exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 38 RSS Feed

Files Date: 2024-09-10

GitHub sqlpad/sqlpad Template Injection / Remote Code Execution
Posted Sep 10, 2024
Authored by Philip-Otter | Site github.com

Proof of concept automation code to exploit a template injection vulnerability in GitHub repository sqlpad/sqlpad version prior to 6.10.1 that can result in remote code execution.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2022-0944
SHA-256 | 79a6a3c0f0cc3437faa5b70a9c94c21f376448987379d2b3ee42300f9a2f5271
Spring Cloud Data Flow Remote Code Execution
Posted Sep 10, 2024
Authored by Kayiyan | Site github.com

Proof of concept exploit for Spring Cloud Data Flow versions prior to 2.11.4 that achieves remote code execution through a malicious upload.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2024-37084
SHA-256 | 0ee38b6a8cf494539040a02c4712511aeac366dfde03820937e77f9441253ed3
PowerVR DEVMEMXINT_RESERVATION::ppsPMR Use-After-Free
Posted Sep 10, 2024
Authored by Jann Horn, Google Security Research

The array ppsPMR in DEVMEMXINT_RESERVATION holds references to PMR structures (using PMRRefPMR2()), intending to prevent the PMRs' physical memory from being released. However, PMRs with PVRSRV_MEMALLOCFLAG_NO_OSPAGES_ON_ALLOC (which for OSMem PMRs internally translates to FLAG_ONDEMAND) can release their backing physical pages while references to the PMR still exist; PMRLockSysPhysAddresses() must be used to prevent a PMR's backing pages from disappearing, like in DevmemIntMapPMR2(). Therefore, it is currently possible to free a PMR's backing pages while the PMR is mapped into a DEVMEMXINT_RESERVATION, leading to physical page use-after-free.

tags | exploit
advisories | CVE-2024-34747
SHA-256 | cc6e11ae0dee934a94a29ebded0e52e70690ca998d7efe6c5f0ffe85ffda4eba
Ubuntu Security Notice USN-6997-1
Posted Sep 10, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6997-1 - It was discovered that LibTIFF incorrectly handled memory. An attacker could possibly use this issue to cause the application to crash, resulting in a denial of service.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2024-7006
SHA-256 | d715a8865849f88063b88cbe93cb59c0248d315acbdb3eee8c15abca6d300389
OX App Suite Backend 7.10.6-rev66 / 8.24.7 Open Redirect
Posted Sep 10, 2024
Authored by Martin Heiland

An open redirection vulnerability has been reported for a version of the Spring Framework which is shipped with OX App Suite backend versions 7.10.6-rev66 and 8.24.7.

tags | advisory
advisories | CVE-2024-22243
SHA-256 | ea468f342f7a0408607b9ba93475fecd68d35bad982ae0c29036847c45ddb637
Ubuntu Security Notice USN-6996-1
Posted Sep 10, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6996-1 - Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.

tags | advisory, remote, web, denial of service, arbitrary, javascript, code execution, xss
systems | linux, ubuntu
advisories | CVE-2024-40776, CVE-2024-40789
SHA-256 | 495c021cebaed12775fb7591f330431d792303b4c0b48774c767ece1790af9e8
Proxmark3 4.18994 Custom Firmware
Posted Sep 10, 2024
Authored by Christian Herrmann | Site github.com

This is a custom firmware written for the Proxmark3 device. It extends the currently available firmware. This release is nicknamed "Backdoor".

Changes: Major updates include FUDAN backdoors and static encrypted nonces key recovery and multiple bugs.
tags | tool
systems | unix
SHA-256 | 4a802faedf59e452328f4d955c2563277ed420bdb223052778e1d9f16ad90e0d
Ubuntu Security Notice USN-6841-2
Posted Sep 10, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6841-2 - USN-6841-1 fixed a vulnerability in PHP. This update provides the corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. It was discovered that PHP could early return in the filter_var function resulting in invalid user information being treated as valid user information. An attacker could possibly use this issue to expose raw user input information.

tags | advisory, php
systems | linux, ubuntu
advisories | CVE-2024-5458
SHA-256 | d170b8e7f8f92515ffeb2d3bd1921abc8a3d13ffd05345330e4edb30169de83a
Red Hat Security Advisory 2024-6510-03
Posted Sep 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6510-03 - An update for emacs is now available for Red Hat Enterprise Linux 9.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-39331
SHA-256 | 2081e08ae54d127fff95dff4350cff54b4fedc7937c6f72ff06eef2e7f613112
Red Hat Security Advisory 2024-6508-03
Posted Sep 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6508-03 - Red Hat build of Apache Camel 4.4.2 for Spring Boot release and security update is now available. Issues addressed include an information leakage vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-5971
SHA-256 | 4125779f8f68121d20c0d7b80edcc7a2478e5d8e4c074dee18e67d9ca3407f57
Ubuntu Security Notice USN-6994-1
Posted Sep 10, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6994-1 - It was discovered that Netty did not properly sanitize its input parameters. A remote attacker could possibly use this issue to cause a crash. It was discovered that Netty incorrectly handled request cancellation. A remote attacker could possibly use this issue to cause Netty to consume resources, leading to a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2023-34462, CVE-2023-44487
SHA-256 | 151f4791ce1bf18350da328db884812f982e73c362b6de11f386b30f3d2006ef
Red Hat Security Advisory 2024-6503-03
Posted Sep 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6503-03 - New Red Hat build of Keycloak 24.0.7 packages are available from the Customer Portal. Issues addressed include an open redirection vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-7260
SHA-256 | 28a003934b07a3c2aadb22b0a70bc2ac6b46ae5d5d08716f282cd2844773c1b3
Red Hat Security Advisory 2024-6502-03
Posted Sep 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6502-03 - New images are available for Red Hat build of Keycloak 24.0.7 and Red Hat build of Keycloak 24.0.7 Operator, running on OpenShift Container Platform. Issues addressed include an open redirection vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-7260
SHA-256 | 046aa91658da32aaace325576b189b51b23a296257a7093cbe30a937b60105f4
Red Hat Security Advisory 2024-6501-03
Posted Sep 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6501-03 - New Red Hat build of Keycloak 22.0.12 packages are available from the Customer Portal. This is a security update with Moderate impact rating. Issues addressed include a bypass vulnerability.

tags | advisory, bypass
systems | linux, redhat
advisories | CVE-2024-4629
SHA-256 | 7c20ef0e4508b339e4f572c98b8ae892e21dbb1baef9fb0cafea8e7322d6173e
Prison Management System 1.0 Add Administrator
Posted Sep 10, 2024
Authored by indoushka

Prison Management System version 1.0 suffers from an add administrator vulnerability.

tags | exploit, add administrator
SHA-256 | a25a824e97167db71e31b2009a9c44afedb55532be1b9ffa63f063ebf5479933
Red Hat Security Advisory 2024-6500-03
Posted Sep 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6500-03 - New images are available for Red Hat build of Keycloak 22.0.12 and Red Hat build of Keycloak 22.0.12 Operator, running on OpenShift Container Platform. This is a security update with Moderate impact rating. Issues addressed include a bypass vulnerability.

tags | advisory, bypass
systems | linux, redhat
advisories | CVE-2024-4629
SHA-256 | 3d0f74993836983ce5e05180cb4aab02b685e8df8c104d6efcc4efff4200d794
Red Hat Security Advisory 2024-6499-03
Posted Sep 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6499-03 - A security update is now available for Red Hat Single Sign-On 7.6 from the Customer Portal. Issues addressed include a bypass vulnerability.

tags | advisory, bypass
systems | linux, redhat
advisories | CVE-2024-4629
SHA-256 | 6e72327137f256313005f38a55bfcc67c52f3c20354f53aab956dd4c4b484e14
Red Hat Security Advisory 2024-6497-03
Posted Sep 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6497-03 - A new image is available for Red Hat Single Sign-On 7.6.10, running on OpenShift Container Platform 3.10 and 3.11, and 4.3. This is a security update with Moderate impact rating. Issues addressed include a bypass vulnerability.

tags | advisory, bypass
systems | linux, redhat
advisories | CVE-2024-4629
SHA-256 | 48a1fc7c4b98e9e44039fc4fb594f3995d0a9a16ddcfb272b4b042e07833d5ee
Red Hat Security Advisory 2024-6495-03
Posted Sep 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6495-03 - New Red Hat Single Sign-On 7.6.10 packages are now available for Red Hat Enterprise Linux 9. Issues addressed include a bypass vulnerability.

tags | advisory, bypass
systems | linux, redhat
advisories | CVE-2024-4629
SHA-256 | 1122d48eeaf1bf744d6d15b3db19522faf3a4a58f0502e1fd2e230a60d24cba1
Online Survey System 1.0 Remote File Inclusion
Posted Sep 10, 2024
Authored by indoushka

Online Survey System version 1.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 9ac49e540003cc98bbab6ed47333ffe2f4616bc3a383f48fe3a342e9a7dd83cc
Red Hat Security Advisory 2024-6494-03
Posted Sep 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6494-03 - New Red Hat Single Sign-On 7.6.10 packages are now available for Red Hat Enterprise Linux 8. Issues addressed include a bypass vulnerability.

tags | advisory, bypass
systems | linux, redhat
advisories | CVE-2024-4629
SHA-256 | c3d1b0b0dc8416e12ecef51a0ef896fdf2c0ef2d3b2555d6cb6d40e9c2102806
Red Hat Security Advisory 2024-6493-03
Posted Sep 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6493-03 - New Red Hat Single Sign-On 7.6.10 packages are now available for Red Hat Enterprise Linux 7. Issues addressed include a bypass vulnerability.

tags | advisory, bypass
systems | linux, redhat
advisories | CVE-2024-4629
SHA-256 | 369f7584f39bf3facbaa74446ee5a874dc7b59cb182b2d14736546262ed729df
Online Student Grading System 1.0 SQL Injection
Posted Sep 10, 2024
Authored by indoushka

Online Student Grading System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection, bypass
SHA-256 | 6572f3f9bad83df66bb8f42e5fa49921e0511eab96c98361242df9209e7eb2d1
Red Hat Security Advisory 2024-6488-03
Posted Sep 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6488-03 - An update for the python39:3.9 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2024-6345
SHA-256 | f934714a4bd6df9c1203cc3c3ca1883f671862ce1f7fc4a5983c3eab7b53d966
Online Marriage Registration System 1.0 Shell Upload
Posted Sep 10, 2024
Authored by indoushka

Online Marriage Registration System version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 990ace207073f604556500939f13df158bf2dfab39adaff554b8e9d0500f40f9
Page 1 of 2
Back12Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close