what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files Date: 2024-10-04

Zeek 6.0.8
Posted Oct 4, 2024
Authored by Robin Sommer, Vern Paxson | Site zeek.org

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

Changes: Adding to the POP3 hardening in 6.0.7, the parser now simply discards too many pending commands, rather than any attempting to process them. Further, invalid server responses do not result in command completion anymore. Processing out-of-order commands or finishing commands based on invalid server responses could result in inconsistent analyzer state, potentially triggering null pointer references for crafted traffic.
tags | tool, intrusion detection
systems | unix
SHA-256 | 39e6293f11ec9f7d38e08f2eb076a436f384c9bb45ce026f60a4154064f6c1e0
ABB Cylon Aspect 3.07.02 Authenticated File Disclosure
Posted Oct 4, 2024
Authored by LiquidWorm | Site zeroscience.mk

ABB Cylon Aspect version 3.07.02 suffers from an authenticated arbitrary file disclosure vulnerability. Input passed through the file GET parameter through the downloadDb.php script is not properly verified before being used to download database files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks.

tags | exploit, arbitrary, php
SHA-256 | bdeb7b96ce0490816b5aff85c7d91a69137f224971e0d812190f2924733b54d4
Debian Security Advisory 5784-1
Posted Oct 4, 2024
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5784-1 - Fabian Vogt reported that the PAM module in oath-toolkit, a collection of components to build one-time password authentication systems, does not safely perform file operations in users's home directories when using the usersfile feature (allowing to place the OTP state in the home directory of the to-be-authenticated user). A local user can take advantage of this flaw for root privilege escalation.

tags | advisory, local, root
systems | linux, debian
advisories | CVE-2024-47191
SHA-256 | 630b245f04eb1a7ff0cfa42251496c38ea3ce7b755c4c145ac3252c552e621aa
Debian Security Advisory 5783-1
Posted Oct 4, 2024
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5783-1 - Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code.

tags | advisory, web, arbitrary
systems | linux, debian
advisories | CVE-2024-9392, CVE-2024-9393, CVE-2024-9394, CVE-2024-9401
SHA-256 | d6e973db117eecd0774e6df97f98106f30600a1abd447da40462c767ea65fcb3
TeamViewer Privilege Escalation
Posted Oct 4, 2024
Authored by Peter Gabaldon | Site github.com

Proof of concept code for a flaw in TeamViewer that enables an unprivileged user to load an arbitrary kernel driver into the system.

tags | exploit, arbitrary, kernel, proof of concept
advisories | CVE-2024-7479, CVE-2024-7481
SHA-256 | 8e84c906525cb3028d5e2434a5ce1ee9c2d79ef078f6024e17e16888fa959853
Ubuntu Security Notice USN-7053-1
Posted Oct 4, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7053-1 - It was discovered that ImageMagick incorrectly handled certain malformed image files. If a user or automated system using ImageMagick were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or potentially leak sensitive information. These vulnerabilities included heap and stack-based buffer overflows, memory leaks, and improper handling of uninitialized values.

tags | advisory, denial of service, overflow, vulnerability, memory leak
systems | linux, ubuntu
advisories | CVE-2019-13135, CVE-2019-13301, CVE-2019-13307, CVE-2019-13454, CVE-2019-16708, CVE-2019-16712, CVE-2019-7175
SHA-256 | c46fa2a8f39b4ff10e8c0dddf0bf320de57a6dc38c9be5fef165226cc363c4a8
Debian Security Advisory 5782-1
Posted Oct 4, 2024
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5782-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

tags | advisory, denial of service, kernel, vulnerability
systems | linux, debian
advisories | CVE-2023-31083, CVE-2024-27017, CVE-2024-35937, CVE-2024-35943, CVE-2024-35966, CVE-2024-40972, CVE-2024-41016, CVE-2024-41096, CVE-2024-41098, CVE-2024-42228, CVE-2024-42314, CVE-2024-43835, CVE-2024-43859, CVE-2024-43884
SHA-256 | 6b1995cd75513141f3e03b2f430413db5d1f10bd1835463af1502d9622c439b4
Ubuntu Security Notice USN-7055-1
Posted Oct 4, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7055-1 - Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl discovered that FreeRADIUS incorrectly authenticated certain responses. An attacker able to intercept communications between a RADIUS client and server could possibly use this issue to forge responses, bypass authentication, and access network devices and services. This update introduces new configuration options called "limit_proxy_state" and "require_message_authenticator" that default to "auto" but should be set to "yes" once all RADIUS devices have been upgraded on a network.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2024-3596
SHA-256 | 271871d1420a0528a26685e8ce5cbcd406f9ca78469177524e1728fd0cf2771e
MD-Pro 1.0.76 Shell Upload / SQL Injection
Posted Oct 4, 2024
Authored by Emiliano Febbi

MD-Pro version 1.0.76 suffers from remote SQL injection and shell upload vulnerabilities.

tags | exploit, remote, shell, vulnerability, sql injection
SHA-256 | b641856919de4d5b0a61bc35a8e30fb6042f78f529af33b52af81ec5d5f73c4e
Computer Laboratory Management System 2024 1.0 Cross Site Scripting
Posted Oct 4, 2024
Authored by nu11secur1ty

Computer Laboratory Management System 2024 version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 1fcd86678b2635e2cdd7247396f54562591ba9b9d9952cdb8f0ee3191c2cbf7a
Ubuntu Security Notice USN-7054-1
Posted Oct 4, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7054-1 - It was discovered that unzip did not properly handle unicode strings under certain circumstances. If a user were tricked into opening a specially crafted zip file, an attacker could possibly use this issue to cause unzip to crash, resulting in a denial of service, or possibly execute arbitrary code.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2021-4217
SHA-256 | f929b28b770364cb20cced4b9f7c68ae7cbf43c718918fb91835f47e7343078f
Acronis Cyber Infrastructure 5.0.1-61 Cross Site Request Forgery
Posted Oct 4, 2024
Authored by indoushka

Acronis Cyber Infrastructure version 5.0.1-61 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | c2eceedb5e5bb0efa35e17bc56bd524328eb69b0a4975863b7ddd165b1b73695
Vehicle Service Management System 1.0 WYSIWYG Code Injection
Posted Oct 4, 2024
Authored by indoushka

Vehicle Service Management System version 1.0 suffers from a WYSIWYG code injection vulnerability.

tags | exploit
SHA-256 | daeb244d9db94e371d9cc2e37a40f07b6ca949b734ea683afcbe95ac4b4ca130
Vehicle Service Management System 1.0 Code Injection
Posted Oct 4, 2024
Authored by indoushka

Vehicle Service Management System version 1.0 suffers from a PHP code injection vulnerability.

tags | exploit, php
SHA-256 | f9fcf44105743a3a54ea4970cafe882eab97bba4a5694154f79b99123f25e133
Transport Management System 1.0 Arbitrary File Upload
Posted Oct 4, 2024
Authored by indoushka

Transport Management System version 1.0 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | 1cd66e393ca7966dfbaac0ad1a1b3a444b9752a015b512e8517095c91f4717e2
Transport Management System 1.0 Code Injection
Posted Oct 4, 2024
Authored by indoushka

Transport Management System version 1.0 suffers from a PHP code injection vulnerability.

tags | exploit, php
SHA-256 | cd5dd78857336257ee61bcf76cd477a9fa12e3c595be519cef024af5bed57cdb
ManageEngine ADManager 7183 Password Hash Disclosure
Posted Oct 4, 2024
Authored by indoushka

ManageEngine ADManager version 7183 suffers from a password hash disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | ddade0c8d44290aca9a54f0c1621504614026325fdfa745fc4d9c008c6feca03
fastrpc_mmap_create Use-After-Free
Posted Oct 4, 2024
Authored by Google Security Research, Seth Jenkins

A condition exists when fastrpc_mmap_create creates a new globally visible mapping that can lead to a use-after-free.

tags | exploit
advisories | CVE-2024-33060
SHA-256 | f676785fdf4478de819b5665c9ba33c67535e75932f2e0c3889dcb7a0811f410
fastrpc_mmap_find Information Leak
Posted Oct 4, 2024
Authored by Google Security Research, Seth Jenkins

An incorrect searching algorithm in fastrpc_mmap_find can lead to kernel address space information leaks.

tags | advisory, kernel
advisories | CVE-2024-33060
SHA-256 | 46fa1c601050810eb66a262de97a8b9a9dbe879e08b68141820f5aeffa5d1da5
Android qrtr_bpf_filter_detach Double-Free / Use-After-Free
Posted Oct 4, 2024
Authored by Google Security Research

There appears to be some (possibly deprecated) code associated with AF_QIPCRTR sockets in bpf_service.c. Within this file are some ioctl handlers - e.g. qrtr_bpf_filter_attach and qrtr_bpf_filter_detach. In the case of qrtr_bpf_filter_detach, the global pointer bpf_filter is fetched and freed while only holding a socket lock (and an irrelevant rcu_read_lock) - this may lead directly to double frees or use-after-free (kernel memory corruption) if a malicious user is able to call the QRTR_DETTACH_BPF ioctl on multiple AF_QIPCRTR sockets at once. Based on Android SELinux files, it appears this may be possible from some lower-privileged vendor and HAL services.

tags | advisory, kernel
advisories | CVE-2024-38401
SHA-256 | 9a1258e6adb1b608d6d8bf4e2c0f15fb713920d26890f57e49ad4ff67b1e99c1
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close