what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2016-08-23

WordPress Mail Master 1.0 Local File Inclusion
Posted Aug 23, 2016
Authored by Guillermo Garcia Marcos

WordPress Mail Masta plugin version 1.0 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 63387cb541f174b444a7c0e37d74f3dec4201dfc93508d9f643478d039b574db
VideoIQ Camera Remote File Disclosure
Posted Aug 23, 2016
Authored by Yakir Wizman

VideoIQ Camera suffers from a file disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 8e79e33a110bf5cbe4ed378d41e766eceeb6fad1f062efe99f993f25713829a2
Lynis Auditing Tool 2.3.3
Posted Aug 23, 2016
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Additions include OpenStack detection, an option to disable automatic refresh of software repository, and various other new features.
tags | tool, scanner
systems | unix
SHA-256 | f012b17b705b2963294163b16293b2c2f8e11f904a7352aec9ba693e48d7a700
Red Hat Security Advisory 2016-1655-01
Posted Aug 23, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1655-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager. Security Fix: Quick Emulator built with the Block driver for iSCSI images support is vulnerable to a heap buffer overflow issue. It could occur while processing iSCSI asynchronous I/O ioctl calls. A user inside guest could use this flaw to crash the Qemu process resulting in DoS or potentially leverage it to execute arbitrary code with privileges of the Qemu process on the host.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2016-5126, CVE-2016-5403
SHA-256 | 4aef31c589e9eb632262467a2391d662c3f9b8731a9caabe096c9d84b5c43a8b
Red Hat Security Advisory 2016-1654-01
Posted Aug 23, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1654-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager. Security Fix: Quick Emulator built with the Block driver for iSCSI images support is vulnerable to a heap buffer overflow issue. It could occur while processing iSCSI asynchronous I/O ioctl calls. A user inside guest could use this flaw to crash the Qemu process resulting in DoS or potentially leverage it to execute arbitrary code with privileges of the Qemu process on the host.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2016-5126, CVE-2016-5403
SHA-256 | be57c89124c98f2cea8b05cd613985cbc6e73e7db5d4fb67260fd412e521dc99
Red Hat Security Advisory 2016-1652-01
Posted Aug 23, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1652-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager. Security Fix: Quick emulator built with the virtio framework is vulnerable to an unbounded memory allocation issue. It was found that a malicious guest user could submit more requests than the virtqueue size permits. Processing a request allocates a VirtQueueElement and therefore causes unbounded memory allocation on the host controlled by the guest.

tags | advisory
systems | linux, redhat
advisories | CVE-2016-5403
SHA-256 | 539a4dbb0d044fdb2e69eddaa74656352db4a87fa6718104e121060c02136047
Red Hat Security Advisory 2016-1653-01
Posted Aug 23, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1653-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager. Security Fix: Quick Emulator built with the Block driver for iSCSI images support is vulnerable to a heap buffer overflow issue. It could occur while processing iSCSI asynchronous I/O ioctl calls. A user inside guest could use this flaw to crash the Qemu process resulting in DoS or potentially leverage it to execute arbitrary code with privileges of the Qemu process on the host.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2016-5126, CVE-2016-5403
SHA-256 | 784b309832846f10d29d70069df5da9ac9c80c535442ac182995d7d0b236dbb3
Microsoft Security Bulletin Revision Increment For August, 2016
Posted Aug 23, 2016
Site microsoft.com

This bulletin summary lists one bulletin that has undergone a major revision increment.

tags | advisory
SHA-256 | 5721a2c63ab52ed5630f76b062da98a13325a546d07e7b13238dec0c2a5606b7
Gnome Eye Of Gnome 3.10.2 Out-Of-Bounds Write
Posted Aug 23, 2016
Authored by Kaslov Dmitri

Gnome Eye of Gnome version 3.10.2 suffers from an out-of-bounds write vulnerability.

tags | exploit
advisories | CVE-2016-6855
SHA-256 | 6b42597bb574ccc34d7ba77488acc1f56ca5d1d0f62c3ce461004f30059cb46f
WordPress Bonkersbeat / Method / Awake Arbitrary File Download
Posted Aug 23, 2016
Authored by xBADGIRL21

WordPress Bonkersbeat theme version 1.0, Method theme version 1.8, and Awake theme version 3.2 suffer from an arbitrary file download vulnerability.

tags | exploit, arbitrary
SHA-256 | 377a2155b0b3a216d8785b603e4c0e98fe506d4f486ab4cbaece2ea45ce60a06
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close