Vulnerability ID: HTB22348
Reference:
http://www.htbridge.ch/advisory/xss_vulnerability_in_zikula_application_framework.html
Product: Zikula Application Framework
Vendor: Zikula Software Foundation
Vulnerable Version: 1.2.2 and Probably Prior Versions
Vendor Notification: 13 April 2010
Huh?
This traffic will be discarded at the next hop. The machine has no default
route, thus trying to deliver things directly. What is strange is that it does
in fact try to deliver packets to hosts it obviously doesn't have a route to.
Yet how this is a security issue is a mystery to me.
--On Saturday, April 24, 2010 19:15:56 -0600 wbors...@gmail.com wrote:
After putting the port my WAP is plugged into in a bridge group--cisco
2600--and rejecting traffic at layer two from an XP machine, I noticed some
odd and insecure behavior. At this point I can only assume what is causing
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-2021-2 secur...@debian.org
http://www.debian.org/security/Giuseppe Iuculano
April 26, 2010
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c01997644
Version: 2
HPSBMA02488 SSRT100013 rev.2 - HP ProLiant Support Pack 8.30 for Windows,
Remote Code Execution, Information Disclosure
NOTICE: The information in this Security Bulletin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c02027185
Version: 1
HPSBMA02525 SSRT100083 rev.1 - HP System Insight Manager Running on HP-UX,
Linux, and Windows , Remote Cross Site Scripting (XSS), Cross Site Request
Forgery (CSRF),