exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2012-10-29

EMC Avamar Client For VMware Information Disclosure
Posted Oct 29, 2012
Site emc.com

The Avamar Server root user password is stored in plain text on Avamar VMWare proxy client. This could allow a malicious user with network access to proxy client and Avamar Server to gain privileged access to the Avamar server.

tags | advisory, root
advisories | CVE-2012-4610
SHA-256 | 42555590e2ec1eaa4ed0e58462ba49dc8fd26c16852f27e2bdf6f80bb817912e
TP-LINK TL-WR841N Local File Inclusion
Posted Oct 29, 2012
Authored by Matan Azugi

TP-LINK TL-WR841N suffers from a local file inclusion vulnerability. Firmware versions 3.13.9 Build 120201 Rel.54965n and below are affected.

tags | exploit, local, file inclusion
SHA-256 | 30b33ca4e19b4006382480798e9d11511f9fab053f7f020f3416d3cf693d302a
Slackware Security Advisory - mozilla-firefox Updates
Posted Oct 29, 2012
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-firefox packages are available for Slackware 13.37, 14.0, and -current to fix a security issue.

tags | advisory
systems | linux, slackware
SHA-256 | b3530772c2e519ca40f58872a39ef3d1c3c568a41a37bf4943b3f7cd0265fd4f
Positive Hack Days III Call For Papers
Posted Oct 29, 2012
Site phdays.com

Call For Papers for Positive Hack Days III which will take place May 22nd through the 23rd, 2013 in Moscow, Russia.

tags | paper, conference
SHA-256 | 237eb04df98bf6a16b35515b1159888b207611bd72f3be73b9dd33105d775d8c
DIMVA 2013 Call For Papers
Posted Oct 29, 2012
Site dimva.org

Call For Papers for DIMVA 2013, the 10th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment. This conference will be held from July 18th through the 19th, 2013 in Berlin, Germany.

tags | paper, conference
SHA-256 | 9ddb48597e48c32b3f1033d4fa44bd5a3f93eb6c773439796f3781e973b3a09b
360-FAAR Firewall Analysis Audit And Repair 0.3.4
Posted Oct 29, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release resolves Cisco ICMP default services with out printing stringified hash references in the cs output sections. Cisco network and range objects are listed as such in object-groups instead of as hosts. The cisco output writer uses 'object' in access-lists instead of IP NM, as well as listing range objects using 'range' in access-lists as well as groups. The NAT translation now supports SRC NAT translation for known network objects in rr mode filters.
tags | tool, perl
systems | unix
SHA-256 | 83a14cd01c162dbb2b4f78021b1b6a8d2a95fc60ef2cb2d383c7c55458a39622
Secunia Security Advisory 51144
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Mozilla Firefox, Thunderbird, and SeaMonkey, which can be exploited by malicious people to bypass certain security restrictions and conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | ffc00ca2f9a908e46dec016bb7a8b16923322b279631060c67fe58158b246bea
Secunia Security Advisory 51152
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ERPScan has reported a vulnerability in SAP NetWeaver Process Integration, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 2d6807ea481f9b69db211fe8f581d889683598c20c45bd0627ca7d22573b2518
Secunia Security Advisory 51115
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for exim4. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, debian
SHA-256 | f633d5ddb7743f28fda9f71d0d87659940f8023d21bd4ee685b6db34f5eae6bb
Secunia Security Advisory 51151
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ERPScan has reported a vulnerability in Oracle Business Intelligence, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | ef6f1af2c2008304225c80b1b14790e0dfd64dd07eff9da161c91cf4bffc0e99
Secunia Security Advisory 51146
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
systems | linux, redhat
SHA-256 | 985fb172a58814d1499ccd7da2a669c0ba03f92af15fa62ba5c618135e262d97
Secunia Security Advisory 51147
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
systems | linux, ubuntu
SHA-256 | a6d20c0c7e9a201910ffd9d38caa6fc8e25c61bc38ea0dcdea1feb5802aabc00
Secunia Security Advisory 51111
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for rtfm. This fixes a vulnerability, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
systems | linux, debian
SHA-256 | 0d4eb7d52fbe4e46a3dc7abd115d0a558f410c852380b9c2d1a29f34023fc2ff
Secunia Security Advisory 51154
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for openjdk-6. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
SHA-256 | 6b905e4277fce4fc889eb97d40442bf619cc159192e9ee19fc1789b7238c992e
Secunia Security Advisory 51112
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for request-tracker3.8. This fixes multiple vulnerabilities, which can be exploited by malicious users to conduct spoofing attacks, bypass certain security restrictions, and compromise a vulnerable system and by malicious people to conduct cross-site request forgery attacks.

tags | advisory, spoof, vulnerability, csrf
systems | linux, debian
SHA-256 | 8dce55e4b09c534669667c8eaca07fa840578e864796ecc3c26089485d97f61c
Secunia Security Advisory 51155
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for exim. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, suse
SHA-256 | 1e07b274ee5ff2dc78544963b5b613c491dc53de876849737d3f06be02d2ea13
Secunia Security Advisory 51153
Posted Oct 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for exim4. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, ubuntu
SHA-256 | 74d9ca41fd0ea7cd018a60b054c9c3b110a912de43ea2b0d16bbf72c99223ee6
Page 1 of 1
Back1Next

File Archive:

February 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    16 Files
  • 2
    Feb 2nd
    19 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    10 Files
  • 8
    Feb 8th
    25 Files
  • 9
    Feb 9th
    37 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    20 Files
  • 14
    Feb 14th
    25 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    6 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    35 Files
  • 20
    Feb 20th
    25 Files
  • 21
    Feb 21st
    18 Files
  • 22
    Feb 22nd
    15 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    10 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    37 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close