what you don't know can hurt you
Showing 1 - 22 of 22 RSS Feed

Files Date: 2012-04-03

Red Hat Security Advisory 2012-0451-01
Posted Apr 3, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0451-01 - The RPM Package Manager is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Multiple flaws were found in the way RPM parsed package file headers. An attacker could create a specially-crafted RPM package that, when its package header was accessed, or during package signature verification, could cause an application using the RPM library to crash or, potentially, execute arbitrary code.

tags | advisory, arbitrary
systems | linux, redhat
advisories | CVE-2012-0060, CVE-2012-0061, CVE-2012-0815
MD5 | e1ebdafc731a17c30fafb41f24928280
Secunia Security Advisory 48603
Posted Apr 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Wonderware Information Server and Invensys Wonderware Historian Client, which can be exploited by malicious people to conduct cross-site scripting attacks, conduct SQL injection attacks, bypass certain security restrictions, and compromise a vulnerable system.

tags | advisory, vulnerability, xss, sql injection
MD5 | 118b7fb7138a87a3501e63fac2934cb5
Secunia Security Advisory 48368
Posted Apr 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Christian Landstr

tags | advisory, local
MD5 | 93e18e64a677154840141baddbd652b6
Secunia Security Advisory 48697
Posted Apr 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for JBoss Enterprise BRMS Platform. This fixes a security issue and two vulnerabilities, which can be exploited by malicious people to manipulate certain data and disclose potentially sensitive information.

tags | advisory, vulnerability
systems | linux, redhat
MD5 | cc2ea67aefc1cfa36aabd8b76ffa0810
Secunia Security Advisory 48656
Posted Apr 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Vulnerability Lab has discovered multiple vulnerabilities in FlatnuX NEXT CMS, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site request forgery attacks.

tags | advisory, vulnerability, csrf
MD5 | a2e5531beeaa12d016d0f26941396b22
Secunia Security Advisory 48692
Posted Apr 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HP has issued an update for Java in HP-UX. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability
systems | hpux
MD5 | 76d3ca93766e3e56d1bcb4ec772c34d5
Secunia Security Advisory 48683
Posted Apr 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue and a vulnerability have been reported in Joomla!, which can be exploited by malicious people to disclose potentially sensitive information and conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 4077f6526a4246379c96da25ece83a8e
Secunia Security Advisory 48676
Posted Apr 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Vulnerability Lab has discovered a vulnerability in FlatnuX CMS, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | e43da3f006d0f3d4a70b8eccce40aba6
Secunia Security Advisory 47335
Posted Apr 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with an unknown impact has been reported in the Another WordPress Classifieds Plugin for WordPress.

tags | advisory
MD5 | 3788f9f0070b1f9c092805d250d811aa
Secunia Security Advisory 47855
Posted Apr 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Andrei Costin has discovered a vulnerability in Ghostscript, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | ea9283bd2ef443d84bc4d395160c3274
Secunia Security Advisory 48688
Posted Apr 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for aptdaemon. This fixes a security issue, which can be exploited by malicious people to bypass certain security features.

tags | advisory
systems | linux, ubuntu
MD5 | a5fcbc27b52f18124720e150c6922f73
Secunia Security Advisory 48699
Posted Apr 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness and multiple vulnerabilities have been reported in HP Onboard Administrator, where one has unknown impacts and the others can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, manipulate certain data, and potentially compromise a vulnerable system.

tags | advisory, spoof, vulnerability
MD5 | dea28755a090c7007207789036a3ff82
Secunia Security Advisory 48617
Posted Apr 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HP has acknowledged a security issue and multiple vulnerabilities in HP Business Availability Center, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
MD5 | e287e71af6336045589e94a1feff2fa8
Secunia Security Advisory 48687
Posted Apr 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP-UX, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | hpux
MD5 | 6796bd8379c4cabd6b7a6799b4a7a69c
Secunia Security Advisory 48653
Posted Apr 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for linux-mvl-dove. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, ubuntu
MD5 | 93b1c2f34f84fec5feca705e2715f2b5
Packet Storm New Exploits For March, 2012
Posted Apr 3, 2012
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 348 exploits added to Packet Storm in March, 2012.

tags | exploit
systems | linux
MD5 | b4e6bab08c56e5c7127fda77429eeb2e
GNU Transport Layer Security Library 3.0.18
Posted Apr 3, 2012
Authored by Simon Josefsson, Nikos Mavrogiannopoulos | Site gnu.org

GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.

Changes: This is a bugfix release on the current stable branch. It includes date-related (Y2K38) fixes, a fix for older VIA processors, and adds new APIs related to extraction of session random numbers and certificate parsing.
tags | protocol, library
MD5 | f46539a39857012ccc338a59beb4ac46
OATH Toolkit 1.12.1
Posted Apr 3, 2012
Site nongnu.org

OATH Toolkit attempts to collect several tools that are useful when deploying technologies related to OATH, such as HOTP one-time passwords. It is a fork of the earlier HOTP Toolkit.

Changes: This release adds an oathtool --base32 parameter to decode base32 keys. Verbose output (oathtool -v) now prints key data in base32 format too. Base32 and hex encoding functions have been added to liboath. This release uses gnulib's snprintf for better portability.
tags | tool
systems | unix
MD5 | 8416e50a93efe1b7a08b66c1fd93e71b
Mandriva Linux Security Advisory 2012-049
Posted Apr 3, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-049 - Cross-site scripting vulnerability in statusmap.c in statusmap.cgi in Nagios 3.2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the layer parameter. The updated packages have been patched to correct this issue.

tags | advisory, remote, web, arbitrary, cgi, xss
systems | linux, mandriva
advisories | CVE-2011-1523
MD5 | 0adfbd93180851208cfc2c88d83dc68a
Mandriva Linux Security Advisory 2012-048
Posted Apr 3, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-048 - Mutt does not verify that the smtps server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof an SSL SMTP server via an arbitrary certificate, a different vulnerability than CVE-2009-3766. The updated packages have been patched to correct this issue.

tags | advisory, arbitrary, spoof
systems | linux, mandriva
advisories | CVE-2011-1429
MD5 | 094e0433b81f45554fb44dcaf700bb9f
Red Hat Security Advisory 2012-0441-01
Posted Apr 3, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0441-01 - JBoss Enterprise BRMS Platform is a business rules management system for the management, storage, creation, modification, and deployment of JBoss Rules. This roll up patch serves as a cumulative upgrade for JBoss Enterprise BRMS Platform 5.2.0. It includes various bug fixes and enhancements. The following security issues are also fixed with this release: It was found that RESTEasy was vulnerable to XML External Entity attacks. If a remote attacker submitted a request containing an external XML entity to a RESTEasy endpoint, the entity would be resolved, allowing the attacker to read files accessible to the user running the application server. This flaw affected DOM Document and JAXB input.

tags | advisory, remote, xxe
systems | linux, redhat
advisories | CVE-2011-4314, CVE-2012-0818
MD5 | a89039a4a91c060565a037962444f37e
Ubuntu Security Notice USN-1414-1
Posted Apr 3, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1414-1 - It was discovered that Aptdaemon incorrectly handled installing packages without performing a transaction simulation. An attacker could possibly use this flaw to install altered packages.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2012-0944
MD5 | 64ff1a909bbc2ee4a1296abeb7965a1a
Page 1 of 1
Back1Next

File Archive:

August 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    10 Files
  • 2
    Aug 2nd
    8 Files
  • 3
    Aug 3rd
    2 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    79 Files
  • 7
    Aug 7th
    16 Files
  • 8
    Aug 8th
    11 Files
  • 9
    Aug 9th
    10 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    6 Files
  • 12
    Aug 12th
    26 Files
  • 13
    Aug 13th
    15 Files
  • 14
    Aug 14th
    19 Files
  • 15
    Aug 15th
    52 Files
  • 16
    Aug 16th
    11 Files
  • 17
    Aug 17th
    1 Files
  • 18
    Aug 18th
    2 Files
  • 19
    Aug 19th
    18 Files
  • 20
    Aug 20th
    19 Files
  • 21
    Aug 21st
    17 Files
  • 22
    Aug 22nd
    5 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close