what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 408 RSS Feed

Files

Secunia Security Advisory 16638
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for pcre. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, slackware
SHA-256 | 0cbdef8071c3808430ee0dc93b6be87dd4c2c32732464d562cb61d31dd664c16
Secunia Security Advisory 16640
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NetWare, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | c67776773ee5155334525756a0bd90482c8d265b23485de1b8d36cbcb9917007
Secunia Security Advisory 16641
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya PDS (Predictive Dialing System), which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 9c31b7a629dcc476b7cd5be0f22e90eb182f6399d27352a14ab849e6e0186c81
Secunia Security Advisory 16642
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in openssl included in some products, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
SHA-256 | cc4e557d995e2691b6ce338fe5450eed194838332b1bc814b6602eccaebf35ff
Secunia Security Advisory 16643
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in gzip included in some products, which potentially can be exploited by malicious people to extract files to arbitrary directories on a user's system.

tags | advisory, arbitrary
SHA-256 | f3c0c73406b39d1cd96749eab7f6908169125b2d1cce16e1ecad996690435aa1
hesk-bypass.txt
Posted Aug 31, 2005
Authored by s2b

Helpdesk software Hesk 0.92 suffers from an authentication bypass vulnerability.

tags | advisory, bypass
SHA-256 | 015c0e8f5ed0a8fa2fd0ec87e5cbbbdaf6a4f79f1c25055bdd117bebf497361a
Secunia Security Advisory 16618
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for pcre. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, suse
SHA-256 | 8415252bddb3e5edfdf491d95f0118cd12aaae38e06711a6ca2427c5c0de486f
Secunia Security Advisory 16619
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued updates for php4 and php5. These fix some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, suse
SHA-256 | 3c84d665a11b945112c49ef4be2a683d31e42513981290f5d569486717df05f8
Secunia Security Advisory 16621
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for phpgroupware. This fixes some vulnerabilities, which can be exploited by malicious administrative users to conduct script insertion attacks, or by malicious people to bypass certain security restrictions or compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, gentoo
SHA-256 | 7e171c4f78c5fa7d4566e6eabc3845ba2d1c1c80fb2034683a11a8d8db0735fc
Secunia Security Advisory 16626
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for lm_sensors. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
systems | linux, gentoo
SHA-256 | d4bb10811b2b1b91bd4f7146b3d800a8f52d8c5aa0084f278417957f8821fc90
Secunia Security Advisory 16635
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for php. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, php, vulnerability
systems | linux, slackware
SHA-256 | f6c90550f97977d476fa62861d1af6837ce1b4bb4e3109d073754f4f45ca267f
Secunia Security Advisory 16637
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for gaim. This fixes a vulnerability and two weaknesses, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system.

tags | advisory, denial of service
systems | linux, slackware
SHA-256 | 5ceecea2b4fe7421213cfb60c409411fee62ce15f04eef34f48e204dc7b6c61a
Gentoo Linux Security Advisory 200508-20
Posted Aug 31, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200508-20 - phpGroupWare improperly validates the mid parameter retrieved via a forum post. The current version of phpGroupWare also adds several safeguards to prevent XSS issues, and disables the use of a potentially vulnerable XML-RPC library. Versions less than 0.9.16.008 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2005-2498, CVE-2005-2600
SHA-256 | d33de08c4298350651ca1c385fd6272325c50069a0e5c4e6069ba07eeb7605fd
Gentoo Linux Security Advisory 200508-19
Posted Aug 31, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200508-19 - Javier Fernandez-Sanguino Pena has discovered that lm_sensors insecurely creates temporary files with predictable filenames when saving configurations. Versions less than 2.9.1-r1 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2005-2672
SHA-256 | 31b4d798b9de178a17a1c9460c42068a441d78e850787dc18cf3a51cb443e327
Debian Linux Security Advisory 791-1
Posted Aug 31, 2005
Authored by Debian | Site debian.org

Debian Security Advisory DSA 791-1 - Max Vozeler discovered that the lockmail program from maildrop, a simple mail delivery agent with filtering abilities, does not drop group privileges before executing commands given on the commandline, allowing an attacker to execute arbitrary commands under with group mail privileges.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2005-2655
SHA-256 | 584cfb606501f55a12f62374974c15e0a1de581a87b4f136e5a4aa5a0d9d4e73
e107post.txt
Posted Aug 31, 2005
Authored by Marc Ruef | Site computec.ch

e107 version 0.6 has an input validation flaw in forum_post.php that allows attackers the ability to create topics in non-existing forums.

tags | advisory, php
SHA-256 | 54ebb505ef7de3a47c44cc973d59da1fe31893292a35300fb1af1a1046ebe05e
iDEFENSE Security Advisory 2005-08-29.3
Posted Aug 31, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory - Local exploitation of a design error in the Symantec AntiVirus 9 Corporate Edition may allow a user to gain elevated privileges. Exploitation can occur when a user chooses the right click Scan for viruses option. The Symantec scan file interface allows the user to launch a help window through the use of a toolbar icon. If the user then right clicks the help window title bar they can choose the Jump to URL menu option, which will then allow them to browse the local file system and execute files as the SYSTEM user.

tags | advisory, local
advisories | CVE-2005-2017
SHA-256 | 4c4c53312ff3be87fe0e66e5f442ebce8f831cd5fb132dd1575a49517cbbc92b
iDEFENSE Security Advisory 2005-08-29.2
Posted Aug 31, 2005
Authored by vade79, iDefense Labs | Site idefense.com

iDEFENSE Security Advisory - Local exploitation of a design error in Adobe Systems, Inc. Version Cue allows local attackers to gain root privileges. Version Cue includes a setuid root application named VCNative which is vulnerable to a symlink attack. The vulnerability specifically exists due to the use of predictable log file names. VCNative uses a format such as VCNative-[pid].log for the filename and stores the file in the current working directory. Attackers can easily predict the created filename and supply user-controlled data via the -host and - port options. A carefully supplied value can cause a crafted log file to be written. Crafted strings written to root-owned files can lead to arbitrary code execution with root privileges.

tags | advisory, arbitrary, local, root, code execution
advisories | CVE-2005-1842
SHA-256 | 411dc375de7e880373b5415079f07e6ba80c1cdda2a6b6a1c38e1aa35c6407ac
iDEFENSE Security Advisory 2005-08-29.1
Posted Aug 31, 2005
Authored by vade79, iDefense Labs | Site idefense.com

iDEFENSE Security Advisory - Local exploitation of a design error in Adobe Systems, Inc. Version Cue allows local attackers to gain root privileges. Version Cue includes a setuid root application named VCNative which contains a design error that allows local attackers to gain root privileges. The vulnerability specifically exists due to an unchecked command line option parameter. The -lib command line option allows users to specify library bundles which allows for the introduction of arbitrary code in the context of a root owned process. The init function in a shared library is executed immediately upon loading. By utilizing the -lib argument to load a malicious library, local attackers can execute arbitrary code with root privileges.

tags | advisory, arbitrary, local, root
advisories | CVE-2005-1843
SHA-256 | 4df7fce995e778869fe2e236a60a050ada95134690b5bfce30b5fc73c86389d1
bfccown.txt
Posted Aug 31, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

BFCommand and Control Server Manager are both susceptible to multiple bugs. BFCC versions 1.22_A and below and BFVCC versions 2.14_B and below are susceptible to full anonymous login bypass and various manipulation flaws.

tags | advisory
SHA-256 | 82d511d1562e6896e98ab485a7698bc6c3577ea5c73c093677372f083c030e8c
Debian Linux Security Advisory 788-1
Posted Aug 31, 2005
Authored by Debian | Site debian.org

Debian Security Advisory DSA 788-1 - Several security related problems have been discovered in kismet, a wireless 802.11b monitoring tool.

tags | advisory
systems | linux, debian
advisories | CVE-2005-2626, CVE-2005-2627
SHA-256 | 2da369bca44b6d64e712261b8e7bfd3eda1b78c5bc20947a4d194f98a54d4914
Secunia Security Advisory 16611
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Alexander Gerasiov has reported a security issue in phpLDAPadmin, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | df7dc1a276065204206babdcd62214ff177b7bbb077a3ee35064efc5ff43edad
Secunia Security Advisory 16613
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sowhat has discovered a vulnerability in BNBT EasyTracker, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 0b8a62a0b46c6f3bfb6dc6578c3d1bb0f4b4226ec44339f85e3c081c333caebd
Secunia Security Advisory 16614
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - vade79 has discovered a vulnerability in Gopher client, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 50bcf8a16f5e21a7b20a90180232741714c21f38727cfc022f016f7f0654d010
Secunia Security Advisory 16615
Posted Aug 31, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kutbuddin Trunkwala has reported a vulnerability in BlueWhaleCRM, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | b24efbe0dd772d918caafd9e5255560eee7735275bf2f5921f220a09a2c7bc75
Page 1 of 17
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Sam Bankman-Fried's Sentencing Hearing Over FTX Fraud Begins Today
Posted Mar 28, 2024

tags | headline, fraud, cryptography
Sellafield To Be Prosecuted For IT Security Offenses
Posted Mar 28, 2024

tags | headline, government, britain, flaw
These 17,000 Microsoft Exchange Servers Are A Ticking Time Bomb
Posted Mar 28, 2024

tags | headline, microsoft, email, flaw
Analyse, Hunt, And Classify Malware Using .NET Metadata
Posted Mar 27, 2024

tags | headline, hacker, malware, microsoft
VPN Apps On Google Play Turn Android Devices Into Proxies
Posted Mar 27, 2024

tags | headline, privacy, phone, flaw, google
Fortinet FortiClient EMS SQL Injection Flaw Exploited In The Wild
Posted Mar 27, 2024

tags | headline, hacker, flaw
Google Reveals 0-Day Exploits In Enterprise Tech Surged 64% Last Year
Posted Mar 27, 2024

tags | headline, flaw, google, zero day
Ray AI Framework Vulnerability Exploited To Hack Hundreds Of Clusters
Posted Mar 27, 2024

tags | headline, hacker, flaw
Justice Dept Indicts 7 Accused In 14 Year Long Hack Campaign By Chinese Government
Posted Mar 26, 2024

tags | headline, hacker, government, usa, china, cyberwar, spyware, backdoor
Ransomware Can Mean Life Or Death At Hospital, But DEF CON Hackers Have A Plan
Posted Mar 26, 2024

tags | headline, hacker, malware, conference, cryptography
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close