exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 40 RSS Feed

Files Date: 2024-09-12

MPlayer Lite r33064 Buffer Overflow
Posted Sep 12, 2024
Authored by h1ch4m, Gabor Seljan, C4SS!0 | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow vulnerability in MPlayer Lite r33064, caused by improper bounds checking of an URL entry. By persuading the victim to open a specially-crafted .M3U file, specifically by drag-and-dropping it to the player, a remote attacker can execute arbitrary code on the system.

tags | exploit, remote, overflow, arbitrary
SHA-256 | 61c9fed931a83bc7851c93ab4e149ec607c061edc841c01aaf722c287b7d3742
Windows Escalate UAC Execute RunAs
Posted Sep 12, 2024
Authored by Rob Fuller, b00stfr3ak | Site metasploit.com

This Metasploit module will attempt to elevate execution level using the ShellExecute undocumented RunAs flag to bypass low UAC settings.

tags | exploit
SHA-256 | 0f7fb4377bf2d6d71431f032c82cbf7fd475135a7e10f5264dc8285bfaa1d4ff
SPIP BigUp 4.3.1 / 4.2.15 / 4.1.17 Unauthenticated Remote Code Execution
Posted Sep 12, 2024
Authored by Valentin Lobstein, Laluka, Julien Voisin, Vozec | Site metasploit.com

This Metasploit module exploits a Remote Code Execution vulnerability in the BigUp plugin of SPIP. The vulnerability lies in the lister_fichiers_par_champs function, which is triggered when the bigup_retrouver_fichiers parameter is set to any value. By exploiting the improper handling of multipart form data in file uploads, an attacker can inject and execute arbitrary PHP code on the target server. This critical vulnerability affects all versions of SPIP from 4.0 up to and including 4.3.1, 4.2.15, and 4.1.17. It allows unauthenticated users to execute arbitrary code remotely via the public interface. The vulnerability has been patched in versions 4.3.2, 4.2.16, and 4.1.18.

tags | exploit, remote, arbitrary, php, code execution, file upload
advisories | CVE-2024-8517
SHA-256 | 470929e92864600915a7773675e61c23486f09b86f3d05d72951628b436ed7c0
QNX Qconn Command Execution
Posted Sep 12, 2024
Authored by Brendan Coles, Mor!p3r, David Odell | Site metasploit.com

This Metasploit module uses the qconn daemon on QNX systems to gain a shell. The QNX qconn daemon does not require authentication and allows remote users to execute arbitrary operating system commands. This Metasploit module has been tested successfully on QNX Neutrino 6.5.0 (x86) and 6.5.0 SP1 (x86).

tags | exploit, remote, arbitrary, shell, x86
SHA-256 | 217c97be589524ea77431218332eff5e82efabdd6dfa3503ed0ddab691480814
UnRAR Path Traversal
Posted Sep 12, 2024
Authored by Ron Bowes, Simon Scannell | Site metasploit.com

This Metasploit module creates a RAR file that exploits CVE-2022-30333, which is a path-traversal vulnerability in unRAR that can extract an arbitrary file to an arbitrary location on a Linux system. UnRAR fixed this vulnerability in version 6.12 (open source version 6.1.7). The core issue is that when a symbolic link is unRARed, Windows symbolic links are not properly validated on Linux systems and can therefore write a symbolic link that points anywhere on the filesystem. If a second file in the archive has the same name, it will be written to the symbolic link path.

tags | exploit, arbitrary
systems | linux, windows
advisories | CVE-2022-30333
SHA-256 | 2df85540ffe31bd6abf8706295866ebd1d381d12c36e4680836b772ead8e9445
3DSecure 2.0 3DS Authorization Method Cross Site Request Forgery
Posted Sep 12, 2024
Authored by Rubén López Herrera

A cross site request forgery vulnerability was identified in the Authorization Method of 3DSecure version 2.0, allowing attackers to submit unauthorized form data by modifying the HTTP Origin and Referer headers.

tags | exploit, web, csrf
advisories | CVE-2024-25286
SHA-256 | 032e3a53c89b7b4a7b7b3de30de850a84f091eca55d4270ee219cc8a08689f23
3DSecure 2.0 3DS Method Authentication Cross Site Scripting
Posted Sep 12, 2024
Authored by Rubén López Herrera

3DSecure version 2.0 is vulnerable to form action hijacking via the threeDSMethodNotificationURL parameter. This flaw allows attackers to change the destination website for form submissions, enabling data theft.

tags | exploit, xss
advisories | CVE-2024-25285
SHA-256 | dc98bb08a58bbfec1100b0b81febe49fd09487b8a8456933f842f161ab0d5757
3DSecure 2.0 3DS Authorization Method Cross Site Scripting
Posted Sep 12, 2024
Authored by Rubén López Herrera

Multiple reflected cross site scripting vulnerabilities in the 3DS Authorization Method of 3DSecure version 2.0 allow attackers to inject arbitrary web scripts via the threeDSMethodData parameter.

tags | exploit, web, arbitrary, vulnerability, xss
advisories | CVE-2024-25284
SHA-256 | 6d39badeee9ca588e282577f02ef7077faa513c136944eec8da9e5f0a73a67a8
3DSecure 2.0 3DS Authorization Challenge Cross Site Scripting
Posted Sep 12, 2024
Authored by Rubén López Herrera

Multiple reflected cross site scripting vulnerabilities exist in the 3DS Authorization Challenge of 3DSecure version 2.0. These flaws allow attackers to inject arbitrary web scripts, CSS, or HTML through the manipulation of the params parameter in the request URL.

tags | exploit, web, arbitrary, vulnerability, xss
advisories | CVE-2024-25283
SHA-256 | 5c49c8e7ecdf6ea8c0ca9ef4838d0136aa0e0903e7e668c089948442cca4d4d4
3DSecure 2.0 3DS Method Authentication Cross Site Scripting
Posted Sep 12, 2024
Authored by Rubén López Herrera

3DSecure version 2.0 is vulnerable to cross site scripting in its 3DSMethod Authentication. This vulnerability allows remote attackers to hijack the form action and change the destination website via the params parameter, which is base64 encoded and improperly sanitized.

tags | exploit, remote, xss
advisories | CVE-2024-25282
SHA-256 | 17cd30a43cadf4e0ba472bc1f4cadd560c5b65235a04affcc4271b43c4dc6065
Debian Security Advisory 5768-1
Posted Sep 12, 2024
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5768-1 - Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure.

tags | advisory, denial of service, arbitrary, info disclosure
systems | linux, debian
advisories | CVE-2024-8636, CVE-2024-8637, CVE-2024-8638, CVE-2024-8639
SHA-256 | 70403858627e4d47b4cd0877efdac30fb9f6d23926c76535c39787794a947584
Ubuntu Security Notice USN-7006-1
Posted Sep 12, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7006-1 - It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel, leading to a null pointer dereference vulnerability. A privileged local attacker could use this to possibly cause a denial of service. It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2021-46926, CVE-2023-52803, CVE-2023-52887, CVE-2024-24860, CVE-2024-26830, CVE-2024-26921, CVE-2024-26929, CVE-2024-36894, CVE-2024-36901, CVE-2024-36978, CVE-2024-37078, CVE-2024-39469, CVE-2024-39484, CVE-2024-39487
SHA-256 | bfa1f853c40c5f477c198c988120fbd6fe68320fbaf6055c26d7c823fb626082
Ubuntu Security Notice USN-7005-1
Posted Sep 12, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7005-1 - Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service.

tags | advisory, denial of service, arbitrary, kernel, local
systems | linux, ubuntu
advisories | CVE-2022-48772, CVE-2023-52884, CVE-2024-23848, CVE-2024-32936, CVE-2024-33619, CVE-2024-33621, CVE-2024-33847, CVE-2024-34027, CVE-2024-34030, CVE-2024-34777, CVE-2024-36015, CVE-2024-36270, CVE-2024-36286, CVE-2024-36478
SHA-256 | 16a95e0e8f80dad3e90b963e7b53b6853ba6f934f88bd2470c901fc0b1d3144e
Ubuntu Security Notice USN-7004-1
Posted Sep 12, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7004-1 - Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service.

tags | advisory, denial of service, arbitrary, kernel, local
systems | linux, ubuntu
advisories | CVE-2022-48772, CVE-2024-23848, CVE-2024-32936, CVE-2024-33619, CVE-2024-33621, CVE-2024-34027, CVE-2024-36015, CVE-2024-36244, CVE-2024-36286, CVE-2024-36288, CVE-2024-36478, CVE-2024-36479, CVE-2024-36484, CVE-2024-36489
SHA-256 | 431af02c0d9e5c558fd6375749c474c2ba15897d474ed112193b050613cb07f8
Ubuntu Security Notice USN-7001-1
Posted Sep 12, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7001-1 - Shang-Hung Wan discovered that Expat, contained within the xmltok library, did not properly handle certain function calls when a negative input length was provided. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. Shang-Hung Wan discovered that Expat, contained within the xmltok library, did properly handle the potential for an integer overflow on 32-bit platforms. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2024-45490, CVE-2024-45491
SHA-256 | dd777efeaab59422d2fe51b3d1cc0f03bc68451f5c70dd442a7b4f075550b945
Ubuntu Security Notice USN-7000-1
Posted Sep 12, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7000-1 - Shang-Hung Wan discovered that Expat did not properly handle certain function calls when a negative input length was provided. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code. Shang-Hung Wan discovered that Expat did properly handle the potential for an integer overflow on 32-bit platforms. An attacker could use this issue to cause a denial of service or possibly execute arbitrary code.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2024-45490
SHA-256 | e207f4963e040f92737087661cdcc67616d5a449bd2f500e15737c6170147628
Ubuntu Security Notice USN-7002-1
Posted Sep 12, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7002-1 - It was discovered that setuptools was vulnerable to remote code execution. An attacker could possibly use this issue to execute arbitrary code.

tags | advisory, remote, arbitrary, code execution
systems | linux, ubuntu
advisories | CVE-2024-6345
SHA-256 | 54bafb3e8bf0072a6b96f1e84af61e2aabfd6f0f55f7346007be3c20de65531f
Ubuntu Security Notice USN-7003-2
Posted Sep 12, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7003-2 - It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2023-52803, CVE-2024-36978, CVE-2024-37078, CVE-2024-38619, CVE-2024-39469, CVE-2024-39487, CVE-2024-39495, CVE-2024-39501, CVE-2024-39502, CVE-2024-39509, CVE-2024-40902, CVE-2024-40905, CVE-2024-40934, CVE-2024-40942
SHA-256 | b9ccf0915602448265ab710de51d14e93875c6b9ca20f10baf002ab90a58470e
Ubuntu Security Notice USN-7003-1
Posted Sep 12, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7003-1 - It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2023-52803, CVE-2023-52887, CVE-2024-36978, CVE-2024-39469, CVE-2024-39487, CVE-2024-39499, CVE-2024-39501, CVE-2024-39502, CVE-2024-39503, CVE-2024-39509, CVE-2024-40902, CVE-2024-40904, CVE-2024-40905, CVE-2024-40912
SHA-256 | 7d5b0465fc8b365d164e7403ac3a399c1d198dc1157f8ad403f32d2ffbadf1a2
Ubuntu Security Notice USN-6997-2
Posted Sep 12, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6997-2 - USN-6997-1 fixed a vulnerability in LibTIFF. This update provides the corresponding updates for Ubuntu 14.04 LTS. It was discovered that LibTIFF incorrectly handled memory. An attacker could possibly use this issue to cause the application to crash, resulting in a denial of service.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2024-7006
SHA-256 | 96ae5f484bf5f362eb5537aaba9e0c81e0f8f62b5f143ef1ce8ddc21845eea5b
Ubuntu Security Notice USN-6999-1
Posted Sep 12, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6999-1 - Chenyuan Yang discovered that the CEC driver driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to cause a denial of service.

tags | advisory, denial of service, arbitrary, kernel, local
systems | linux, ubuntu
advisories | CVE-2022-48772, CVE-2024-23848, CVE-2024-32936, CVE-2024-34027, CVE-2024-35247, CVE-2024-36015, CVE-2024-36244, CVE-2024-36270, CVE-2024-36286, CVE-2024-36288, CVE-2024-36477, CVE-2024-36478, CVE-2024-36479, CVE-2024-36484
SHA-256 | f2f3af31e74d781983843453894ecb4650b3d835bf822cc772b1ad0341cc9292
Red Hat Security Advisory 2024-6612-03
Posted Sep 12, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6612-03 - An update for fence-agents is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2024-6345
SHA-256 | 9c7ed1224c702d1a80b23ebe089033d5b875958334f7fb880d98fa2fb7464180
Nipah Virus Testing Management System 1.0 PHP Code Injection
Posted Sep 12, 2024
Authored by indoushka

Nipah Virus Testing Management System version 1.0 suffers from a php code injection vulnerability.

tags | exploit, php, virus
SHA-256 | 1d5d8ecfee17bb9d29a68547de9e3007c6fb30acdff37b24dca3f23a371620dd
Red Hat Security Advisory 2024-6611-03
Posted Sep 12, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6611-03 - An update for fence-agents is now available for Red Hat Enterprise Linux 9.2 Extended Update Support. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2024-6345
SHA-256 | 37a4f42a2a7af9a422d5eee44a78dd59470b8c43eba23a1311ee30521c90abbe
Red Hat Security Advisory 2024-6610-03
Posted Sep 12, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6610-03 - An update for git is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-32002
SHA-256 | af3dcd63af790a01b6d007e241dc033200460b9035e71823a5fb30b7ffcfd440
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    0 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close