exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 32 of 32 RSS Feed

Files Date: 2016-11-08 to 2016-11-09

Ultra Light Blog SQL Injection
Posted Nov 8, 2016
Authored by N_A

Ultra Light Blog suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | f9559af881d4b39a12960858ed2517695333f390a6f467b57f41c58224c05869
NodCMS Cross Site Request Forgery
Posted Nov 8, 2016
Authored by Ashiyane Digital Security Team

NodCMS suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 3b7e867219759fa2650e56394b4d14f4564a07f7ffc8b2827debc16993ab329f
Piwik 2.16.0 PHP Object Injection
Posted Nov 8, 2016
Authored by EgiX | Site karmainsecurity.com

Piwik version 2.16.0 and below suffer from a saveLayout PHP object injection vulnerability.

tags | exploit, php
SHA-256 | dcdc3544bfe63cc9a6b25f372b4bc6e23956e5ffd828ff6d48ff75fb585630b0
Red Hat Security Advisory 2016-2672-01
Posted Nov 8, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2672-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 54.0.2840.90. Security Fix: A flaw was found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2016-5198
SHA-256 | dac19fbea22cf3217435aeef34e03ddb9b098b2400578a0694b80acf7b0bf6e2
Red Hat Security Advisory 2016-2671-01
Posted Nov 8, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2671-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager. The following packages have been upgraded to a newer upstream version: qemu-kvm-rhev. Security Fix: An out-of-bounds flaw was found in the QEMU emulator built using 'address_space_translate' to map an address to a MemoryRegionSection. The flaw could occur while doing pci_dma_read/write calls, resulting in an out-of-bounds read-write access error. A privileged user inside a guest could use this flaw to crash the guest instance.

tags | advisory
systems | linux, redhat
advisories | CVE-2015-8817, CVE-2015-8818
SHA-256 | 0c890acf0e4f2b7498b17f69f9a093176a6101177409f1bc1b5ee87aa09878b9
Red Hat Security Advisory 2016-2670-01
Posted Nov 8, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2670-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager. The following packages have been upgraded to a newer upstream version: qemu-kvm-rhev. Security Fix: An out-of-bounds flaw was found in the QEMU emulator built using 'address_space_translate' to map an address to a MemoryRegionSection. The flaw could occur while doing pci_dma_read/write calls, resulting in an out-of-bounds read-write access error. A privileged user inside a guest could use this flaw to crash the guest instance.

tags | advisory
systems | linux, redhat
advisories | CVE-2015-8817, CVE-2015-8818
SHA-256 | d50c120347826cd5e2ca4f6659fbb3d76e5dcd8c32ab3857ca951d6ea6b710e5
DBShield 1.0.0 Beta 4
Posted Nov 8, 2016
Authored by Nima Ghotbi | Site github.com

DBShield version 1.0.0 Beta 4 is a database firewall that protects the system by inspecting incoming queries from your application server and rejecting abnormal ones.

tags | tool
systems | unix
SHA-256 | 6dab3c16e409dbc9a4f9384d02237f33f7ec7b6d6c32cbccc725ce7535c8bed9
Page 2 of 2
Back12Next

File Archive:

February 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    16 Files
  • 2
    Feb 2nd
    19 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    10 Files
  • 8
    Feb 8th
    25 Files
  • 9
    Feb 9th
    37 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    20 Files
  • 14
    Feb 14th
    25 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    6 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    35 Files
  • 20
    Feb 20th
    25 Files
  • 21
    Feb 21st
    18 Files
  • 22
    Feb 22nd
    15 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    10 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close