Security
Headlines
HeadlinesLatestCVEs

Source

Packet Storm

Event Script 2.1 Cross Site Scripting

Event Script version 2.1 suffers from a cross site scripting vulnerability.

Packet Storm
#sql#xss#vulnerability#web#php#auth#ssh
Classified Ads Script 1.8 Cross Site Scripting

Classified Ads Script version 1.8 suffers from a cross site scripting vulnerability.

Red Hat Security Advisory 2023-3853-01

Red Hat Security Advisory 2023-3853-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.

GuestBook Script 2.2 Cross Site Scripting

GuestBook Script version 2.2 suffers from a cross site scripting vulnerability.

Red Hat Security Advisory 2023-3813-01

Red Hat Security Advisory 2023-3813-01 - An update for mtr-operator-bundle-container, mtr-operator-container, mtr-web-container, and mtr-web-executor-container is now available for Migration Toolkit for Runtimes 1 on RHEL 8.

Alumni Club Management Tools 2.2.7 SQL Injection

Alumni Club Management Tools version 2.2.7 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

Debian Security Advisory 5439-1

Debian Linux Security Advisory 5439-1 - Several vulnerabilities were discovered in BIND, a DNS server implementation.

Rocket LMS 1.7 Cross Site Scripting

Rocket LMS version 1.7 suffers from a persistent cross site scripting vulnerability.

WordPress LearnDash LMS 4.6.0 Insecure Direct Object Reference

WordPress LearnDash LMS version 4.6.0 suffers from an insecure direct object reference vulnerability.

Apache Druid JNDI Injection Remote Code Execution

This Metasploit module is designed to exploit the JNDI injection vulnerability in Druid. The vulnerability specifically affects the indexer/v1/sampler interface of Druid, enabling an attacker to execute arbitrary commands on the targeted server. The vulnerability is found in Apache Kafka clients versions ranging from 2.3.0 to 3.3.2. If an attacker can manipulate the sasl.jaas.config property of any of the connector's Kafka clients to com.sun.security.auth.module.JndiLoginModule, it allows the server to establish a connection with the attacker's LDAP server and deserialize the LDAP response. This provides the attacker with the capability to execute java deserialization gadget chains on the Kafka connect server, potentially leading to unrestricted deserialization of untrusted data or even remote code execution (RCE) if there are relevant gadgets in the classpath. To facilitate the exploitation process, this module will initiate an LDAP server that the target server needs to connect to in...