This archive contains all of the 722 exploits added to Packet Storm in August, 2024. Please note the increase in size for this month is due to a massive backlog of older exploits being added to the archive and is not representative of an uptick in new issues being discovered.
134571b730367a368bd78e19cc2729522241ac88f947a572cd37314d9f37a24f
Libpcap is a portable packet capture library which is used in many packet sniffers, including tcpdump.
84fa89ac6d303028c1c5b754abff77224f45eca0a94eb1a34ff0aa9ceece3925
tcpdump allows you to dump the traffic on a network. It can be used to print out the headers and/or contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities.
d76395ab82d659d526291b013eee200201380930793531515abfc6e77b4f2ee5
Debian Linux Security Advisory 5762-1 - The WebKitGTK web engine suffers from multiple vulnerabilities. An anonymous researcher discovered that processing maliciously crafted web content may lead to an unexpected process crash. Huang Xilin discovered that processing maliciously crafted web content may lead to an unexpected process crash. Huang Xilin discovered that processing maliciously crafted web content may lead to an unexpected process crash. More issues are listed in this advisory.
84334a31b07991491b6bf97b8a6dd18f35a882dd2e58fa59b968cb5797f2b082
Zero day remote root exploit for IntelliNet version 2.0. It affects multiple devices of AES Corp and Siemens. The exploit provides a remote shell and escalates your permissions to full root permissions by abusing exec_suid. No authentication needed at all, neither any interaction from the victim. The firmware affected by this exploit runs on fire alarms, burglar sensors and environmental devices, all on the internet, all vulnerable, no patch. Full control over hardware and software with no restrictions, you can manipulate battery voltage and even damage the hardware with unknown outcomes.
03f6a27dff52d1325441a14044dae92e43735378844d284aa4a56aa28a72abe1
Ubuntu Security Notice 6982-1 - It was discovered that Dovecot did not not properly have restrictions on the size of address headers. A remote attacker could possibly use this issue to cause denial of service.
f1dfff19271634129f0be2bcb6219e23156e32d9b9065bd7d6de18b555f5a24e
Online Musical Instrument Shop IN version 1.0 suffers from a cross site scripting vulnerability.
2e3a9e009b49f67ad6f0534a437aba16431617d1d2588b6c4ed1087d4399d493
Online Job Portal IN version 1.0 suffers from a remote SQL injection vulnerability.
92218ce274c20d93f28c9b743aacda84a68675963b3607d54c3484d9218e178e
Debian Linux Security Advisory 5763-1 - William Khem-Marquez discovered that Pymatgen, a Python library for materials analysis, could be tricked into running arbitrary code if a malformed CIF file is processed.
bdcbd1c6000eda313c41cb0d5a73e82213383a8c9e63d571162a7f57daf4f021
pgAdmin versions 8.4 and earlier are affected by a remote reverse connection execution vulnerability via the binary path validation API.
263e864f594c394a102efec26ea63661ce2ce5e3573fde482860fbce55467c71
SPIP version 4.2.7 suffers from a code execution vulnerability.
160ad4f3c2b9737ce719a722da0465d21060eaa5bdf0025e6c316b142389c830
Loan Management System 2024 version 1.0 suffers from an ignored default credential vulnerability.
4e37e483991ec7b37ab54ed035920c62f7033979ca509714b26270c8fabb131b
Hostel Management System version 1.0 version 1.0 suffers from an arbitrary file upload vulnerability.
27f8218a09b1dbd02541ebb3a01b906007cc837ea1498cdeb2bc7e08eaf27619
File Management System version 1.0 suffers from a cross site request forgery vulnerability.
676936ef829ef1cf960e7f0060458d382b66a96385e77b8c68741ce295fe4400
Faculty Evaluation System version 1.0 suffers from a cross site request forgery vulnerability.
678ae6fb720616c66e425448002d1fbbb933f7132a46acc2939dc4fd7a87e909
eClass LMS version 6.2.0 suffers from a remote shell upload vulnerability.
c82e4b148e140d84b1e4d327bad2cf8efab60d29769cb3a98ec6f67d4da5538f
Free Hospital Management System for Small Practices version 1.0 suffers from a cross site request forgery vulnerability.
63c5e2192cb29a1865e229bd10036572dc2bf4101974aff1df01777f90b99bb9