what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 35 of 35 RSS Feed

Files Date: 2017-02-24 to 2017-02-25

Sophos Web Appliance 4.2.1.3 Block / Unblock
Posted Feb 24, 2017
Authored by Russell Sanford | Site metasploit.com

This Metasploit module exploits two separate remote command injection vulnerabilities in the Sophos Web Appliance versions 4.2.1.3 and below via the web administration interface. By sending a specially crafted request it's possible to inject system commands

tags | exploit, remote, web, vulnerability
advisories | CVE-2016-9553
SHA-256 | 7c4b3bbdbc3b0206bfe31759b404dcf843c219914e256a2ec58afefa528e061c
Siklu EtherHaul Remote Command Execution
Posted Feb 24, 2017
Authored by Ian Ling

Siklu Etherhaul versions prior to 7.4.0 suffer from an unauthenticated remote command execution vulnerability.

tags | advisory, remote
SHA-256 | 1488db4819cb3d631d5458d8303eb2a66ace7ffc1a16fa5a512858691028f7ce
Java / Python FTP URL Handling XXE / SSRF
Posted Feb 24, 2017
Authored by Timothy D. Morgan

Java and Python both have URL handling code that can be leveraged for XML external entity (XXE) injection and SSRF attacks.

tags | advisory, java, python, xxe
SHA-256 | 9f2a5aa311b233621706991238e47f4e31fc0b190ca89a1f42a16cfca5d09c4c
Ubuntu Security Notice USN-3210-1
Posted Feb 24, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3210-1 - Ben Hayak discovered that it was possible to make LibreOffice Calc and Writer disclose arbitrary files to an attacker if a user opened a specially crafted file with embedded links.

tags | advisory, arbitrary
systems | linux, ubuntu
SHA-256 | eb76a721c6b299a108a59454abfea2068bb742c16cf457993916607f6caffb98
Red Hat Security Advisory 2017-0309-01
Posted Feb 24, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0309-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix: Quick emulator built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the Qemu process resulting in DoS or potentially execute arbitrary code on the host with privileges of Qemu process on the host.

tags | advisory, arbitrary, kernel
systems | linux, redhat
advisories | CVE-2016-2857, CVE-2017-2615
SHA-256 | b208a03f917075e83c83e02b7c9d9e67d01004db93202ffd0e4666086e2e5fbc
Red Hat Security Advisory 2017-0307-01
Posted Feb 24, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0307-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: When creating audit records for parameters to executed children processes, an attacker can convince the Linux kernel audit subsystem can create corrupt records which may allow an attacker to misrepresent or evade logging of executing commands. A flaw was found in the Linux kernel's implementation of the SCTP protocol. A remote attacker could trigger an out-of-bounds read with an offset of up to 64kB potentially causing the system to crash.

tags | advisory, remote, kernel, protocol
systems | linux, redhat
advisories | CVE-2016-6136, CVE-2016-9555
SHA-256 | f5626e12bf318a6ceba6e16077d4ef1c50c6d37818aae8533ea4a67d5ff5c19a
Red Hat Security Advisory 2017-0316-01
Posted Feb 24, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0316-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol implementation freed SKB resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system.

tags | advisory, kernel, local, protocol
systems | linux, redhat
advisories | CVE-2017-6074
SHA-256 | b636031802de3b3dfef681e9912cabfab34e12ce63c092ae7a18e3a97f900150
Joomla JaJobBoard 1.5 SQL Injection
Posted Feb 24, 2017
Authored by Song-Dl Team

Joomla JaJobBoard component version 1.5 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | cfd28026a2c362b9c3e90599bf6cb5ce173e37fdc75ad2d90aa1c2e8ec890d0a
Synologic NAS IP Blocking Bypass
Posted Feb 24, 2017
Authored by bashis

Synologic NAS suffers from an IP blocking bypass vulnerability.

tags | exploit, bypass
SHA-256 | c05fd9b53966972f034228ae1c6b8442f84c27015716fc54eb3e8028bd12c158
Joomla Redshop 1.4 / 1.5 SQL Injection
Posted Feb 24, 2017
Authored by Song-Dl Team

Joomla Redshop component versions 1.4 and 1.5 suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7bce940bba1c54337da78e867025227f7e701372484e0d4567c3ea084407f9f1
Page 2 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close