exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2024-09-09

Microsoft Windows DWM Core Library Privilege Escalation
Posted Sep 9, 2024
Authored by ricnar456 | Site github.com

Proof of concept code for the Microsoft Windows DWM Core library elevation of privilege vulnerability. The researcher shows how they reversed the patch, how the heap overflow is produced, and overall gives a complete walk through of their process.

tags | exploit, overflow, proof of concept
systems | windows
advisories | CVE-2024-30051
SHA-256 | ae21b7b798fa9141cefb1411db92e94dfef6796823599323e49ec4cfcc3f7c0d
Stegano 0.11.4
Posted Sep 9, 2024
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: Added a parameter, close_file, to lsb.reveal in order to specify if the file must be closed at the end of the processing.
tags | tool, encryption, steganography, python
systems | unix
SHA-256 | 81c5da92bf3f55c9e71cb8923bf2e39a85511e493d5d41a0e6352368125a8969
Packet Fence 14.0.0
Posted Sep 9, 2024
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Debian 12 support and OSQuery support with FleetDM added. Enhancements include firewall SSO clustering load-balancing, domains clustering high-availability, updated Caddy, and VoIP support in Aruba CX. Fixed Aruba Deauth. Fixed a remote code execution vulnerability. External library updates.
tags | tool, remote
systems | unix
SHA-256 | 7326092bf804496d146a229be5fb1e57dd952fdab80fa37ee541e9c946c27380
Ubuntu Security Notice USN-6995-1
Posted Sep 9, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6995-1 - Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass security restrictions, cross-site tracing, or execute arbitrary code. It was discovered that Thunderbird did not properly manage certain memory operations when processing graphics shared memory. An attacker could potentially exploit this issue to escape the sandbox.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2024-7519, CVE-2024-7522, CVE-2024-7525, CVE-2024-7526, CVE-2024-7527, CVE-2024-7529, CVE-2024-8381, CVE-2024-8382, CVE-2024-8384
SHA-256 | eab68a333f804e9e74b44016fbdb0398f12ab2987a9d060158306b72c60f40cc
Breaking Oracle Database VPD Through DDL Permissions In 19c
Posted Sep 9, 2024
Authored by Emad Al-Mousa

By having specific DDL permissions set in Oracle 19c, you can bypass access restrictions normally in place for VPD (virtual private database).

tags | exploit
SHA-256 | ff60854406414096e014384dc484cf5d2a0ecd59484b16d36d5fb5dd40a2a5f3
Debian Security Advisory 5767-1
Posted Sep 9, 2024
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5767-1 - Multiple security issues were discovered in Thunderbird, which could result in the execution of arbitrary code.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2024-8381, CVE-2024-8382, CVE-2024-8383, CVE-2024-8384
SHA-256 | 60996d272ed48c920b8f9e946790d7306e140e8aebc151985a38ddad0243b76c
PPDB 2.4-update 6118-1 SQL Injection
Posted Sep 9, 2024
Authored by indoushka

PPDB version 2.4-update 6118-1 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 9d523a1c4c7a1e4958bb28bea2acec5647cfe8b259c7789ee6c3b10177fbb4d5
POMS 1.0 Insecure Settings
Posted Sep 9, 2024
Authored by indoushka

POMS version 1.0 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | e96b4926531826f22ee72eeb7f339d7761192178a35f69af5d5141abbc8b63c1
Pharmacy Management System version 1.0 Insecure Settings
Posted Sep 9, 2024
Authored by indoushka

Pharmacy Management System version version 1.0 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | 6c367c1c4b085e72851f370194180a14f132217419dbc26645d989d1f50bd05c
PDF Generator Web Application 1.0 Insecure Settings
Posted Sep 9, 2024
Authored by indoushka

PDF Generator Web Application version 1.0 suffers from an ignored default credential vulnerability.

tags | exploit, web
SHA-256 | ea0edf3e01f27c48e18ff7db4471b92d0d058e7c65718cf02003efd67a75fb49
Park Ticketing Project 1.0 SQL Injection
Posted Sep 9, 2024
Authored by indoushka

Park Ticketing Project version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection, bypass
SHA-256 | 1273e992f54e38d81032650942cf05f0d1f6d8b4728541c4e226b2c694587317
Online Travel Agency System 1.0 Insecure Settings
Posted Sep 9, 2024
Authored by indoushka

Online Travel Agency System version 1.0 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | 33fc5279701fd33248284f756fca51419cb1e797d0158e5bc05d6612e87f5c60
Online Tours and Travels Management System 1.0 Insecure Settings
Posted Sep 9, 2024
Authored by indoushka

Online Tours and Travels Management System version 1.0 suffers from an ignored default credential vulnerability.

tags | exploit
SHA-256 | 4a5b9ca0712889f86abf481cbffe6181dc9758a00fca6adde682fe4a8dea1f53
Online Survey System 1.0 SQL Injection
Posted Sep 9, 2024
Authored by indoushka

Online Survey System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection, bypass
SHA-256 | 0660b2849a4e1a0328a3532eed3666413e8e50508288962d63eca364d91fe25c
Red Hat Security Advisory 2024-6428-03
Posted Sep 9, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6428-03 - An update is now available for Red Hat Ansible Automation Platform 2.4. Issues addressed include denial of service, memory exhaustion, remote SQL injection, and traversal vulnerabilities.

tags | advisory, remote, denial of service, vulnerability, sql injection
systems | linux, redhat
advisories | CVE-2024-5569
SHA-256 | e32ebece28e682f0d6e2ba1d7822205327b5a5e583c21260fc3117f4b4668f27
Red Hat Security Advisory 2024-6421-03
Posted Sep 9, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6421-03 - An update for bubblewrap and flatpak is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-42472
SHA-256 | d73945d71c8a39907a717dca31d7cb395f984fb7e81cc28cb8258a1e68db2149
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close