what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 176 - 200 of 560 RSS Feed

Files Date: 2024-07-01 to 2024-07-31

Ubuntu Security Notice USN-6893-3
Posted Jul 23, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6893-3 - It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged local attacker could use this to cause a denial of service. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2023-52699, CVE-2024-26811, CVE-2024-26923, CVE-2024-26926, CVE-2024-26936, CVE-2024-26980, CVE-2024-26981, CVE-2024-26983, CVE-2024-26985, CVE-2024-26987, CVE-2024-26988, CVE-2024-26989, CVE-2024-26991, CVE-2024-26992
SHA-256 | 7f62f78668bc36911b1f96b40c020e8124cd85ad4a7b7ca69e27900327bdb441
Ubuntu Security Notice USN-6896-5
Posted Jul 23, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6896-5 - It was discovered that the ATA over Ethernet driver in the Linux kernel contained a race condition, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the Atheros 802.11ac wireless driver did not properly validate certain data structures, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service.

tags | advisory, denial of service, arbitrary, kernel
systems | linux, ubuntu
advisories | CVE-2022-48627, CVE-2023-52620, CVE-2023-52656, CVE-2023-52699, CVE-2023-52880, CVE-2023-6270, CVE-2023-7042, CVE-2024-22099, CVE-2024-23307, CVE-2024-24858, CVE-2024-24861, CVE-2024-25739, CVE-2024-26586, CVE-2024-26642
SHA-256 | df9560dc3783d3d4a0c9d99e6352e1f6ea6dd5c66518086f9ad8789fbd721813
LMS ZAI 6.1 Insecure Settings
Posted Jul 23, 2024
Authored by indoushka

LMS ZAI version 6.1 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | ac6f91ffe20c571e57ac0c8a6aef0c5437b2d37e5f53c46ef41059f24100b7db
Quick Job 2.4 Insecure Direct Object Reference
Posted Jul 23, 2024
Authored by indoushka

Quick Job version 2.4 suffers from an insecure direct object reference vulnerability.

tags | exploit
SHA-256 | ed619defcb18f94880d7fdc150758b05fc052d89b88cf6c32eda99ac714a326b
PPDB ONLINE 1.3 Administrative Page Disclosure
Posted Jul 23, 2024
Authored by indoushka

PPDB ONLINE version 1.3 appears to suffer from an administrative page disclosure issue.

tags | exploit, info disclosure
SHA-256 | 567512dc29f3191d46966af5a6dd1339474aa567f65e1c6564dccda43acadad3
PHP MaXiMuS 2.5.2 Cross Site Scripting
Posted Jul 23, 2024
Authored by indoushka

PHP MaXiMuS version 2.5.2 suffers from a cross site scripting vulnerability.

tags | exploit, php, xss
SHA-256 | f7f012f0611c7ac312b6b0ad3df48db019ad64a1683b0a0e3c97146f444edd95
NUKE SENTINEL 2.5.2 Cross Site Scripting
Posted Jul 23, 2024
Authored by indoushka

NUKE SENTINEL version 2.5.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 04959e224e4d66c86926b38e058df306a652f0dbf3a13e5a864ba731b33ed47c
Minfotech CMS 2.0 SQL Injection
Posted Jul 23, 2024
Authored by indoushka

Minfotech CMS version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c70371f0daa1616ffe4fc66938a433e31d91535c9593510fb4fccef1fdbc587e
eDesign CMS 2.0 Insecure Direct Object Reference
Posted Jul 23, 2024
Authored by indoushka

eDesign CMS version 2.0 suffers from an insecure direct object reference vulnerability.

tags | exploit
SHA-256 | 55a4eca00e7267d8d4d5cdd94c2b99447eef8059c06cab914a3401ebda7966f2
Softing Secure Integration Server 1.22 Remote Code Execution
Posted Jul 22, 2024
Authored by mr_me, Chris Anastasio, Imran E. Dawoodjee | Site metasploit.com

This Metasploit module chains two vulnerabilities to achieve authenticated remote code execution against Softing Secure Integration Server version 1.22. In CVE-2022-1373, the restore configuration feature is vulnerable to a directory traversal vulnerability when processing zip files. When using the "restore configuration" feature to upload a zip file containing a path traversal file which is a dll called ..\..\..\..\..\..\..\..\..\..\..\Windows\System32\wbem\wbemcomn.dll. This causes the file C:\Windows\System32\wbem\wbemcomn.dll to be created and executed upon touching the disk. In CVE-2022-2334, the planted wbemcomn.dll is used in a DLL hijacking attack when Softing Secure Integration Server restarts upon restoring configuration, which allows us to execute arbitrary code on the target system. The chain demonstrated in Pwn2Own used a signature instead of a password. The signature was acquired by running an ARP spoofing attack against the local network where the Softing SIS server was located. A username is also required for signature authentication. A custom DLL can be provided to use in the exploit instead of using the default MSF-generated one.

tags | exploit, remote, arbitrary, local, spoof, vulnerability, code execution
systems | windows
advisories | CVE-2022-1373, CVE-2022-2334
SHA-256 | 138c45447c1d3fa090b4666327e202412f377f34d7873c3c578299783f2b2a43
Ghostscript Command Execution / Format String
Posted Jul 22, 2024
Authored by Thomas Rinsma, Christophe de la Fuente | Site metasploit.com

This Metasploit module exploits a format string vulnerability in Ghostscript versions before 10.03.1 to achieve a SAFER sandbox bypass and execute arbitrary commands. This vulnerability is reachable via libraries such as ImageMagick. This exploit only works against Ghostscript versions 10.03.0 and 10.01.2. Some offsets adjustment will probably be needed to make it work with other versions.

tags | exploit, arbitrary
advisories | CVE-2024-29510
SHA-256 | 3e3f414d0ec3165e352b2624a3e784100a79ab838c827536fa557daa6cf4b2b8
I2P 2.6.0
Posted Jul 22, 2024
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Modifications to Router and Address Book and bug fixes in I2PSnark and Router. Translation updates.
tags | tool
systems | unix
SHA-256 | 249b35c1e061e194ee18048b0644cc5e2c5cf785ffce655e3124eb959dc189ff
Logwatch 7.11
Posted Jul 22, 2024
Site sourceforge.net

Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.

Changes: Full changelog missing but this is a new release since the last release in January of 2024.
tags | tool, intrusion detection
systems | unix
SHA-256 | 5eb42d983a9667003368b572149fce788c0d7e13daaf1f28ad1bf3a140b865cf
Collateral Damage CVE-2024-30088 Privilege Escalation
Posted Jul 22, 2024
Authored by carrot_c4k3, landaire | Site github.com

Collateral Damage is a kernel exploit for Xbox SystemOS using CVE-2024-30088. It targets Xbox One and Xbox Series consoles running kernel versions 25398.4478, 25398.4908, and 25398.4909. The initial entrypoint is via the Game Script UWP application.

tags | exploit, kernel
advisories | CVE-2024-30088
SHA-256 | 37f647ed1a6f781f4be32182919dbb9877f42dbd8d26a16f662f280d73a0ade5
Ubuntu Security Notice USN-6903-1
Posted Jul 22, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6903-1 - Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass security restrictions, cross-site tracing, or execute arbitrary code. Ronald Crane discovered that Thunderbird did not properly manage certain memory operations in the NSS. An attacker could potentially exploit this issue to cause a denial of service.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2024-6600, CVE-2024-6602, CVE-2024-6603, CVE-2024-6604
SHA-256 | ef4b61c19ba1cf89ba89cd01bfc4d81fcf08875ddab9da8ccaa5a0275782a54c
Adobe Commerce / Magento Open Source XML Injection / User Impersonation
Posted Jul 22, 2024
Authored by RedWay Security | Site github.com

Adobe Commerce and Magento Open Source are affected by an XML injection vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction. Versions Affected include Adobe Commerce and Magento Open Source 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8, and earlier. This exploit uses the arbitrary file reading aspect of the issue to impersonate a user.

tags | exploit, arbitrary, code execution
advisories | CVE-2024-34102
SHA-256 | 6dc2631d3032a832f090c548531e8b8f77ef41c5778c811973c0342b99b373e0
Xhibiter NFT Marketplace 1.10.2 Cross Site Scripting
Posted Jul 22, 2024
Authored by indoushka

Xhibiter NFT Marketplace version 1.10.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a7a598cb46f77d150039a39dbd055a562324f7c75d337f3dfdd9ed322b34d82c
eStore CMS 2.0 SQL Injection
Posted Jul 22, 2024
Authored by indoushka

eStore CMS version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | de369a0ae5b5244b3ab433e9d7d07ec19ac008a8083d31f1bf7a032e4ffa3c9b
Clenix 1.0 Insecure Direct Object Reference
Posted Jul 22, 2024
Authored by indoushka

Clenix version 1.0 suffers from an insecure direct object reference vulnerability.

tags | exploit
SHA-256 | c8cfbe1e1565830e6a6d2555376f8475ad918a45655a551c1e92d3dbe0868c58
Candy Redis 2.1.2 Admin Page Disclosure
Posted Jul 22, 2024
Authored by indoushka

Candy Redis version 2.1.2 appears to suffer from an administrative page disclosure issue.

tags | exploit
SHA-256 | a69f6d9ff9e980b9fb601fdda46e646f965883d799286eaeb71003e83fe8c43d
Agop CMS 1.0 Insecure Direct Object Reference
Posted Jul 22, 2024
Authored by indoushka

Agop CMS version 1.0 suffers from an insecure direct object reference vulnerability.

tags | exploit
SHA-256 | 1ed22de09e417dcaed8d9f03d8d62abd6b70fc4587552e70a4bdbce253d3011b
Red Hat Security Advisory 2024-4673-03
Posted Jul 22, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-4673-03 - An update for firefox is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-6601
SHA-256 | 6aaa85cf49f4c6acb05f34b57097bbd5a3f155e564d6265c5cc764ab31e67ca8
Red Hat Security Advisory 2024-4672-03
Posted Jul 22, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-4672-03 - An update for containernetworking-plugins is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions. Issues addressed include a memory leak vulnerability.

tags | advisory, memory leak
systems | linux, redhat
advisories | CVE-2024-1394
SHA-256 | 262933c57231b7330035e4eca71b393a1ac52396ac5bb487c5e5d4e0b200812a
Red Hat Security Advisory 2024-4671-03
Posted Jul 22, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-4671-03 - An update for thunderbird is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-6601
SHA-256 | 34bc02dd6d5408a06546e0dfa81436a698aab33ee9094c269c7f312753426b66
Red Hat Security Advisory 2024-4670-03
Posted Jul 22, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-4670-03 - An update for thunderbird is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-6601
SHA-256 | cb4da693cd813fbfea840f1037a61900575e092b94a7240c5370624aad9e5639
Page 8 of 23
Back678910Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close