what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 37 of 37 RSS Feed

Files Date: 2012-08-03 to 2012-08-04

Secunia Security Advisory 50147
Posted Aug 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in ntop, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | c8066f18e09f287c4708387488e581f254d752e6df4b1e4f84ce9429e88d78fc
Secunia Security Advisory 50070
Posted Aug 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - John Johnson-Doe has discovered a security issue in meetOneToGo, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | bfc5beb31631291bf9b3c236d25489a7870b416145c27ec5cfb48a4003a64dd2
Secunia Security Advisory 50159
Posted Aug 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for bind-dyndb-ldap. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, redhat
SHA-256 | c59d0f781028e733c2717a7ba399d8e4564bd1d37b48aafe348a26fade1899e2
Secunia Security Advisory 50139
Posted Aug 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Brendan Coles has discovered a weakness and multiple vulnerabilities in Zenoss, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to conduct spoofing and cross-site request forgery attacks.

tags | advisory, spoof, vulnerability, csrf
SHA-256 | 32865cbc497e94949624f8a11a0d71c603e824cdfbc8da350c2f4ddb960a6881
Secunia Security Advisory 50122
Posted Aug 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in ACD Systems Canvas, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 72657bb6a27bf2ea830a46464869b79ad1d15bd9f3de381883d1f311bc5d2612
Secunia Security Advisory 50126
Posted Aug 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in AccessData Forensic Toolkit, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 272128a4233772a0d1648c1439d81885353066d9061220ff48722a6d6a18bcb6
Secunia Security Advisory 50078
Posted Aug 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in EnCase Forensic, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | ab4e17c0e60db1636bc063974761f34c64ef0d876c9a3955aee453b651527f2a
Ntop 4.0.3 Cross Site Scripting
Posted Aug 3, 2012
Authored by Marcos Garcia

Ntop version 4.0.3 (64 bit) suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9e503fcd949b60fc4f051b48d6eb72a0c7e80a3bb9f137a474a2ad111e56f08a
Red Hat Security Advisory 2012-1139-01
Posted Aug 3, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1139-01 - The dynamic LDAP back end is a plug-in for BIND that provides back-end capabilities to LDAP databases. It features support for dynamic updates and internal caching that help to reduce the load on LDAP servers. A flaw was found in the way bind-dyndb-ldap performed the escaping of names from DNS requests for use in LDAP queries. A remote attacker able to send DNS queries to a named server that is configured to use bind-dyndb-ldap could use this flaw to cause named to exit unexpectedly with an assertion failure.

tags | advisory, remote
systems | linux, redhat
advisories | CVE-2012-3429
SHA-256 | 21ad281bbda64e6afba7cbfbd5bb1f6bc0aa4383815fd814c5f8361a16099c79
Red Hat Security Advisory 2012-1141-01
Posted Aug 3, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1141-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. A denial of service flaw was found in the way the dhcpd daemon handled zero-length client identifiers. A remote attacker could use this flaw to send a specially-crafted request to dhcpd, possibly causing it to enter an infinite loop and consume an excessive amount of CPU time. Two memory leak flaws were found in the dhcpd daemon. A remote attacker could use these flaws to cause dhcpd to exhaust all available memory by sending a large number of DHCP requests.

tags | advisory, remote, denial of service, protocol, memory leak
systems | linux, redhat
advisories | CVE-2012-3571, CVE-2012-3954
SHA-256 | fc9a322a2de7ef4e978afd80e16657d60814c3b522011ed6e9b40e2bd8d9a601
Red Hat Security Advisory 2012-1140-01
Posted Aug 3, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1140-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. A denial of service flaw was found in the way the dhcpd daemon handled zero-length client identifiers. A remote attacker could use this flaw to send a specially-crafted request to dhcpd, possibly causing it to enter an infinite loop and consume an excessive amount of CPU time. Upstream acknowledges Markus Hietava of the Codenomicon CROSS project as the original reporter of this issue.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2012-3571
SHA-256 | 8b07e2dc453135e1290fae4b34fd3618aeea3cedff85d00f592a71055720c29b
Debian Security Advisory 2520-1
Posted Aug 3, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2520-1 - Timo Warns from PRE-CERT discovered multiple heap-based buffer overflows in OpenOffice.org, an office productivity suite. The issues lies in the XML manifest encryption tag parsing code. Using specially crafted files, an attacker can cause application crash and could cause arbitrary code execution.

tags | advisory, overflow, arbitrary, code execution
systems | linux, debian
advisories | CVE-2012-2665
SHA-256 | 01058fb3e73899f5614de4378a1f281d11b663b075a75d78a87026487124e896
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close