exploit the possibilities
Showing 1 - 6 of 6 RSS Feed

Files Date: 2013-11-22

RSA Data Protection Manager Appliance XSS / TLS Renegotiation
Posted Nov 22, 2013
Site emc.com

A cross-site scripting vulnerability could be potentially exploited for conducting malicious scripting attacks in RSA Data Protection Manager Appliance. A vulnerability exists in SSL and TLS protocols that may allow attackers to execute an arbitrary HTTP transaction in RSA Data Protection Manager Appliance. RSA Data Protection Manager Appliance versions 3.2.x and 3.5 (Hardware and Virtual) are affected.

tags | advisory, web, arbitrary, protocol, xss
advisories | CVE-2013-3288, CVE-2013-3555
MD5 | a1c621685b8f870a44a49a277a7dc0f5
Mandriva Linux Security Advisory 2013-279
Posted Nov 22, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-279 - The ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 uses an incorrect pointer chain, which allows remote attackers to cause a denial of service via a crafted packet. Unspecified vulnerability in the NBAP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service via a crafted packet. The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly initialize a data structure, which allows remote attackers to cause a denial of service via a crafted packet. The dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service via a crafted packet. epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly determine the amount of remaining data, which allows remote attackers to cause a denial of service via a crafted packet. This advisory provides the latest version of Wireshark which is not vulnerable to these issues.

tags | advisory, remote, denial of service, tcp
systems | linux, mandriva
advisories | CVE-2013-6336, CVE-2013-6337, CVE-2013-6338, CVE-2013-6339, CVE-2013-6340
MD5 | 9835f45e423d2acb0610dd701e8a93f8
Gentoo Linux Security Advisory 201311-14
Posted Nov 22, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201311-14 - Multiple vulnerabilities have been discovered in QtCore and QtGui, possibly resulting in execution of arbitrary code, Denial of Service, or man-in-the-middle attacks. Versions less than 4.8.4-r2 are affected.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2011-3193, CVE-2013-0254
MD5 | 672a22eff48f0497dc3c1ae59f986a4e
Debian Security Advisory 2802-1
Posted Nov 22, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2802-1 - Ivan Fratric of the Google Security Team discovered a bug in nginx, a web server, which might allow an attacker to bypass security restrictions by using a specially crafted request.

tags | advisory, web
systems | linux, debian
advisories | CVE-2013-4547
MD5 | ae1a2af0d96468a651f43d2ccf7aa047
Mandriva Linux Security Advisory 2013-280
Posted Nov 22, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-280 - Memcached is vulnerable to a denial of service as it can be made to crash when it receives a specially crafted packet over the network. The updated packages for Enterprise Server 5 has beed patched to resolve this flaw. The updated packages for Business Server 1 has been upgraded to the 1.4.15 version and patched to resolve this flaw.

tags | advisory, denial of service
systems | linux, mandriva
advisories | CVE-2011-4971
MD5 | 7b072f8e52c5e77491d4e8656a97212f
Ubuntu Security Notice USN-2033-1
Posted Nov 22, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2033-1 - Several vulnerabilities were discovered in the OpenJDK JRE related to information disclosure and data integrity. An attacker could exploit these to expose sensitive data over the network. Several vulnerabilities were discovered in the OpenJDK JRE related to availability. An attacker could exploit these to cause a denial of service. Various other issues were also addressed.

tags | advisory, denial of service, vulnerability, info disclosure
systems | linux, ubuntu
advisories | CVE-2013-5804, CVE-2013-5820, CVE-2013-5840, CVE-2013-5849, CVE-2013-5851, CVE-2013-5814, CVE-2013-5817, CVE-2013-5830, CVE-2013-5842, CVE-2013-5850, CVE-2013-3829, CVE-2013-4002, CVE-2013-5772, CVE-2013-5774, CVE-2013-5778, CVE-2013-5780, CVE-2013-5782, CVE-2013-5783, CVE-2013-5784, CVE-2013-5790, CVE-2013-5797, CVE-2013-5802, CVE-2013-5803, CVE-2013-5804, CVE-2013-5809, CVE-2013-5814, CVE-2013-5817, CVE-2013-5820
MD5 | a60bae6c51fda92e48a989febb2ee7ff
Page 1 of 1
Back1Next

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    41 Files
  • 21
    Oct 21st
    18 Files
  • 22
    Oct 22nd
    16 Files
  • 23
    Oct 23rd
    2 Files
  • 24
    Oct 24th
    1 Files
  • 25
    Oct 25th
    1 Files
  • 26
    Oct 26th
    17 Files
  • 27
    Oct 27th
    19 Files
  • 28
    Oct 28th
    29 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close