what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2024-10-24

Vendure Arbitrary File Read / Denial Of Service
Posted Oct 24, 2024
Authored by EQSTLab, Rajesh Sharma | Site github.com

Vendure is an open-source headless commerce platform. Prior to versions 3.0.5 and 2.3.3, a vulnerability in Vendure's asset server plugin allows an attacker to craft a request which is able to traverse the server file system and retrieve the contents of arbitrary files, including sensitive data such as configuration files, environment variables, and other critical data stored on the server. In the same code path is an additional vector for crashing the server via a malformed URI. Patches are available in versions 3.0.5 and 2.3.3. Some workarounds are also available. One may use object storage rather than the local file system, e.g. MinIO or S3, or define middleware which detects and blocks requests with urls containing /../.

tags | exploit, arbitrary, local
advisories | CVE-2024-48914
SHA-256 | 44947878b2d27713e2c8036a90034febca1e8b498dc37d99f640f1008b48d55c
Helakuru 1.1 DLL Hijacking
Posted Oct 24, 2024
Authored by surajhacx | Site github.com

Helakuru version 1.1 suffers from a dll hijacking vulnerability.

tags | exploit
advisories | CVE-2024-48605
SHA-256 | c948a58766be8e07099dc1e1402078c875f9a5c41b2c068d990631f3151d4322
Grafana Remote Code Execution
Posted Oct 24, 2024
Authored by z3k0sec | Site github.com

This repository contains a Python script that exploits a remote code execution vulnerability in Grafana's SQL Expressions feature. By leveraging insufficient input sanitization, this exploit allows an attacker to execute arbitrary shell commands on the server. This is made possible through the shellfs community extension, which can be installed and loaded by an attacker to facilitate command execution.

tags | exploit, remote, arbitrary, shell, code execution, python
advisories | CVE-2024-9264
SHA-256 | 6c3c16d85296d769a797c9f8ac23b3a50fdbb1f53c416a6022ded19352c4bb10
Roundcube Webmail Cross Site Scripting
Posted Oct 24, 2024
Authored by bartfroklage | Site github.com

Roundcube Webmail versions prior to 1.5.7 and 1.6.x prior to 1.6.7 allows cross site scripting via SVG animate attributes.

tags | exploit, xss
advisories | CVE-2024-37383
SHA-256 | dc71460d24c437cda38fd047a0e4e29cce5e5d6c2af3bf1147fa95b383f6f0a8
pfSense 2.5.2 Cross Site Scripting
Posted Oct 24, 2024
Authored by EQSTLab, physicszq | Site github.com

A cross site scripting vulnerability in pfsense version 2.5.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the $pconfig variable at interfaces_groups_edit.php.

tags | exploit, web, arbitrary, php, xss
advisories | CVE-2024-46538
SHA-256 | 8ffa9a2a9e36932b192f5259bd78d63cc5dfdd4bd174ea8cf7e0b3c07013638f
Red Hat Security Advisory 2024-8374-03
Posted Oct 24, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-8374-03 - An update for python3.11 is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-6232
SHA-256 | 6a30cd45a7566ae8091c3893ed1e7701548b9afc4157175474255c34e8cd9759
Red Hat Security Advisory 2024-8365-03
Posted Oct 24, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-8365-03 - An update for python-idna is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service, python
systems | linux, redhat
advisories | CVE-2024-3651
SHA-256 | 771a0cffec63d58697ebfac0c9da561de583650615466fedd5c486224d2b4705
Red Hat Security Advisory 2024-8238-03
Posted Oct 24, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-8238-03 - Red Hat OpenShift Container Platform release 4.14.39 is now available with updates to packages and images that fix several bugs and add enhancements.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-9341
SHA-256 | 23d8da180dea07e31c581880e6945eaa0e461dbd4dd607498abbdc4cb85ab564
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close