2024
Authored by ron190 | Site github.com

jSQL Injection is a lightweight application used to find database information from a distant server. jSQL Injection is also part of the official penetration testing distribution Kali Linux and is included in various other distributions like Pentest Box, Parrot Security OS, ArchStrike and BlackArch Linux. This is the source code release.

Changes: Restored automatic issue report.
tags | tool, scanner, sql injection
systems | linux, unix
SHA-256 | 90399bcb164b4b112830c11dba0b7486158942ee798ef7e06e37df300f75cccf
Ubuntu Security Notice USN-6802-1
Posted May 31, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6802-1 - Lukas Fittl discovered that PostgreSQL incorrectly performed authorization in the built-in pg_stats_ext and pg_stats_ext_exprs views. An unprivileged database user can use this issue to read most common values and other statistics from CREATE STATISTICS commands of other users.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2024-4317
SHA-256 | c10954c73d680328599d7d8e4dbcd565129971a3eff1d9b0307ace0fc71664d5
changedetection 0.45.20 Remote Code Execution
Posted May 31, 2024
Authored by Zach Crosman

changedetection versions 0.45.20 and below suffer from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2024-32651
SHA-256 | 70e710cf9046b44a8c5d97c23bc771dcb7c5a9099610fdbaebc0e275487b2eba
Online Payment Hub System 1.0 SQL Injection
Posted May 31, 2024
Authored by Hamit Avşar

Online Payment Hub System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 4961e6290d3d4553b7cf539d9befdc3d12ec735c180c3ee1a73f99cbf2eab38b
Ubuntu Security Notice USN-6801-1
Posted May 31, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6801-1 - It was discovered that PyMySQL incorrectly escaped untrusted JSON input. An attacker could possibly use this issue to perform SQL injection attacks.

tags | advisory, sql injection
systems | linux, ubuntu
advisories | CVE-2024-36039
SHA-256 | df54bff30293aa2fb510345c2f13fdaf729e74f69da269365211c88d04dd552f
Ubuntu Security Notice USN-6800-1
Posted May 31, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6800-1 - It was discovered that browserify-sign incorrectly handled an upper bound check in signature verification. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to perform a signature forgery attack.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2023-46234
SHA-256 | bbb5053adf3b1fc0f858b00ff034ddf245220cc2b0b12057d2b648d4e63fedae
BWL Advanced FAQ Manager 2.0.3 SQL Injection
Posted May 31, 2024
Authored by Ivan Spiridonov

BWL Advanced FAQ Manager version 2.0.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2024-32136
SHA-256 | f95ccaedfdaee1cf2d018058b8c73c3b7d6c5bdacad42079362785b6fa9fa81c
iMLog Cross Site Scripting
Posted May 31, 2024
Authored by Gabriel Felipe

iMLog versions prior to 1.307 suffer from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 41363b501e8b38ba3e267a44d4da15c2e44e3c8e7251c38bd295cdf08bd7d310
Check Point Security Gateway Information Disclosure
Posted May 31, 2024
Authored by Yesith Alvarez

Check Point Security Gateway suffers from an information disclosure vulnerability. Versions affected include R77.20 (EOL), R77.30 (EOL), R80.10 (EOL), R80.20 (EOL), R80.20.x, R80.20SP (EOL), R80.30 (EOL), R80.30SP (EOL), R80.40 (EOL), R81, R81.10, R81.10.x, and R81.20.

tags | exploit, info disclosure
advisories | CVE-2024-24919
SHA-256 | 9a00e15745eee654d5e56bd4984cd3a4bdcf8830f76d50a2c9914ecf0ab23d3f
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close