what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 135,788 RSS Feed

Files

CUPS IPP Attributes LAN Remote Code Execution
Posted Nov 22, 2024
Authored by Spencer McIntyre, RageLtMan, Simone Margaritelli, Ryan Emmons | Site metasploit.com

This Metasploit module exploits vulnerabilities in OpenPrinting CUPS, which is running by default on most Linux distributions. The vulnerabilities allow an attacker on the LAN to advertise a malicious printer that triggers remote code execution when a victim sends a print job to the malicious printer. Successful exploitation requires user interaction, but no CUPS services need to be reachable via accessible ports. Code execution occurs in the context of the lp user. Affected versions are cups-browsed less than or equal to 2.0.1, libcupsfilters versions 2.1b1 and below, libppd versions 2.1b1 and below, and cups-filters versions 2.0.1 and below.

tags | exploit, remote, vulnerability, code execution
systems | linux
advisories | CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, CVE-2024-47177
SHA-256 | 16431cc7dbb038947f886cccbda9ff1e8abb4ffdc1cbb4066839871766422f13
ProjectSend R1605 Unauthenticated Remote Code Execution
Posted Nov 22, 2024
Site metasploit.com

This Metasploit module exploits an improper authorization vulnerability in ProjectSend versions r1295 through r1605. The vulnerability allows an unauthenticated attacker to obtain remote code execution by enabling user registration, disabling the whitelist of allowed file extensions, and uploading a malicious PHP file to the server.

tags | exploit, remote, php, code execution
SHA-256 | e395c3372dc6eda5878d64b4b3e2b759c5bfaffe8d57ca9fdfd36a0bab7bf55b
needrestart Local Privilege Escalation
Posted Nov 22, 2024
Authored by Qualys Security Advisory

Qualys discovered that needrestart suffers from multiple local privilege escalation vulnerabilities that allow for root access from an unprivileged user.

tags | exploit, local, root, vulnerability
advisories | CVE-2024-10224, CVE-2024-11003, CVE-2024-48990, CVE-2024-48991, CVE-2024-48992
SHA-256 | 5e1a7285b40cf60a49ec4d0075d1398f00688905145e895ec8cd09d0cc0d9564
fronsetia 1.1 Cross Site Scripting
Posted Nov 22, 2024
Authored by Andrey Stoykov

fronsetia version 1.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | bbfd522cfd5160099d31a809ca9257e08bb97dcc37b7bf13572eb09dcfd1ed25
fronsetia 1.1 XML Injection
Posted Nov 22, 2024
Authored by Andrey Stoykov

fronsetia version 1.1 suffers from an XML external entity injection vulnerability.

tags | exploit
SHA-256 | 172877845afd1a0942227a2a28e855668aafeacdb04ad37754aebeccf82f3a9d
PowerVR psProcessHandleBase Reuse
Posted Nov 22, 2024
Authored by Jann Horn, Google Security Research

PowerVR has an issue where PVRSRVAcquireProcessHandleBase() can cause psProcessHandleBase reuse when PIDs are reused.

tags | exploit
advisories | CVE-2024-50066
SHA-256 | 18d88674b2b9ce3ddaccd51818379af5893ab0c36e6eb07d67ee93245da55ea8
Linux 6.6 Race Condition
Posted Nov 22, 2024
Authored by Jann Horn, Google Security Research

A security-relevant race between mremap() and THP code has been discovered. Reaching the buggy code typically requires the ability to create unprivileged namespaces. The bug leads to installing physical address 0 as a page table, which is likely exploitable in several ways: For example, triggering the bug in multiple processes can probably lead to unintended page table sharing, which probably can lead to stale TLB entries pointing to freed pages.

tags | exploit
advisories | CVE-2024-50066
SHA-256 | d415d186ac0cd0e8590e6af8e512c75a753a301cb3c1ff5d14ad6ae5cf28a43e
Korenix JetPort 5601 1.2 Path Traversal
Posted Nov 22, 2024

Korenix JetPort 5601 version 1.2 suffers from a path traversal vulnerability.

tags | exploit
advisories | CVE-2024-11303
SHA-256 | eff7e4d263326b019575dc31027a65c20b18d4241b61e5bb7f9dcd9114150ac6
SEH utnserver Pro 20.1.22 Cross Site Scripting
Posted Nov 22, 2024
Site fhstp.ac.at

SEH utnservyer Pro version 20.1.22 suffers from multiple persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2024-11304
SHA-256 | 8a817f7a2f70f702d665df042fc9c3e7290ebdec05e9d80aed3e21cb27a39f2b
Faraday 5.9.0
Posted Nov 22, 2024
Authored by Francisco Amato | Site github.com

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Added more validations to attachments. Removed license_version from init.py. Added a configurable limit to the retrieval of vulnerabilities. Added the description field to evidence attachments in the VulnerabilitySchema. Fixed vulnerability deletion when it has more than one command associated.
tags | tool, rootkit
systems | unix
SHA-256 | 30b3b1062287c7e55a12390a34c85d5cdfb4bd7d90aaa2c4218e3319a9a8f1ff
Ubuntu Security Notice USN-7015-6
Posted Nov 22, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7015-6 - USN-7015-5 fixed vulnerabilities in python2.7. The update introduced several minor regressions. This update fixes the problem. It was discovered that the Python email module incorrectly parsed email addresses that contain special characters. A remote attacker could possibly use this issue to bypass certain protection mechanisms. It was discovered that Python allowed excessive backtracking while parsing certain tarfile headers. A remote attacker could possibly use this issue to cause Python to consume resources, leading to a denial of service. It was discovered that the Python email module incorrectly quoted newlines for email headers. A remote attacker could possibly use this issue to perform header injection. It was discovered that the Python http.cookies module incorrectly handled parsing cookies that contained backslashes for quoted characters. A remote attacker could possibly use this issue to cause Python to consume resources, leading to a denial of service. It was discovered that the Python zipfile module incorrectly handled certain malformed zip files. A remote attacker could possibly use this issue to cause Python to stop responding, resulting in a denial of service.

tags | advisory, remote, web, denial of service, vulnerability, python
systems | linux, ubuntu
advisories | CVE-2023-27043, CVE-2024-6232, CVE-2024-6923, CVE-2024-7592, CVE-2024-8088
SHA-256 | 667ae966414c566b7ba032fe92060c7e3cfb42504b259cece2ff73a5eb36f7f3
Ubuntu Security Notice USN-7120-3
Posted Nov 22, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7120-3 - Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.

tags | advisory, kernel
systems | linux, ubuntu
advisories | CVE-2024-43882
SHA-256 | 57646a3034886c2e86bcd31eac59da5e06ae61f49b9a18b53b079814bb1416c0
Debian Security Advisory 5812-2
Posted Nov 22, 2024
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5812-2 - The postgresql minor release shipped in DSA 5812 introduced an ABI break, which has been reverted so that extensions do not need to be rebuilt.

tags | advisory
systems | linux, debian
SHA-256 | 119fdfa54487759cb1de347360df65467051a83c5fce14cae4cc4a6a0ec9f835
Proxmark3 4.19552 Custom Firmware
Posted Nov 22, 2024
Authored by Christian Herrmann | Site github.com

This is a custom firmware written for the Proxmark3 device. It extends the currently available firmware. This release is nicknamed "Orca".

Changes: Hitag 1, Hitag S, 8211 functionality. Simulate ISO14443a AID. Improved iCLASS config card generation. Updated to LUA5.4. Bambu 3d filament KDF. Many bugs and bad habits fixed.
tags | tool
systems | unix
SHA-256 | 43f0f5ddbbca478c5be33a6392847a99e2fda47b0a2d21e89fed4a918808f405
Apple Web Content Filter Bypass
Posted Nov 22, 2024
Site nosebeard.co

Nosebeard Labs has identified a critical vulnerability in the Apple system wide web content filter that allows a full bypass of content restrictions. This vulnerability, which occurs specifically when Screen Time content filtering settings are enabled, permits users or attackers to access restricted websites in Safari without detection. The timeline in this advisory is probably the most interesting thing to note. It shows a Fortune 10 ignoring a concern for years until a news article gets written, and that is truly disappointing. Do better Tim.

tags | advisory, web
systems | apple
advisories | CVE-2024-44206
SHA-256 | dac23cf7b975a01eefba7d69a286e43f5f4af5b56cf17d643a27e418ee7e60ed
Red Hat Security Advisory 2024-9806-03
Posted Nov 22, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-9806-03 - Red Hat build of Apache Camel 4.4.4 for Spring Boot release and security update is now available. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2024-51132
SHA-256 | e5a1fe2a8a8abdba703cd554ce001244eeb6964bb505e9270a87878516a76a06
Apple Security Advisory 11-19-2024-5
Posted Nov 22, 2024
Authored by Apple | Site apple.com

Apple Security Advisory 11-19-2024-5 - macOS Sequoia 15.1.1 addresses code execution vulnerabilities.

tags | advisory, vulnerability, code execution
systems | apple
advisories | CVE-2024-44308, CVE-2024-44309
SHA-256 | 673b14a99725a70874faebe9587a107cc5fbae5423965b93d84ad6e8a0b21673
Red Hat Security Advisory 2024-9738-03
Posted Nov 22, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-9738-03 - An update for squid is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2024-45802
SHA-256 | f7656d072370c3688e9739dc85e0c57665ef6fec0943e29f4003051d03d50389
Red Hat Security Advisory 2024-9729-03
Posted Nov 22, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-9729-03 - An update for squid is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2024-45802
SHA-256 | 034666b474cdc0aae94a16911d0fc7dc56e80cb2640bbd89bd15e923f0f8de1e
Red Hat Security Advisory 2024-9690-03
Posted Nov 22, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-9690-03 - An update for tigervnc is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include buffer overflow and privilege escalation vulnerabilities.

tags | advisory, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2024-9632
SHA-256 | e06e4b3943cb9cd32e98e0796f2b8793271bd95d04ead69e6376bb29edfd77b0
Apple Security Advisory 11-19-2024-4
Posted Nov 22, 2024
Authored by Apple | Site apple.com

Apple Security Advisory 11-19-2024-4 - iOS 17.7.2 and iPadOS 17.7.2 addresses code execution vulnerabilities.

tags | advisory, vulnerability, code execution
systems | apple, ios
advisories | CVE-2024-44308, CVE-2024-44309
SHA-256 | 25e2616d143e5a6c02a25baf655b4c3ddde1a0de992a7276ba8e26c156982841
Red Hat Security Advisory 2024-9689-03
Posted Nov 22, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-9689-03 - An update for binutils is now available for Red Hat Enterprise Linux 8. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow
systems | linux, redhat
advisories | CVE-2018-12699
SHA-256 | 6b09897810addb43dd9a56838b03ec57ada28cede64e21984c80bf9d46fe9c83
Red Hat Security Advisory 2024-9679-03
Posted Nov 22, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-9679-03 - An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Issues addressed include code execution, out of bounds read, and use-after-free vulnerabilities.

tags | advisory, vulnerability, code execution
systems | linux, redhat
advisories | CVE-2022-32885
SHA-256 | a072c4a79a7fba3d9f798f6c536dc83e6ba851f5eaf528700d2eb523fe8015bd
Red Hat Security Advisory 2024-9678-03
Posted Nov 22, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-9678-03 - An update for squid is now available for Red Hat Enterprise Linux 9.4 Extended Update Support. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2024-45802
SHA-256 | 42ac9bf77ddc647502727f158429f1b9c2f42491324154ec31d91d09aba212fa
Apple Security Advisory 11-19-2024-3
Posted Nov 22, 2024
Authored by Apple | Site apple.com

Apple Security Advisory 11-19-2024-3 - iOS 18.1.1 and iPadOS 18.1.1 addresses code execution vulnerabilities.

tags | advisory, vulnerability, code execution
systems | apple, ios
advisories | CVE-2024-44308, CVE-2024-44309
SHA-256 | 1811cd2f89b56c17afd3dd246138796cc0278ab19801137b1d427a1c4b2ee94b
Page 1 of 5,432
Back12345Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close