what you don't know can hurt you
Showing 1 - 19 of 19 RSS Feed

Files Date: 2012-04-21

Secunia Security Advisory 48798
Posted Apr 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Security-Assessment.com has reported some vulnerabilities in Oracle GlassFish Enterprise Server, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks.

tags | advisory, vulnerability, xss
MD5 | 7cf0af393cb515b4afe092169b6a1204
Secunia Security Advisory 48883
Posted Apr 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Oracle PeopleSoft Enterprise Portal, which can be exploited by malicious users to manipulate certain data.

tags | advisory
MD5 | 3da41731d12a4550b624621e1db8b799
Secunia Security Advisory 48849
Posted Apr 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Apache HTTP Server, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, web, local
MD5 | 82d152bd734e73883f372c42a728b32d
Secunia Security Advisory 48876
Posted Apr 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Oracle PeopleSoft Enterprise CRM, which can be exploited by malicious people to manipulate certain data.

tags | advisory
MD5 | bdfcace6585402253a8115f36117e3eb
Secunia Security Advisory 48890
Posted Apr 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Oracle MySQL Server, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
MD5 | 5c92f1192d5db76ba9d852ae1442f1f7
Secunia Security Advisory 48863
Posted Apr 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Oracle JDeveloper, which can be exploited by malicious people to manipulate certain data.

tags | advisory
MD5 | 73458ce93918cf16e2836661002ea152
Secunia Security Advisory 48895
Posted Apr 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for openssl. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, debian
MD5 | 77df9ef66061d3781b5864e0efd8c161
Secunia Security Advisory 48843
Posted Apr 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Hitachi JP1/IT Desktop Management, which can be exploited by malicious people to conduct cross-site scripting attacks and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability, xss
MD5 | 4e80ddc3b5026f31d4c082760e67f23e
Secunia Security Advisory 48928
Posted Apr 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ange Albertini has reported a vulnerability in Comodo Internet Security, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
MD5 | 6a7ffeabfdfb61c5aa3068f8d3fddb37
Secunia Security Advisory 48933
Posted Apr 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM Rational ClearQuest, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 972d3922e6a1dcb70f496471a9013a59
Secunia Security Advisory 48899
Posted Apr 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for openssl. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
MD5 | 79fbb6e8f5f5d4c448f298efc0a0907b
Secunia Security Advisory 48807
Posted Apr 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in RubyGems, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
MD5 | c50c0fc9ab5852bb33e92c30b42ca9e5
Anchor CMS 0.6 Cross Site Scripting
Posted Apr 21, 2012
Authored by LiquidWorm | Site zeroscience.mk

Anchor CMS version 0.6 suffers from multiple persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 061efb51938120f7191bc503fbb90dfe
Mobius Forensic Toolkit 0.5.12
Posted Apr 21, 2012
Site savannah.nongnu.org

Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.

Changes: This release features the Skype Agent extension, an extension to browse Skype log files and show calls, chats, contacts, profiles, file transfers, SMS, and voicemails.
tags | tool, python, forensics
systems | unix
MD5 | b68d7f8cd6b79ac3fb9eb5c6f7cae3e2
Oracle GlassFish Server 3.1.1 Build 12 Cross Site Scripting
Posted Apr 21, 2012
Authored by Roberto Suggi Liverani | Site security-assessment.com

Security-Assessment.com has discovered that components of the Oracle GlassFish Server administrative web interface are vulnerable to both reflected and stored cross site scripting attacks. All pages where cross site scripting vulnerabilities were discovered require authentication. Oracle GlassFish Server version 3.1.1 build 12 is affected.

tags | exploit, web, vulnerability, xss
advisories | CVE-2012-0551
MD5 | d42aa48b8702ef3a45dd6fa235e9cd4b
Host Scanning In IPv6 Networks
Posted Apr 21, 2012
Authored by Fernando Gont

IPv6 offers a much larger address space than that of its IPv4 counterpart. The standard /64 IPv6 subnets can (in theory) accommodate approximately 1.844 * 10^19 hosts, thus resulting in a much lower host density (#hosts/#addresses) than their IPv4 counterparts. As a result, it is widely assumed that it would take a tremendous effort to perform host scanning attacks against IPv6 networks, and therefore IPv6 host scanning attacks have long been considered unfeasible. This document analyzes the IPv6 address configuration policies implemented in most popular IPv6 stacks, and identifies a number of patterns in the resulting addresses lead to a tremendous reduction in the host address search space, thus dismantling the myth that IPv6 host scanning attacks are unfeasible.

tags | paper
MD5 | 7647136296cf7d7fcc2c61206d14cbd6
HP Security Bulletin HPSBUX02761 SSRT100823
Posted Apr 21, 2012
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX02761 SSRT100823 - Potential security vulnerabilities have been identified with HP-UX Running Apache. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS) or to gain a local increase of privilege. Revision 1 of this advisory.

tags | advisory, denial of service, local, vulnerability
systems | hpux
advisories | CVE-2011-3607, CVE-2012-0021, CVE-2012-0031, CVE-2012-0053
MD5 | e392c4442c827b3916ff50f51e822fba
Liferay 6.0.5 ce WebDAV File Reading
Posted Apr 21, 2012
Authored by Jelmer Kuperus

By creating a specially crafted webdav request that contains an external entity it is possible to read files from Liferay Portal version 6.0.5 ce. Proof of concept code included.

tags | exploit, proof of concept
systems | linux
MD5 | 94d5d9f05f2aca62c5b79765fd0eb61a
Liferay 6.1 Default Configuration Compromise
Posted Apr 21, 2012
Authored by Jelmer Kuperus

By utilizing the json webservices exposed in Liferay Portal version 6.1 you can register a new user with any role in the system, including the built in administrator role. Proof of concept included.

tags | exploit, proof of concept
systems | linux
MD5 | 89a5b7ff48854a6931edae773c704aeb
Page 1 of 1
Back1Next

File Archive:

June 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    1 Files
  • 2
    Jun 2nd
    2 Files
  • 3
    Jun 3rd
    19 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    15 Files
  • 6
    Jun 6th
    12 Files
  • 7
    Jun 7th
    11 Files
  • 8
    Jun 8th
    1 Files
  • 9
    Jun 9th
    1 Files
  • 10
    Jun 10th
    15 Files
  • 11
    Jun 11th
    15 Files
  • 12
    Jun 12th
    15 Files
  • 13
    Jun 13th
    8 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    2 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    18 Files
  • 18
    Jun 18th
    15 Files
  • 19
    Jun 19th
    22 Files
  • 20
    Jun 20th
    15 Files
  • 21
    Jun 21st
    15 Files
  • 22
    Jun 22nd
    2 Files
  • 23
    Jun 23rd
    1 Files
  • 24
    Jun 24th
    23 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close