exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 40 of 40 RSS Feed

Files Date: 2013-01-24 to 2013-01-25

Secunia Security Advisory 51812
Posted Jan 24, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 969f8963fb7b9e8bc724319c355662ae457c5c32aea1f44bc34846537a94b3a6
Secunia Security Advisory 51933
Posted Jan 24, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco TelePresence Video Communication Server, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | cisco
SHA-256 | 71777809fad1537aac0d9a54d8490418a8abd187ca4473c4454addd63fba0721
Secunia Security Advisory 51912
Posted Jan 24, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Developer Formatter plugin for WordPress, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 7aa38cd494840c8084abf0107b9f12a5a477d47b532cc0e884df3c4ce4de3bbb
Drupal Search API Sorts 7.x Cross Site Scripting
Posted Jan 24, 2013
Authored by Francisco Jose Cruz Romanos | Site drupal.org

Drupal Search API Sorts third party module version 7.x suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 55f6e522620f4ccc76b79b7c9913b2284fe9358d71922d20db5d5c06b79a25ee
LACSEC 2013 Call For Papers
Posted Jan 24, 2013
Site lacnic.net

LACSEC 2013 Call For Presentations - The 8th Network Security Event for Latin America and the Caribbean will be held in Medellin, Colombia May 5th through the 10th, 2013.

tags | paper, conference
SHA-256 | ab447b8953a45542e191f06b241cf3bb01b3520e99663f229516dd93c8aeb955
HP Security Bulletin HPSBMU02841 SSRT100724
Posted Jan 24, 2013
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU02841 SSRT100724 - A potential security vulnerability has been identified in HP Diagnostic Server. This vulnerability could be remotely exploited to execute arbitrary code. Revision 1 of this advisory.

tags | advisory, arbitrary
advisories | CVE-2012-3278
SHA-256 | f42b8be56ce7433f2ff6fb666afc102d3e078dc3ab7b4c47c291357c88ae9de0
Drupal CurvyCorners 6.x / 7.x Cross Site Scripting
Posted Jan 24, 2013
Authored by rickauer | Site drupal.org

Drupal CurvyCorners third party module versions 6.x and 7.x suffer from a cross site scripting vulnerability.

tags | advisory, xss
advisories | CVE-2013-1393
SHA-256 | 1a1d762151c4756996136016bf0c755f7938e68bed1f336b1edffd2e84f88273
Cisco Security Advisory 20130123-wlc
Posted Jan 24, 2013
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - The Cisco Wireless LAN Controller (Cisco WLC) product family is affected by denial of service, unauthorized access, and remote code execution vulnerabilities. Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are available.

tags | advisory, remote, denial of service, vulnerability, code execution
systems | cisco
SHA-256 | 55baf3f86714a6e79be692a8e7ad8474373cc96fd93e5dda53050910ca53ad83
Drupal User Relationships 6.x / 7.x Cross Site Scripting
Posted Jan 24, 2013
Authored by Klaus Purer | Site drupal.org

Drupal User Relationships third party module versions 6.x and 7.x suffer from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 691816e35714a033cded201915d7d087ac66e3f79da75280c1026b67abeaf972
Drupal Video 7.x PHP Code Execution
Posted Jan 24, 2013
Authored by Joris van Eijden | Site drupal.org

Drupal Video third party module version 7.x suffers from an arbitrary PHP code execution vulnerability.

tags | advisory, arbitrary, php, code execution
SHA-256 | 0d284b4e7317ea4fbc7424dcc6539dd0c0ad0a8915c808659f46f444933cc9f2
Red Hat Security Advisory 2013-0189-01
Posted Jan 24, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0189-01 - Red Hat Identity Management is a centralized authentication, identity management and authorization solution for both traditional and cloud-based enterprise environments. A weakness was found in the way IPA clients communicated with IPA servers when initially attempting to join IPA domains. As there was no secure way to provide the IPA server's Certificate Authority certificate to the client during a join, the IPA client enrollment process was susceptible to man-in-the-middle attacks. This flaw could allow an attacker to obtain access to the IPA server using the credentials provided by an IPA client, including administrative access to the entire domain if the join was performed using an administrator's credentials.

tags | advisory
systems | linux, redhat
advisories | CVE-2012-5484
SHA-256 | 917d7f2ad530557b735674dcb05889b77ed0b9ea93fa3211720c5ade790aa37a
Red Hat Security Advisory 2013-0188-01
Posted Jan 24, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0188-01 - Red Hat Identity Management is a centralized authentication, identity management and authorization solution for both traditional and cloud-based enterprise environments. A weakness was found in the way IPA clients communicated with IPA servers when initially attempting to join IPA domains. As there was no secure way to provide the IPA server's Certificate Authority certificate to the client during a join, the IPA client enrollment process was susceptible to man-in-the-middle attacks. This flaw could allow an attacker to obtain access to the IPA server using the credentials provided by an IPA client, including administrative access to the entire domain if the join was performed using an administrator's credentials.

tags | advisory
systems | linux, redhat
advisories | CVE-2012-5484
SHA-256 | 0c3fa5d5b200370967020975291799f22a82f3a9035f6295e0200b20ea6a2a0a
Red Hat Security Advisory 2013-0187-01
Posted Jan 24, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0187-01 - JBoss Operations Network is a middleware management solution that provides a single point of control to deploy, manage, and monitor JBoss Enterprise Middleware, applications, and services. This JBoss ON 3.1.2 release serves as a replacement for JBoss ON 3.1.1, and includes several bug fixes.

tags | advisory
systems | linux, redhat
advisories | CVE-2012-5920
SHA-256 | f57846f592aae1a8d4a18a1ac1c33f202be70dcdda5ddbb8a1b57d02587207a6
Unhide Forensic Tool 20121229
Posted Jan 24, 2013
Authored by YJesus | Site unhide-forensics.info

Unhide is a forensic tool to find hidden processes and TCP/UDP ports that are hidden via rootkits, LKMs, or other techniques.

Changes: Various fixes, additions, and updates added.
tags | tool, udp, tcp
systems | linux, unix
SHA-256 | fef31017dc0862399c7764ba45ffd5f763317d60a24f3a5c0f5fa6343cf90d3a
Twitter Cookie Handling Issue
Posted Jan 24, 2013
Authored by Dark-Puzzle

Twitter apparently fails to zero out and invalidate cookies upon logout, allowing for replay later.

tags | advisory
SHA-256 | 3d43799d9838174b65bdfa37b2cb2adddb40be1cc7d7947d3253b2eafac66181
Page 2 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close