Secunia Security Advisory - A weakness has been reported in Novell Access Manager, which can be exploited by malicious people to disclose potentially sensitive information and hijack a user's session.
7a04acf997023ebba2f24117ce2be6dfa49fe432d3073b4a4c83eac7fb5e963d
Secunia Security Advisory - A vulnerability has been discovered in TYPO3, which can be exploited by malicious people to compromise a vulnerable system.
145c7292e9a6d5e1270424aed53ee7bf645198e7aee32f588361ca655e9e9593
Secunia Security Advisory - SUSE has issued an update for namazu. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.
56c1fca185e7958b745fc4b6850f0250c3cdee74bf70ecb4b9d0b3dc67de0509
Secunia Security Advisory - SUSE has issued an update for namazu. This fixes two vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.
dad2898c1d92daca1ce76c84d1319bdd6b578d0b7c46f573335952c9a941f511
Secunia Security Advisory - Multiple vulnerabilities have been reported in Zabbix, which can be exploited by malicious users to conduct script insertion attacks.
936c385aa52d0e1e694f850f6400a62434db3ea00e85fbc54662f7d4d2bba157
Secunia Security Advisory - 0a29406d9794e4f9b30b3c5d6702c708 has reported a security issue and multiple vulnerabilities in Nagios XI, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious people to conduct cross-site scripting attacks.
1114a0cca12886a908354144dd73c0da8b6e46e1141e8072eaf1920ec92d58b6
Secunia Security Advisory - 0a29406d9794e4f9b30b3c5d6702c708 has discovered a vulnerability in the Mass Acknowledgement Component for Nagios XI, which can be exploited by malicious people to conduct cross-site scripting attacks.
a088114f6e8a432df10d8ede52df9446c655a92003b9864a47d61bf2faf16f62
Secunia Security Advisory - RedTeam Pentesting has discovered a vulnerability in Owl Intranet Engine, which can be exploited by malicious people to bypass certain security restrictions.
3c45e5754b49a24f45fb2d3105beb725b16d3f752791fbced18b6320d042819f
This Internet Draft specifies the security implications of predictable fragment identification values in IPv6. It primarily focuses on countermeasures and mitigations.
460fd180c573767e12e1ffa15a9dc5ae08637e6d06e765a8c0e9f2d0c204a17c
This document specifies a method for generating IPv6 Interface Identifiers to be used with IPv6 Stateless Address Autoconfiguration (SLAAC), such that addresses configured using this method are stable within each subnet, but the Interface Identifier changes when hosts move from one network to another. The aforementioned method is meant to be an alternative to generating Interface Identifiers based on IEEE identifiers, such that the same manageability benefits can be achieved without sacrificing the privacy of users.
542e6aa994a33734dc569e8c3b291d6929f88f48ab8d12f2e29320b1c816fadd
Owl Intranet Engine version 1.01 suffers from information disclosure and unsalted password hash vulnerabilities.
dcbbcd637364faab53f4367d19609cb5239a3d48ccaf0d7b4e8d9af17d44465e
This exploit triggers a denial of service condition in Apache versions 1.3.x, 2.0.64 and below and 2.2.19 and below.
96f85ac954acd76315cd343cae7ecaa3c0a1d9c8b822efa823ff495fa177695a
Mandriva Linux Security Advisory 2011-188 - Off-by-one error in libxml allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via a crafted web site. libxml2 allows remote attackers to cause a denial of service via unspecified vectors. The updated packages have been patched to correct these issues.
9e5d8d09328e9eec2d184e1dac73e031d8e0870fbc1ed557b976905904a33c46
Seotoaster version 1.9 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
a28fad089e8020fcf599c35517f77036da894801e14d71b40f0b3705084df78f