what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 36 of 36 RSS Feed

Files Date: 2012-10-17 to 2012-10-18

Secunia Security Advisory 50965
Posted Oct 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in AWStats, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 4f2863a3f14d2816026caf3ebbb1ce0452b31baf0fe07121385669da9ed3de4e
Secunia Security Advisory 50966
Posted Oct 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Wansview IP Cameras, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | d7cdad5049f36135c0f490e867d90f1ba89e0e94e2dbba0cb1d044b87de6ae38
Secunia Security Advisory 50934
Posted Oct 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue have been reported in Videosmate Organizer, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 575cca86a867f86e8722b835f52e7035ffc15cebd3fe39f877ae32ed650d3828
Secunia Security Advisory 50920
Posted Oct 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Anil Pazvant has reported a vulnerability in Logica HotScan, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service
SHA-256 | 7f670288bba48b1d0576c350bc9f626da63e455728b5a30dc02c7a3a6f422e9b
Secunia Security Advisory 50986
Posted Oct 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Oracle Fusion Middleware, which can be exploited by malicious, local users to manipulate certain data, by malicious users to disclose potentially sensitive information and manipulate certain data, and by malicious people to disclose potentially sensitive information, manipulate certain data, and bypass certain security restrictions.

tags | advisory, local, vulnerability
SHA-256 | dcef3c4b257a669314c2e82b869e0fbf6e929d40ed55c0514bb532e495165fa1
Secunia Security Advisory 50949
Posted Oct 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability
SHA-256 | 5e4bda1eda65b6fea570dcaa42aef1a555576191d4a63c83a22ec9b60f0ba720
Red Hat Security Advisory 2012-1376-01
Posted Oct 17, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1376-01 - jboss-ec2-eap provides JBoss Operations Network scripts for JBoss Enterprise Application Platform running on the Amazon Web Services Elastic Compute Cloud. It was found that the "/var/cache/jboss-ec2-eap/" directory had world readable permissions when using the EC2 AMI for JBoss Enterprise Application Platform 5.1.2 on Red Hat Enterprise Linux 6. A local attacker could use this flaw to read potentially sensitive information from this directory, such as Amazon Web Services credentials.

tags | advisory, web, local
systems | linux, redhat
advisories | CVE-2012-3427
SHA-256 | ac9cb0f2b23f1cd20426da259f00d964edf77ca92a0ee840d86d754fa6527125
Red Hat Security Advisory 2012-1366-01
Posted Oct 17, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1366-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issue: A flaw was found in the way socket buffers requiring TSO were handled by the sfc driver. If the skb did not fit within the minimum-size of the transmission queue, the network card could repeatedly reset itself. A remote attacker could use this flaw to cause a denial of service.

tags | advisory, remote, denial of service, kernel
systems | linux, redhat
advisories | CVE-2012-3412
SHA-256 | 4bdfbba056bd4cff7b0f9bca40a4eb14716b0f07ee6d5f9e40715fc00d6227dc
Red Hat Security Advisory 2012-1380-01
Posted Oct 17, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1380-01 - Horizon is the OpenStack Dashboard, a web interface for managing OpenStack services. An open redirect flaw was found in the way Horizon handled authentication. A remote attacker able to trick a victim into opening the Horizon login page using a specially-crafted link could redirect the victim to an arbitrary web page, and conduct phishing attacks, after the victim successfully logs in.

tags | advisory, remote, web, arbitrary
systems | linux, redhat
advisories | CVE-2012-3540
SHA-256 | 9ca85e08e473f375076cfdac8bb52edb8ec155cd47b21559556e1bb95eeeda6c
Red Hat Security Advisory 2012-1378-01
Posted Oct 17, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1378-01 - Keystone is a Python implementation of the OpenStack identity service API. It was found that Keystone incorrectly handled authorization failures. If a client attempted to change their tenant membership to one they are not authorized to join, Keystone correctly returned a not authorized error; however, the client was still added to the tenant. Users able to access the Keystone administrative API could use this flaw to add any user to any tenant. When logging into Keystone, the user receives a token to use for authentication with other services managed by Keystone. It was found that Keystone failed to revoke tokens if privileges were revoked, allowing users to retain access to resources they should no longer be able to access while their token remains valid.

tags | advisory, python
systems | linux, redhat
advisories | CVE-2012-3542, CVE-2012-4413, CVE-2012-4456, CVE-2012-4457
SHA-256 | 8b912ed60ba4387f304180a802ce43c9829c9309b3f510c6f95aba85ae30cd74
Red Hat Security Advisory 2012-1379-01
Posted Oct 17, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1379-01 - OpenStack Swift is a highly available, distributed, eventually consistent object/blob store. It was found that OpenStack Swift used the Python pickle module in an insecure way to serialize and deserialize data from memcached. As memcached does not have authentication, an attacker on the local network, or possibly an unprivileged user in a virtual machine hosted on OpenStack, could use this flaw to inject specially-crafted data that would lead to arbitrary code execution.

tags | advisory, arbitrary, local, code execution, python
systems | linux, redhat
advisories | CVE-2012-4406
SHA-256 | c5b2ef344dad56952873d987a833f8e629ea5a50cc482876c0c63e40c6efc365
Page 2 of 2
Back12Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close