exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2022-07-21

Ubuntu Security Notice USN-5529-1
Posted Jul 21, 2022
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 5529-1 - It was discovered that the Atheros ath9k wireless device driver in the Linux kernel did not properly handle some error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Yongkang Jia discovered that the KVM hypervisor implementation in the Linux kernel did not properly handle guest TLB mapping invalidation requests in some situations. An attacker in a guest VM could use this to cause a denial of service in the host OS.

tags | advisory, denial of service, arbitrary, kernel, local
systems | linux, ubuntu
advisories | CVE-2022-1652, CVE-2022-1679, CVE-2022-1789, CVE-2022-1852, CVE-2022-1973, CVE-2022-2078, CVE-2022-21123, CVE-2022-21125, CVE-2022-21166
SHA-256 | 900c9467490b73751623ae9022791a89235180da8de86cdb02eda9d2d8d16654
Chrome Scope Break
Posted Jul 21, 2022
Authored by Google Security Research, Mark Brand

Chrome has an issue where raw_ptr broke implicit scoped_refptr for receivers in base::Bind.

tags | exploit
advisories | CVE-2022-2156
SHA-256 | 608734695dfbbf56d37a25c6b0e92ec571e720ac20c50496dd9608c3ee36b587
Schneider Electric SpaceLogic C-Bus Home Controller (5200WHC2) Remote Root
Posted Jul 21, 2022
Authored by LiquidWorm | Site zeroscience.mk

Schneider Electric SpaceLogic C-Bus Home Controller (5200WHC2) versions 1.31.460 and below suffer from an authenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands as the root user via the name GET parameter in delsnap.pl Perl/CGI script which is used for deleting snapshots taken from the webcam.

tags | exploit, arbitrary, shell, cgi, root, perl
advisories | CVE-2022-34753
SHA-256 | d419b1daf53d0f565d05d6ba8ea75d7ee176ccb9140c55fa6180d7f9532dc155
CodoForum 5.1 Remote Code Execution
Posted Jul 21, 2022
Authored by Krish Pandey

CodoForum version 5.1 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2022-31854
SHA-256 | 045098f70a6461ea548965fba279c18d47668837e82112dbf85f351b43ee5baf
AIEngine 2.2.0
Posted Jul 21, 2022
Authored by Luis Campo Giralte | Site bitbucket.org

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

Changes: Fixed issue with tagging flows and issue with flow identifier on the API. Now shows the current script code over the API. Added parameter class to the help URI. Added Cache-Control header on the API. Improvements on the SSLProtocol. Multiple other updates.
tags | tool
systems | unix
SHA-256 | e51bc7defd4393939e716c60405cf72a4aa1c727b6ccde44784fd235022e5017
OctoBot WebInterface 0.4.3 Remote Code Execution
Posted Jul 21, 2022
Authored by Samy Younsi, Thomas Knudsen

OctoBot WebInterface version 0.4.3 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2021-36711
SHA-256 | e44b74ee9184e1f4fa497f4876744c69864ed4d789de8a18313422be9a4ad1c5
Kite 1.2021.610.0 Unquoted Service Path
Posted Jul 21, 2022
Authored by Ghaleb Al-otaibi

Kite version 1.2021.610.0 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | f6c26ab826fa44ce94b3128d1027703b3451aafa787d124ff97ae6903c5c30b1
Red Hat Security Advisory 2022-5673-01
Posted Jul 21, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-5673-01 - Red Hat OpenStack Platform 16.2 (Train) director operator containers, with several Important security fixes, are available for technology preview. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2021-3634, CVE-2021-3737, CVE-2021-40528, CVE-2021-41103, CVE-2021-4189, CVE-2021-43565, CVE-2022-1271, CVE-2022-1621, CVE-2022-1629, CVE-2022-22576, CVE-2022-25313, CVE-2022-25314, CVE-2022-26945, CVE-2022-27774
SHA-256 | e6a4b0b59b2757ea6ef380429f73c2819e182dbd4e1d06bf09b8c22eac8f952b
Dr. Fone 4.0.8 Unquoted Service Path
Posted Jul 21, 2022
Authored by Esant1490

Dr. Fone version 4.0.8 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | a395c8c5023e9fa3ade5d03f2adda3d54bb86b40825eb131695b52008175f74a
IOTransfer 4.0 Remote Code Execution
Posted Jul 21, 2022
Authored by Tomer Peled

IOTransfer version 4.0 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2022-24562
SHA-256 | c710e2da6c6ed4ef7a63d1d4f9778557d2652281b2fc26cee33fa39fd5d1ca51
DASDEC Cross Site Scripting / HTML Injection
Posted Jul 21, 2022
Authored by Ken Pyle

The Monroe Electronics / Digital Alert Systems OneNet SE DASDEC Emergency Alert System Appliance suffers from cross site scripting and html injection vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 82f6d98418853066b6a98235aa9b2f3a0913d729dcbf7cc7b1e70d395b6a8bad
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close