exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2022-04-20

Ubuntu Security Notice USN-5380-1
Posted Apr 20, 2022
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 5380-1 - It was discovered that Bash did not properly drop privileges when the binary had the setuid bit enabled. An attacker could possibly use this issue to escalate privileges.

tags | advisory, bash
systems | linux, ubuntu
advisories | CVE-2019-18276
SHA-256 | 173a734aa620d03a2270533a7ff0022b9fb8a72908396d8604869220c0c5934d
Red Hat Security Advisory 2022-1418-01
Posted Apr 20, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1418-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include out of bounds write and privilege escalation vulnerabilities.

tags | advisory, kernel, vulnerability
systems | linux, redhat
advisories | CVE-2021-4083, CVE-2022-0492, CVE-2022-25636
SHA-256 | 2eab67c4f841bc45e94ce58e73ca60e7ba690017b6dcc37ecba54fb3786bc710
Red Hat Security Advisory 2022-1396-01
Posted Apr 20, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1396-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2014-3577, CVE-2019-13750, CVE-2019-13751, CVE-2019-17594, CVE-2019-17595, CVE-2019-18218, CVE-2019-19603, CVE-2019-20838, CVE-2019-5827, CVE-2020-12762, CVE-2020-13435, CVE-2020-14155, CVE-2020-16135, CVE-2020-24370, CVE-2020-25709, CVE-2020-25710, CVE-2021-0920, CVE-2021-20231, CVE-2021-20232, CVE-2021-21684, CVE-2021-22876, CVE-2021-22898, CVE-2021-22925, CVE-2021-23177, CVE-2021-28153, CVE-2021-31566
SHA-256 | 9c6ace15db6cc4f4efff553e069be87d1d00778ed7287b08bb97673bf221855f
Red Hat Security Advisory 2022-1410-01
Posted Apr 20, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1410-01 - 389 Directory Server is an LDAP version 3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line utilities for server administration. Issues addressed include a double free vulnerability.

tags | advisory, protocol
systems | linux, redhat
advisories | CVE-2021-4091
SHA-256 | 00d8f263c5a67a6419cc49d447c3b30bc580046d7f899df5f48c7064a3b97bda
Pharmacy Management System 1.0 SQL Injection
Posted Apr 20, 2022
Authored by Saud Alenazi

Pharmacy Management System version 1.l0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b2ac5f0a0cdae189b7f1c1f03185d0e51c01181165ffca2dbd936c8cdad92e26
Pharmacy Management System 1.0 Shell Upload
Posted Apr 20, 2022
Authored by Saud Alenazi

Pharmacy Management System version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 2da67c6c7a5c14228149e21e3cff2a8e2b144090f44d0181b62a6d2a34478852
Red Hat Security Advisory 2022-1413-01
Posted Apr 20, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1413-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include out of bounds write and privilege escalation vulnerabilities.

tags | advisory, kernel, vulnerability
systems | linux, redhat
advisories | CVE-2021-4083, CVE-2022-0492, CVE-2022-25636
SHA-256 | e29d570eaf4be8d9d8c2a0c59251fd78375f239719aba399dda2f75b42e91bc1
Red Hat Security Advisory 2022-1402-01
Posted Apr 20, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1402-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 2.6.10 RPMs.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-33195, CVE-2021-33197, CVE-2021-33198
SHA-256 | 4cec158739b9117fdffecab7b9b613061831e5b9a8fa9335e4a2eed7dc8f7945
Red Hat Security Advisory 2022-1407-01
Posted Apr 20, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1407-01 - The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.

tags | advisory
systems | linux, redhat
advisories | CVE-2022-27649, CVE-2022-27651
SHA-256 | f805a0b0aedc9fbac1aaed1357fd96e66d9cc6d389541b6085e18c85c05886db
Red Hat Security Advisory 2022-1394-01
Posted Apr 20, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1394-01 - Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-20288
SHA-256 | 5a262f5f2d3cfe9e08aa4ba53c72d6dd3f2eb2dcd7781f1c980412ff9059f134
Red Hat Security Advisory 2022-1417-01
Posted Apr 20, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-1417-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.

tags | advisory, kernel, vulnerability
systems | linux, redhat
advisories | CVE-2020-0466, CVE-2021-0920, CVE-2021-4155, CVE-2022-0492
SHA-256 | a1855a4358516ae7f91cd9312df1efeaeeb9fe1fe48d1dafbe1dd6848b141dd1
Online Restaurant Table Reservation System 1.0 SQL Injection
Posted Apr 20, 2022
Authored by segf0lt

Online Restaurant Table Reservation System version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 9786e22e643eb7efc042f92c739c3d4b2b26ceb6d4746288b46145dd91bace7a
7-Zip 16 DLL Hijacking
Posted Apr 20, 2022
Authored by Eduardo Braun Prado

7-Zip versions 16 and below, and possibly other software that utilizes the HTML Help System to display help content to the user, are prone to a remote DLL hijacking issue which leads to arbitrary code execution due to an OS issue.

tags | exploit, remote, arbitrary, code execution
systems | windows
SHA-256 | 8c60536ca33b8fdb99ab41432c7cbf8cf1095fba9f29c3616248979fbdc94e58
Jenkins Remote Code Execution
Posted Apr 20, 2022
Authored by Orange Tsai | Site github.com

Jenkins exploit that chains CVE-2018-1000861, CVE-2019-1003005 and CVE-2019-1003029 to a more reliable and elegant pre-auth remote code execution. Jenkins versions below 2.138 are affected.

tags | exploit, remote, code execution
advisories | CVE-2018-1000861, CVE-2019-1003005, CVE-2019-1003029
SHA-256 | 88ba245224ecb5e377bcb871672d6537579b9aeac8cedbca083b7f571fa1faea
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close