what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files Date: 2024-10-10

ABB Cylon Aspect 3.08.01 persistenceManagerAjax.php Directory Traversal
Posted Oct 10, 2024
Authored by LiquidWorm | Site zeroscience.mk

ABB Cylon Aspect version 3.08.01 has a directory traversal vulnerability that can be exploited by an unauthenticated attacker to list the contents of arbitrary directories without reading file contents, leading to information disclosure of directory structures and filenames. This may expose sensitive system details, aiding in further attacks. The issue lies in the listFiles() function of the persistenceManagerAjax.php script, which calls PHP's readdir() function without proper input validation of the directory POST parameter.

tags | exploit, arbitrary, php, info disclosure
SHA-256 | 6fe5412f92cf9da09187b01562243fec9b9cf0b1251cbfd3a890fd1a773702c5
Palo Alto Networks GlobalProtect Local Privilege Escalation
Posted Oct 10, 2024
Authored by Johannes Greil, Michael Baer | Site sec-consult.com

Palo Alto Networks GlobalProtect versions 5.1.x, 5.2.x, 6.0.x, 6.1.x, 6.3.x and versions less than 6.2.5 suffer from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2024-9473
SHA-256 | bdf5f12114d9810353407e9bf2aa69dff68a900d64bc056a6fe658b1f27ea756
Wireshark Analyzer 4.4.1
Posted Oct 10, 2024
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

Changes: Reload framing fixes. AppleTalk fix. Allows saving files with Qt 6.8. Donation page added. Update VELOS and rSeries platform identifiers for f5fileinfo. Various other updates and fixes.
tags | tool, sniffer, protocol
systems | windows, unix
SHA-256 | 2b9e96572a7002c3e53b79683cf92f8172217e64c17ecaaf612eb68c2a7556ec
Ubuntu Security Notice USN-7061-1
Posted Oct 10, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7061-1 - Hunter Wittenborn discovered that Go incorrectly handled the sanitization of environment variables. An attacker could possibly use this issue to run arbitrary commands. Sohom Datta discovered that Go did not properly validate backticks as Javascript string delimiters, and did not escape them as expected. An attacker could possibly use this issue to inject arbitrary Javascript code into the Go template.

tags | advisory, arbitrary, javascript
systems | linux, ubuntu
advisories | CVE-2023-24531, CVE-2023-24538, CVE-2023-29402, CVE-2023-29403, CVE-2023-29404, CVE-2023-29405, CVE-2023-29406, CVE-2023-39319, CVE-2023-39325, CVE-2024-24785
SHA-256 | 366aa6bc269ca28c4b992ad13527bd77d7968a9ad5dcd84915ed51954acbe4c1
Ubuntu Security Notice USN-7022-3
Posted Oct 10, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7022-3 - Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.

tags | advisory, kernel
systems | linux, ubuntu
advisories | CVE-2021-47188, CVE-2024-26677, CVE-2024-26787, CVE-2024-27012, CVE-2024-38570, CVE-2024-42160, CVE-2024-42228
SHA-256 | abe3896117665188580a1dbccbf924257f2bb30260e8e6292a0ede48e9e053f6
Ubuntu Security Notice USN-7060-1
Posted Oct 10, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7060-1 - It was discovered that EDK II did not check the buffer length in XHCI, which could lead to a stack overflow. A local attacker could potentially use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. Laszlo Ersek discovered that EDK II incorrectly handled recursion. A remote attacker could possibly use this issue to cause EDK II to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

tags | advisory, remote, denial of service, overflow, local
systems | linux, ubuntu
advisories | CVE-2019-0161, CVE-2021-28210, CVE-2021-28211, CVE-2021-38575, CVE-2021-38578, CVE-2022-1292
SHA-256 | 4da85379bce0bd996f69858bb941555e77ae2c4f4a4eeb00ea9f355b115bb3ed
Debian Security Advisory 5787-1
Posted Oct 10, 2024
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5787-1 - Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure.

tags | advisory, denial of service, arbitrary, info disclosure
systems | linux, debian
advisories | CVE-2024-9602, CVE-2024-9603
SHA-256 | f4228d9be2e94b5178c0ed22259a02e549ea50feae6bfd6228876d967a2f1977
Ubuntu Security Notice USN-7059-1
Posted Oct 10, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 7059-1 - Fabian Vogt discovered that OATH Toolkit incorrectly handled file permissions. A remote attacker could possibly use this issue to overwrite root owned files, leading to a privilege escalation attack.

tags | advisory, remote, root
systems | linux, ubuntu
advisories | CVE-2024-47191
SHA-256 | a238ccdfc4dd16f55ee4565782ae895c255c561f32b8e490049e5e3041d303d0
Android GKI Kernels Use-After-Free
Posted Oct 10, 2024
Authored by Jann Horn, Google Security Research

Android GKI kernels contain broken non-upstream Speculative Page Faults MM code that can lead to use-after-free conditions.

tags | exploit, kernel
advisories | CVE-2023-20937
SHA-256 | 66f3d20525ff0676542d2ca32e25362978413e0665982d4a600608e52b0a2fcf
Red Hat Security Advisory 2024-7958-03
Posted Oct 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-7958-03 - An update for firefox is now available for Red Hat Enterprise Linux 9. Issues addressed include a use-after-free vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-9680
SHA-256 | cf56dcaf4106898501c231eb5b6e2d40d23a617ee4a0cf0f16c80eeafe647fda
Red Hat Security Advisory 2024-7875-03
Posted Oct 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-7875-03 - An update for net-snmp is now available for Red Hat Enterprise Linux 9.2 Extended Update Support. Issues addressed include buffer overflow and null pointer vulnerabilities.

tags | advisory, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2022-24805
SHA-256 | bfb4f424d33f632351116317ccc496f237de754375206c1277443c5a6f1922b5
Red Hat Security Advisory 2024-7869-03
Posted Oct 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-7869-03 - An update for.NET 8.0 is now available for Red Hat Enterprise Linux 9. Issues addressed include code execution and denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability, code execution
systems | linux, redhat
advisories | CVE-2024-38229
SHA-256 | 0362279b75a2628874ca61c29a2f1b53c2f1041de5e5b0b0578f08131524462d
Red Hat Security Advisory 2024-7868-03
Posted Oct 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-7868-03 - An update for.NET 8.0 is now available for Red Hat Enterprise Linux 8. Issues addressed include code execution and denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability, code execution
systems | linux, redhat
advisories | CVE-2024-38229
SHA-256 | 76429578bbb0ceed040c04152fe294b3388c64cd241ad4b03527ed4fd5c21a46
Red Hat Security Advisory 2024-7867-03
Posted Oct 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-7867-03 - An update for.NET 6.0 is now available for Red Hat Enterprise Linux 9. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2024-43483
SHA-256 | e8ca91e87cbffbe6cef3f92b63caefa2394939c1abdc349c42edba3a6baf0cee
Red Hat Security Advisory 2024-7861-03
Posted Oct 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-7861-03 - An update to the images for Red Hat build of Apicurio Registry is now available from the Red Hat Container Catalog. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Issues addressed include a code execution vulnerability.

tags | advisory, registry, code execution
systems | linux, redhat
advisories | CVE-2024-47561
SHA-256 | e76013bfc832f63d8d448637cc58cb22ea429d3fae6f530c4cdb59d7133ddb37
Red Hat Security Advisory 2024-7856-03
Posted Oct 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-7856-03 - An update for thunderbird is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support. Issues addressed include bypass and denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
advisories | CVE-2024-9392
SHA-256 | c2e8f5f911eac42ae59fdfa7e8258cb32a1d7091bbd6b7bc7dc3f63fc7800d10
Red Hat Security Advisory 2024-7854-03
Posted Oct 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-7854-03 - An update for thunderbird is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service. Issues addressed include bypass and denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
advisories | CVE-2024-9392
SHA-256 | 95ca81691ca97832a0802a6c5e3b066045e2c06e140d254b8e177b9a701d809d
Red Hat Security Advisory 2024-7852-03
Posted Oct 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-7852-03 - An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.

tags | advisory
systems | linux, redhat
advisories | CVE-2024-34156
SHA-256 | 6f821c3ab8a8cfb7877610a0c982d1f114fb350a53d231d6688c12de4b495935
Red Hat Security Advisory 2024-7594-03
Posted Oct 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-7594-03 - Red Hat OpenShift Container Platform release 4.15.36 is now available with updates to packages and images that fix several bugs and add enhancements. Issues addressed include code execution and out of bounds write vulnerabilities.

tags | advisory, vulnerability, code execution
systems | linux, redhat
advisories | CVE-2024-2961
SHA-256 | 0dfe4d19fbde52ed6143060e174763f2cd2e09cc8c746123999ba05fcdfc864d
I2P 2.7.0
Posted Oct 10, 2024
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Seven bug fixes applied.
tags | tool
systems | unix
SHA-256 | 54eebdb1cfdbe6aeb1f60e897c68c6b2921c36ce921350d45d21773256c99874
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close