exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Recent Files

Files RSS Feed
RansomLord Anti-Ransomware Exploit Tool 3.1
Posted May 31, 2024
Authored by hyp3rlinx, malvuln | Site malvuln.com

RansomLord is a proof-of-concept tool that automates the creation of PE files, used to compromise ransomware pre-encryption. This tool uses dll hijacking to defeat ransomware by placing PE files in the x32 or x64 directories where the program is run from.

Changes: Stability enhancements. Updated some export functions for the x32 exploit DLL. Added -r flag to output a Sigma rule for detecting RansomLord activity using Windows event log.
tags | tool, encryption
Red Hat Security Advisory 2024-3527-03
Posted May 31, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-3527-03 - Red Hat AMQ Streams 2.7.0 is now available from the Red Hat Customer Portal. Issues addressed include buffer overflow, denial of service, integer overflow, memory leak, and resource exhaustion vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability, memory leak
systems | linux, redhat
Red Hat Security Advisory 2024-3513-03
Posted May 31, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-3513-03 - An update for less is now available for Red Hat Enterprise Linux 9. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
Red Hat Security Advisory 2024-3501-03
Posted May 31, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-3501-03 - An update for nghttp2 is now available for Red Hat Enterprise Linux 8. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
Red Hat Security Advisory 2024-3500-03
Posted May 31, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-3500-03 - An update for the ruby:3.0 module is now available for Red Hat Enterprise Linux 8. Issues addressed include HTTP response splitting and denial of service vulnerabilities.

tags | advisory, web, denial of service, vulnerability, ruby
systems | linux, redhat
Red Hat Security Advisory 2024-3497-03
Posted May 31, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-3497-03 - An update for edk2 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow
systems | linux, redhat
Packet Storm New Exploits For May, 2024
Posted May 31, 2024
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 68 exploits added to Packet Storm in May, 2024.

tags | exploit
Ubuntu Security Notice USN-6804-1
Posted May 31, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6804-1 - It was discovered that GNU C Library nscd daemon contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service. It was discovered that GNU C Library nscd daemon did not properly check the cache content, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service.

tags | advisory, denial of service, overflow, local
systems | linux, ubuntu
Ubuntu Security Notice USN-6803-1
Posted May 31, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6803-1 - Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 24.04 LTS. Zeng Yunxiang and Song Jiaxuan discovered that FFmpeg incorrectly handled certain input files. An attacker could possibly use this issue to cause FFmpeg to crash, resulting in a denial of service, or potential arbitrary code execution. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10 and Ubuntu 24.04 LTS.

tags | advisory, denial of service, arbitrary, code execution
systems | linux, ubuntu
jSQL Injection 0.97
Posted May 31, 2024
Authored by ron190 | Site github.com

jSQL Injection is a lightweight application used to find database information from a distant server. jSQL Injection is also part of the official penetration testing distribution Kali Linux and is included in various other distributions like Pentest Box, Parrot Security OS, ArchStrike and BlackArch Linux. This is the source code release.

Changes: Restored automatic issue report.
tags | tool, scanner, sql injection
systems | linux, unix
Ubuntu Security Notice USN-6802-1
Posted May 31, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6802-1 - Lukas Fittl discovered that PostgreSQL incorrectly performed authorization in the built-in pg_stats_ext and pg_stats_ext_exprs views. An unprivileged database user can use this issue to read most common values and other statistics from CREATE STATISTICS commands of other users.

tags | advisory
systems | linux, ubuntu
changedetection 0.45.20 Remote Code Execution
Posted May 31, 2024
Authored by Zach Crosman

changedetection versions 0.45.20 and below suffer from a remote code execution vulnerability.

tags | exploit, remote, code execution
Online Payment Hub System 1.0 SQL Injection
Posted May 31, 2024
Authored by Hamit Avşar

Online Payment Hub System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
Ubuntu Security Notice USN-6801-1
Posted May 31, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6801-1 - It was discovered that PyMySQL incorrectly escaped untrusted JSON input. An attacker could possibly use this issue to perform SQL injection attacks.

tags | advisory, sql injection
systems | linux, ubuntu
Ubuntu Security Notice USN-6800-1
Posted May 31, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6800-1 - It was discovered that browserify-sign incorrectly handled an upper bound check in signature verification. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to perform a signature forgery attack.

tags | advisory, remote
systems | linux, ubuntu
BWL Advanced FAQ Manager 2.0.3 SQL Injection
Posted May 31, 2024
Authored by Ivan Spiridonov

BWL Advanced FAQ Manager version 2.0.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
iMLog Cross Site Scripting
Posted May 31, 2024
Authored by Gabriel Felipe

iMLog versions prior to 1.307 suffer from a persistent cross site scripting vulnerability.

tags | exploit, xss
Check Point Security Gateway Information Disclosure
Posted May 31, 2024
Authored by Yesith Alvarez

Check Point Security Gateway suffers from an information disclosure vulnerability. Versions affected include R77.20 (EOL), R77.30 (EOL), R80.10 (EOL), R80.20 (EOL), R80.20.x, R80.20SP (EOL), R80.30 (EOL), R80.30SP (EOL), R80.40 (EOL), R81, R81.10, R81.10.x, and R81.20.

tags | exploit, info disclosure
Aquatronica Control System 5.1.6 Password Disclosure
Posted May 30, 2024
Authored by LiquidWorm | Site zeroscience.mk

Aquatronica Control System version 5.1.6 has a tcp.php endpoint on the controller that is exposed to unauthenticated attackers over the network. This vulnerability allows remote attackers to send a POST request which can reveal sensitive configuration information, including plaintext passwords. This can lead to unauthorized access and control over the aquarium controller, compromising its security and potentially allowing attackers to manipulate its settings.

tags | exploit, remote, php, tcp
Progress Flowmon 12.3.5 Local sudo Privilege Escalation
Posted May 30, 2024
Authored by Dave Yesland | Site metasploit.com

This Metasploit module abuses a feature of the sudo command on Progress Flowmon. Certain binary files are allowed to automatically elevate with the sudo command. This is based off of the file name. This includes executing a PHP command with a specific file name. If the file is overwritten with PHP code it can be used to elevate privileges to root. Progress Flowmon up to at least version 12.3.5 is vulnerable.

tags | exploit, root, php
Falco 0.38.0
Posted May 30, 2024
Authored by Sysdig | Site sysdig.org

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about Falco as a mix between snort, ossec and strace.

Changes: 3 breaking changes, 14 major changes, 13 minor changes, 8 bug fixes, and 5 non-user facing changes.
tags | tool, intrusion detection
systems | unix
Debian Security Advisory 5700-1
Posted May 30, 2024
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5700-1 - An SQL injection was discovered in pymysql, a pure Python MySQL driver.

tags | advisory, sql injection, python
systems | linux, debian
Akaunting 3.1.8 Client-Side Template Injection
Posted May 30, 2024
Authored by tmrswrr

Akaunting version 3.1.8 suffers from a client-side template injection vulnerability.

tags | exploit
Akaunting 3.1.8 Server-Side Template Injection
Posted May 30, 2024
Authored by tmrswrr

Akaunting version 3.1.8 suffers from a server-side template injection vulnerability.

tags | exploit
Ubuntu Security Notice USN-6798-1
Posted May 30, 2024
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6798-1 - It was discovered that GStreamer Base Plugins incorrectly handled certain EXIF metadata. An attacker could possibly use this issue to execute arbitrary code or cause a crash.

tags | advisory, arbitrary
systems | linux, ubuntu
View Older Files →

Recent News

News RSS Feed
Information Of Hundreds Of European Politicians Found On Dark Web
Posted May 31, 2024

tags | headline, hacker, government, privacy
Okta Says Customer Identity Cloud Prone To Credential Stuffing Attacks
Posted May 31, 2024

tags | headline, password
Law Enforcement Operation Takes Aim At An Often Overlooked Cybercrime Lynchpin
Posted May 31, 2024

tags | headline, hacker, government, malware, cybercrime, fraud
Trump Guilty On All 34 Felony Counts
Posted May 30, 2024

tags | headline, government, usa, fraud
Australia Looking Into Alleged Ticketmaster Hack
Posted May 30, 2024

tags | headline, hacker, privacy, australia, data loss, fbi
Critics Of Putin And His Allies Targeted With Spyware Inside The EU
Posted May 30, 2024

tags | headline, government, phone, russia, cyberwar, israel, spyware
Massive 911 S5 Botnet Dismantled, Mastermind Arrested
Posted May 30, 2024

tags | headline, hacker, government, china, botnet
FBCS Data Breach Impact Grows To 3.2 Million Individuals
Posted May 30, 2024

tags | headline, hacker, privacy, data loss
Researchers Crack 11-Year-Old Password, Recover $3 Million In Bitcoin
Posted May 30, 2024

tags | headline, hacker, password, cryptography
BreachForums Returns Just Weeks After FBI-Led Takedown
Posted May 29, 2024

tags | headline, hacker, government, privacy, usa, data loss, password, fbi
View More News →

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    18 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    6 Files
  • 28
    May 28th
    12 Files
  • 29
    May 29th
    31 Files
  • 30
    May 30th
    22 Files
  • 31
    May 31st
    18 Files

Top Authors In Last 30 Days

File Tags

Systems

News Tags

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close