what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 39 of 39 RSS Feed

Files Date: 2011-12-16 to 2011-12-17

Secunia Security Advisory 47268
Posted Dec 16, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Novell Access Manager, which can be exploited by malicious people to disclose potentially sensitive information and hijack a user's session.

tags | advisory
SHA-256 | 7a04acf997023ebba2f24117ce2be6dfa49fe432d3073b4a4c83eac7fb5e963d
Secunia Security Advisory 47201
Posted Dec 16, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in TYPO3, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 145c7292e9a6d5e1270424aed53ee7bf645198e7aee32f588361ca655e9e9593
Secunia Security Advisory 47269
Posted Dec 16, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for namazu. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
systems | linux, suse
SHA-256 | 56c1fca185e7958b745fc4b6850f0250c3cdee74bf70ecb4b9d0b3dc67de0509
Secunia Security Advisory 47264
Posted Dec 16, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for namazu. This fixes two vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.

tags | advisory, vulnerability, xss
systems | linux, suse
SHA-256 | dad2898c1d92daca1ce76c84d1319bdd6b578d0b7c46f573335952c9a941f511
Secunia Security Advisory 47216
Posted Dec 16, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Zabbix, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory, vulnerability
SHA-256 | 936c385aa52d0e1e694f850f6400a62434db3ea00e85fbc54662f7d4d2bba157
Secunia Security Advisory 47087
Posted Dec 16, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - 0a29406d9794e4f9b30b3c5d6702c708 has reported a security issue and multiple vulnerabilities in Nagios XI, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious people to conduct cross-site scripting attacks.

tags | advisory, local, vulnerability, xss
SHA-256 | 1114a0cca12886a908354144dd73c0da8b6e46e1141e8072eaf1920ec92d58b6
Secunia Security Advisory 47274
Posted Dec 16, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - 0a29406d9794e4f9b30b3c5d6702c708 has discovered a vulnerability in the Mass Acknowledgement Component for Nagios XI, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | a088114f6e8a432df10d8ede52df9446c655a92003b9864a47d61bf2faf16f62
Secunia Security Advisory 47102
Posted Dec 16, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - RedTeam Pentesting has discovered a vulnerability in Owl Intranet Engine, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 3c45e5754b49a24f45fb2d3105beb725b16d3f752791fbced18b6320d042819f
IETF I-D On Fragmentation Related Security Issues
Posted Dec 16, 2011
Authored by Fernando Gont

This Internet Draft specifies the security implications of predictable fragment identification values in IPv6. It primarily focuses on countermeasures and mitigations.

tags | paper
SHA-256 | 460fd180c573767e12e1ffa15a9dc5ae08637e6d06e765a8c0e9f2d0c204a17c
IETF I-D On "Stable Privacy Addresses"
Posted Dec 16, 2011
Authored by Fernando Gont

This document specifies a method for generating IPv6 Interface Identifiers to be used with IPv6 Stateless Address Autoconfiguration (SLAAC), such that addresses configured using this method are stable within each subnet, but the Interface Identifier changes when hosts move from one network to another. The aforementioned method is meant to be an alternative to generating Interface Identifiers based on IEEE identifiers, such that the same manageability benefits can be achieved without sacrificing the privacy of users.

tags | paper
SHA-256 | 542e6aa994a33734dc569e8c3b291d6929f88f48ab8d12f2e29320b1c816fadd
Owl Intranet Engine 1.01 Information Disclosure / Unsalted Hashes
Posted Dec 16, 2011
Site redteam-pentesting.de

Owl Intranet Engine version 1.01 suffers from information disclosure and unsalted password hash vulnerabilities.

tags | advisory, vulnerability, info disclosure
SHA-256 | dcbbcd637364faab53f4367d19609cb5239a3d48ccaf0d7b4e8d9af17d44465e
Apache Range Header Denial Of Service
Posted Dec 16, 2011
Authored by Ev1lut10n

This exploit triggers a denial of service condition in Apache versions 1.3.x, 2.0.64 and below and 2.2.19 and below.

tags | exploit, denial of service
advisories | CVE-2011-3192
SHA-256 | 96f85ac954acd76315cd343cae7ecaa3c0a1d9c8b822efa823ff495fa177695a
Mandriva Linux Security Advisory 2011-188
Posted Dec 16, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-188 - Off-by-one error in libxml allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via a crafted web site. libxml2 allows remote attackers to cause a denial of service via unspecified vectors. The updated packages have been patched to correct these issues.

tags | advisory, remote, web, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2011-0216, CVE-2011-3905
SHA-256 | 9e5d8d09328e9eec2d184e1dac73e031d8e0870fbc1ed557b976905904a33c46
Seotoaster 1.9 SQL Injection
Posted Dec 16, 2011
Authored by Stefan Schurtz

Seotoaster version 1.9 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | a28fad089e8020fcf599c35517f77036da894801e14d71b40f0b3705084df78f
Page 2 of 2
Back12Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close