An attacker with authenticated access to VICIdial version 2.14-917a as an agent can execute arbitrary shell commands as the root user. This attack can be chained with CVE-2024-8503 to execute arbitrary shell commands starting from an unauthenticated perspective.
6b4666c70098b4747658896c605a4f2b8c41c41c51144da20cf5be37e90a20b0
An unauthenticated attacker can leverage a time-based SQL injection vulnerability in VICIdial version 2.14-917a to enumerate database records. By default, VICIdial stores plaintext credentials within the database.
4fe5d734ae07a38eb7770811089de30239da19ca25794be8de02bb80d866aa1f
Ubuntu Security Notice 6998-1 - It was discovered that Unbound incorrectly handled string comparisons, which could lead to a NULL pointer dereference. An attacker could potentially use this issue to cause a denial of service. It was discovered that Unbound incorrectly handled memory in cfg_mark_ports, which could lead to a heap buffer overflow. A local attacker could potentially use this issue to cause a denial of service or execute arbitrary code.
f9d7762439d9245eff0c00af6fb809547380b48c103aed24fe549548f865477c
Red Hat Security Advisory 2024-6576-03 - An update for the redhat-ds:11 module is now available for Red Hat Directory Server 11.7 for RHEL 8. Issues addressed include a denial of service vulnerability.
0583bb40e27ecb0ffbca1114c32c6314946f4515238a91f959006043a7c68f28
Red Hat Security Advisory 2024-6569-03 - An update for the 389-ds:1.4 module is now available for Red Hat Enterprise Linux 8. Issues addressed include a denial of service vulnerability.
f7870aeb4f2189bc1cada0fc774da9e3e402eb5e83b14dd67d72f35f125ab21d
Red Hat Security Advisory 2024-6568-03 - An update for the redhat-ds:11 module is now available for Red Hat Directory Server 11.9 for RHEL 8.10. Issues addressed include a denial of service vulnerability.
18985816f2bf0929dbdd311c6e23ce41d61577dfdcdd5eba51f207e2b5a4de6f
Red Hat Security Advisory 2024-6567-03 - An update for kernel is now available for Red Hat Enterprise Linux 9. Issues addressed include double free, out of bounds access, and use-after-free vulnerabilities.
73ba58e8b2c6052b593c6fb445dd707735b93ca10409c2ca5bddbe6d0e9d33d4
Red Hat Security Advisory 2024-6560-03 - An update for kpatch-patch-4_18_0-477_43_1 and kpatch-patch-4_18_0-477_67_1 is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include a denial of service vulnerability.
110111420fca5b27675719809d900e21331211ece82b14b689401e86feb15903
Red Hat Security Advisory 2024-6559-03 - An update for the postgresql:12 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.
26c29d044340ee5eca9d445232b79d08cbbd2c1b870fce3dff6c3b5d95337aac
Red Hat Security Advisory 2024-6558-03 - An update for the postgresql:13 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.
78dcbc9a640a5f99153fec695bbcd6dc85e4659d166fb40c80b4022e7a087665
Red Hat Security Advisory 2024-6557-03 - An update for the postgresql:13 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.
8f6d80264fe3fbcadb304473cea5e7af122f6df6f5e40465a1a00fcd06491ae9
Red Hat Security Advisory 2024-6536-03 - Red Hat AMQ Streams 2.5.2 is now available from the Red Hat Customer Portal. Issues addressed include bypass, denial of service, information leakage, and memory leak vulnerabilities.
23b49efbd7916c5974eb6db215d5509a479bc0ee8d71846efc578a942c4754fd
Red Hat Security Advisory 2024-6529-03 - An update for dovecot is now available for Red Hat Enterprise Linux 9. Issues addressed include denial of service and resource exhaustion vulnerabilities.
9245cf7d9889622bb3d80b7fa77825a018ea17bdcba3aace98c68229c33d4413
Queuing Simple Chatbot version 1.0 suffers from a remote shell upload vulnerability.
1ac1abe713bae44f313173560ae4b2399dcbac5f41ce3ca8ddd25b5daa57b3ff
Profiling System version 1.0 suffers from a remote shell upload vulnerability.
63f7cdb039e829c25285d0ad8ecd14b888386b6d2f06ebc4b1945e056ed8cd64
Passion Responsive Blogging version 1.0 suffers from a cross site scripting vulnerability.
d018857c74fe94b61772f381b1c65cf98c7545a26d4e10a537baa1ba622950b2
Online Survey System version 1.0 suffers from cross site scripting and remote file inclusion vulnerabilities.
0573d4aa4fad74ba21dfae8c95d8a0ef8922ce6bbbf5c65fcd1a8b98424e3d9e
Online Birth Certificate System version 1.0 suffers from an ignored default credential vulnerability.
c7135c363265f519cec4fb4469d88770d47f7406243e7711a2ef7aca6159b30a
Medical Card Generations System version 1.0 suffers from an ignored default credential vulnerability.
548b7135e2e243d5d128158ec4a8510b49b16082fb38de180bdb2e26aeaff932
Emergency Ambulance Hiring Portal version 1.0 suffers from a WYSIWYG code injection vulnerability.
7b43b9d23f12307ed0da163a4b20cc1867ad452d0156731cd3972715a734a359
Printable Staff ID Card Creator System version 1.0 suffers from an insecure direct object reference vulnerability.
1f76023e1ce2b532a638fe37cd83cacdb3aa9015435641c743140013ed4ffc9f