what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 126 - 150 of 735 RSS Feed

Files Date: 2013-01-01 to 2013-01-31

Secunia Security Advisory 51939
Posted Jan 24, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for kernel. This fixes a weakness and a vulnerability, which can be exploited by malicious, local users to disclose potentially sensitive system information and to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
SHA-256 | f405eae5b45b2261cd46d3358407c195ac70c8bd0c411bca86324ecb4b7c3d97
Secunia Security Advisory 51935
Posted Jan 24, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Google Chrome, where some have unknown impacts and others can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 1a46184463a35a685a3870ada2b197255e6c21d94bc106a567f9a4d120dc724a
Secunia Security Advisory 51812
Posted Jan 24, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 969f8963fb7b9e8bc724319c355662ae457c5c32aea1f44bc34846537a94b3a6
Secunia Security Advisory 51933
Posted Jan 24, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco TelePresence Video Communication Server, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | cisco
SHA-256 | 71777809fad1537aac0d9a54d8490418a8abd187ca4473c4454addd63fba0721
Secunia Security Advisory 51912
Posted Jan 24, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Developer Formatter plugin for WordPress, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 7aa38cd494840c8084abf0107b9f12a5a477d47b532cc0e884df3c4ce4de3bbb
Drupal Search API Sorts 7.x Cross Site Scripting
Posted Jan 24, 2013
Authored by Francisco Jose Cruz Romanos | Site drupal.org

Drupal Search API Sorts third party module version 7.x suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 55f6e522620f4ccc76b79b7c9913b2284fe9358d71922d20db5d5c06b79a25ee
LACSEC 2013 Call For Papers
Posted Jan 24, 2013
Site lacnic.net

LACSEC 2013 Call For Presentations - The 8th Network Security Event for Latin America and the Caribbean will be held in Medellin, Colombia May 5th through the 10th, 2013.

tags | paper, conference
SHA-256 | ab447b8953a45542e191f06b241cf3bb01b3520e99663f229516dd93c8aeb955
HP Security Bulletin HPSBMU02841 SSRT100724
Posted Jan 24, 2013
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU02841 SSRT100724 - A potential security vulnerability has been identified in HP Diagnostic Server. This vulnerability could be remotely exploited to execute arbitrary code. Revision 1 of this advisory.

tags | advisory, arbitrary
advisories | CVE-2012-3278
SHA-256 | f42b8be56ce7433f2ff6fb666afc102d3e078dc3ab7b4c47c291357c88ae9de0
Drupal CurvyCorners 6.x / 7.x Cross Site Scripting
Posted Jan 24, 2013
Authored by rickauer | Site drupal.org

Drupal CurvyCorners third party module versions 6.x and 7.x suffer from a cross site scripting vulnerability.

tags | advisory, xss
advisories | CVE-2013-1393
SHA-256 | 1a1d762151c4756996136016bf0c755f7938e68bed1f336b1edffd2e84f88273
Cisco Security Advisory 20130123-wlc
Posted Jan 24, 2013
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - The Cisco Wireless LAN Controller (Cisco WLC) product family is affected by denial of service, unauthorized access, and remote code execution vulnerabilities. Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are available.

tags | advisory, remote, denial of service, vulnerability, code execution
systems | cisco
SHA-256 | 55baf3f86714a6e79be692a8e7ad8474373cc96fd93e5dda53050910ca53ad83
Drupal User Relationships 6.x / 7.x Cross Site Scripting
Posted Jan 24, 2013
Authored by Klaus Purer | Site drupal.org

Drupal User Relationships third party module versions 6.x and 7.x suffer from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 691816e35714a033cded201915d7d087ac66e3f79da75280c1026b67abeaf972
Drupal Video 7.x PHP Code Execution
Posted Jan 24, 2013
Authored by Joris van Eijden | Site drupal.org

Drupal Video third party module version 7.x suffers from an arbitrary PHP code execution vulnerability.

tags | advisory, arbitrary, php, code execution
SHA-256 | 0d284b4e7317ea4fbc7424dcc6539dd0c0ad0a8915c808659f46f444933cc9f2
Red Hat Security Advisory 2013-0189-01
Posted Jan 24, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0189-01 - Red Hat Identity Management is a centralized authentication, identity management and authorization solution for both traditional and cloud-based enterprise environments. A weakness was found in the way IPA clients communicated with IPA servers when initially attempting to join IPA domains. As there was no secure way to provide the IPA server's Certificate Authority certificate to the client during a join, the IPA client enrollment process was susceptible to man-in-the-middle attacks. This flaw could allow an attacker to obtain access to the IPA server using the credentials provided by an IPA client, including administrative access to the entire domain if the join was performed using an administrator's credentials.

tags | advisory
systems | linux, redhat
advisories | CVE-2012-5484
SHA-256 | 917d7f2ad530557b735674dcb05889b77ed0b9ea93fa3211720c5ade790aa37a
Red Hat Security Advisory 2013-0188-01
Posted Jan 24, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0188-01 - Red Hat Identity Management is a centralized authentication, identity management and authorization solution for both traditional and cloud-based enterprise environments. A weakness was found in the way IPA clients communicated with IPA servers when initially attempting to join IPA domains. As there was no secure way to provide the IPA server's Certificate Authority certificate to the client during a join, the IPA client enrollment process was susceptible to man-in-the-middle attacks. This flaw could allow an attacker to obtain access to the IPA server using the credentials provided by an IPA client, including administrative access to the entire domain if the join was performed using an administrator's credentials.

tags | advisory
systems | linux, redhat
advisories | CVE-2012-5484
SHA-256 | 0c3fa5d5b200370967020975291799f22a82f3a9035f6295e0200b20ea6a2a0a
Red Hat Security Advisory 2013-0187-01
Posted Jan 24, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0187-01 - JBoss Operations Network is a middleware management solution that provides a single point of control to deploy, manage, and monitor JBoss Enterprise Middleware, applications, and services. This JBoss ON 3.1.2 release serves as a replacement for JBoss ON 3.1.1, and includes several bug fixes.

tags | advisory
systems | linux, redhat
advisories | CVE-2012-5920
SHA-256 | f57846f592aae1a8d4a18a1ac1c33f202be70dcdda5ddbb8a1b57d02587207a6
Unhide Forensic Tool 20121229
Posted Jan 24, 2013
Authored by YJesus | Site unhide-forensics.info

Unhide is a forensic tool to find hidden processes and TCP/UDP ports that are hidden via rootkits, LKMs, or other techniques.

Changes: Various fixes, additions, and updates added.
tags | tool, udp, tcp
systems | linux, unix
SHA-256 | fef31017dc0862399c7764ba45ffd5f763317d60a24f3a5c0f5fa6343cf90d3a
Twitter Cookie Handling Issue
Posted Jan 24, 2013
Authored by Dark-Puzzle

Twitter apparently fails to zero out and invalidate cookies upon logout, allowing for replay later.

tags | advisory
SHA-256 | 3d43799d9838174b65bdfa37b2cb2adddb40be1cc7d7947d3253b2eafac66181
iTop Cross Site Scripting
Posted Jan 23, 2013
Authored by Stephan Rickauer | Site csnc.ch

iTop from Combodo suffers from a cross site scripting vulnerability. All trunk revisions prior to 2589 are affected.

tags | advisory, xss
advisories | CVE-2013-0805
SHA-256 | 90232c5bf04fbe0246837a2afea462fe74f1d981ab58938eec4e281605ec4ef4
Slackware Security Advisory - MySQL Updates
Posted Jan 23, 2013
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mysql packages are available for 12.1, 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix security and other issues.

tags | advisory
systems | linux, slackware
SHA-256 | 700e39fb63ceee4dffa98cfd80619fea202c7a50621640c01515e459761a0eca
Drupal Keyboard Shortcut Utility 7.x Access Bypass
Posted Jan 23, 2013
Authored by Michael Griego | Site drupal.org

Drupal Keyboard Shortcut Utility third party module version 7.x suffers from an access bypass vulnerability.

tags | advisory, bypass
SHA-256 | 71f6f5a0df7522634272e45cca714c1da1469d095fb151a60e3ba07ce632a69d
WordPress Chocolate Theme XSS / Denial Of Service / Shell Upload
Posted Jan 23, 2013
Authored by MustLive

The WordPress Chocolate theme suffers from cross site scripting, denial of service, path disclosure, abuse of functionality, and remote shell upload vulnerabilities.

tags | exploit, remote, denial of service, shell, vulnerability, xss, info disclosure
SHA-256 | 0a3fbe3735d9d16287a5efb8d639939ce812da95e23a71e2a0731c6b0b790dcb
Weboptima CMS Add Administrator / Shell Upload
Posted Jan 23, 2013
Authored by Akastep

Weboptima CMS suffers from add administrator and remote shell upload vulnerabilities.

tags | exploit, remote, shell, vulnerability, add administrator
SHA-256 | fc99f270ff007095d824949c224a7ce7178b34040bce8b1aaa503770f5db42fc
Secunia Security Advisory 51932
Posted Jan 23, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two security issues have been reported in Performance Co-Pilot, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
SHA-256 | 5b029f65ffe1a45c72eacda59f98be785246d2bba82f52cc6fce0273d69f8080
Secunia Security Advisory 51906
Posted Jan 23, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local
systems | linux
SHA-256 | 85ee624ed4d5004d2c9ee62a11155db57b58976b8e557bf06a9dd70a934b33c1
Secunia Security Advisory 51937
Posted Jan 23, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for mysql. This fixes two vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service) and to compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
SHA-256 | 20437e38f7106bd1bb3e0f1b061ba42e72a30fd1efb3a8b2970f44e0e136c41d
Page 6 of 30
Back45678Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close