exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 41 of 41 RSS Feed

Files Date: 2011-04-20 to 2011-04-21

Secunia Security Advisory 44300
Posted Apr 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun GlassFish Enterprise Server and Java System Application Server, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system.

tags | advisory, java
SHA-256 | 5552555b4c1aedec266d3bb9640d2495bfea3b9c6fa512db68d9e0b8185f55ee
Secunia Security Advisory 44302
Posted Apr 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun Java Dynamic Management Kit, which can be exploited by malicious people to manipulate certain data.

tags | advisory, java
SHA-256 | cda058aa1b4b215a984938efb281f09997394e2ce94a57eb6638ed7b4400cf16
Secunia Security Advisory 44279
Posted Apr 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Oracle JD Edwards EnterpriseOne Tools, which can be exploited by malicious people to conduct cross-site scripting attacks, manipulate data, gain knowledge of sensitive information, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability, xss
SHA-256 | 1eafb91fbeb048a7b19b1f598cb4af5c80983a56cc869aa2962f7b9d0bf09c28
Secunia Security Advisory 44111
Posted Apr 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fl

tags | advisory
SHA-256 | 96296a7b2adf9a72831399050428f8234316067bc6403ab1d23c1347e3bb96bc
Secunia Security Advisory 44301
Posted Apr 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Oracle Communications Messaging Server, which can be exploited by malicious people to manipulate certain data.

tags | advisory
SHA-256 | cdfb8526d6b90db361ddc658b6348d8debc019a98058240256b4f121ba43d044
Secunia Security Advisory 44253
Posted Apr 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some weaknesses have been reported in fail2ban, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
SHA-256 | d372b99abcf145d7312d04a6c4b743442140627454cd73f22ee71127f3e47cfc
Secunia Security Advisory 44303
Posted Apr 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged a vulnerability in Oracle iPlanet Web Server, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, web, denial of service
SHA-256 | 5d910da9e5c48060625a06af73445fb6125c9373ac92787b6427c68eef1d1ac2
Secunia Security Advisory 44283
Posted Apr 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Oracle Solaris, which can be exploited by malicious, local users to gain escalated privileges, disclose potentially sensitive information, manipulate certain data, and cause a DoS (Denial of Service) and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
systems | solaris
SHA-256 | 2e739985e2148209965b8a81d316a103a15aa19239064f624425b4fe7be7bdf0
Secunia Security Advisory 44305
Posted Apr 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Sun OpenSSO Enterprise and Java System Access Manager, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to manipulate certain data.

tags | advisory, java, vulnerability
SHA-256 | d41b3d348926669bd58dbfcf21db62c6b51b303e19fcbf5c6e1be71cd709aa63
Secunia Security Advisory 44277
Posted Apr 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Oracle E-Business Suite, which can be exploited by malicious, local users to gain escalated privileges, by malicious users to disclose potentially sensitive information, and by malicious people to disclose potentially sensitive information and manipulate certain data.

tags | advisory, local, vulnerability
SHA-256 | 0205bf91af0a09e81d116a9a0bc36feb54a46a11a56e70088472bb0e4aff124a
Secunia Security Advisory 44261
Posted Apr 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged a vulnerability in Tivoli Netview for z/OS, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | ff95c9e7a85cb721614f6f4df62131bf139335b364e6ecc2c8244abbb473ce1c
Secunia Security Advisory 44233
Posted Apr 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for dhcp. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, fedora
SHA-256 | 54cd3a0ca30fd40e89db23316151fe7211b7eb72f310164efa7a81bdc66f0a07
Ubuntu Security Notice USN-1117-1
Posted Apr 20, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1117-1 - Neel Mehta discovered that PolicyKit did not correctly verify the user making authorization requests. A local attacker could exploit this to trick pkexec into running applications with root privileges.

tags | advisory, local, root
systems | linux, ubuntu
advisories | CVE-2011-1485
SHA-256 | 4c6944cfa8da3fb2362a0b9f983fa2667e828c17e438aa809577c054cc336f17
PPLiveAV Insecure Defaults
Posted Apr 20, 2011
Authored by mrhinkydink

PPLiveAV suffers from an insecure default vulnerability that has resulted in many open proxies being available.

tags | advisory
SHA-256 | 8792361e107fb76e1011f84afbf7b5ee794237e5428a4dfc25c74a5c3efa2287
Dradis Information Sharing Tool 2.7.0
Posted Apr 20, 2011
Authored by etd | Site dradis.nomejortu.com

dradis is a tool for sharing information during security testing. While plenty of tools exist to help in the different stages of the test, not so many exist to share interesting information captured. When a team of testers is working on the same set of targets, having a common repository of information is essential to avoid duplication of efforts.

Changes: This release has an improved command line API with Thor. A new Configuration Manager to handle all plugin config settings. A new Upload Manager that runs uploads in the background and updates the interface through AJAX. New plugins: Metasploit import; NeXpose (.xml) upload; OpenVAS (.xml) upload; SureCheck (.sc) upload; w3af (.xml) upload; and Web Exploitation Framework (wXf) upload. The Nessus plugin supports .nessus v2. Vuln::DB import has been updated to support the latest release. Bugs fixed: #2888332 and #2973256. Rails has been updated to 3.0.6.
tags | web
systems | unix
SHA-256 | c8c5c324156e7960e3faa20e6ef569ecc3d82808b161102ebb63052564e9d4ba
Malheur Malware Analyzer 0.5.0
Posted Apr 20, 2011
Authored by Konrad Rieck | Site mlsec.org

Malheur is a tool for automatic analysis of program behavior recorded from malicious software (malware). It is designed to support the regular analysis of malicious software and the development of detection and defense measures. It allows for identifying novel classes of malware with similar behavior and assigning unknown malware to discovered classes. It can be applied to recorded program behavior of various formats as long as monitored events are separated by delimiter symbols, e.g. as in reports generated by the popular malware sandboxes CWSandbox, Anubis, Norman Sandbox, and Joebox.

Changes: All configuration parameters can be specified on the command line. The manual page and documentation have been updated and extended. Minor bugs have been fixed.
tags | tool, forensics
systems | unix
SHA-256 | 3be1c2c3ddf9fa21e38ce94750996f036a69b033f1baf6d76c0a960a040fd74e
Page 2 of 2
Back12Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close