Exploit the possiblities
Showing 1 - 25 of 607 RSS Feed

Files

Mandriva Linux Security Advisory 2008-056
Posted Mar 3, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability was found in the excel_read_HLINK function in the Microsoft Excel plugin in Gnumeric prior to version 1.8.1 that would allow for the execution of arbitrary code via a crafted XLS file containing XLS HLINK opcodes.

tags | advisory, arbitrary
systems | linux, mandriva
advisories | CVE-2008-0668
MD5 | 48441dc70983aa2af7d1f2f899351e60
Ubuntu Security Notice 582-1
Posted Mar 3, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 582-1 - It was discovered that Thunderbird did not properly set the size of a buffer when parsing an external-body MIME-type. If a user were to open a specially crafted email, an attacker could cause a denial of service via application crash or possibly execute arbitrary code as the user. Various flaws were discovered in Thunderbird and its JavaScript engine. By tricking a user into opening a malicious message, an attacker could execute arbitrary code with the user's privileges. Various flaws were discovered in the JavaScript engine. By tricking a user into opening a malicious message, an attacker could escalate privileges within Thunderbird, perform cross-site scripting attacks and/or execute arbitrary code with the user's privileges. Gerry Eisenhaur discovered that the chrome URI scheme did not properly guard against directory traversal. Under certain circumstances, an attacker may be able to load files or steal session data. Ubuntu is not vulnerable in the default installation. Flaws were discovered in the BMP decoder. By tricking a user into opening a specially crafted BMP file, an attacker could obtain sensitive information.

tags | advisory, denial of service, arbitrary, javascript, xss
systems | linux, ubuntu
advisories | CVE-2008-0420, CVE-2008-0412, CVE-2008-0413, CVE-2008-0415, CVE-2008-0304, CVE-2008-0418
MD5 | 34890bd0a0e9cf83e242f860168920b9
iusa-canon.txt
Posted Mar 3, 2008
Authored by Nate Johnson

Certain Canon Multi Function Devices allow remote attackers to redirect traffic to other sites (aka FTP bounce) via the PORT command.

tags | advisory, remote
advisories | CVE-2008-0303
MD5 | 056e6e1dd35f1d8b985326b0416c9b50
Mandriva Linux Security Advisory 2008-055
Posted Mar 3, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Chris Evans found a buffer overflow condition in Ghostscript, which can lead to arbitrary code execution as the user running any application using it to process a maliciously crafted Postscript file.

tags | advisory, overflow, arbitrary, code execution
systems | linux, mandriva
advisories | CVE-2008-0411
MD5 | 52ccd7ac9349294e22e4288af884a5a8
beehive-hardcode.txt
Posted Mar 3, 2008
Authored by Brad Antoniewicz

The Beehive/SendFile.NET Secure File Transfer appliance appears to have credentials hardcoded within the outboxWriteUnsent() function of the FTPThread.class file of SendFile.jar.

tags | advisory
MD5 | 704d2fd0218615186c6c97c7a8362b90
ghostscript-overflow.txt
Posted Mar 3, 2008
Authored by Chris Evans

Ghostscript versions 8.61 and below suffer from a stack-based buffer overflow in the zseticcspace() function in zicc.c.

tags | advisory, overflow
MD5 | e8908af1dfabf34c4b2eab9ea0ace408
Secunia Security Advisory 29103
Posted Mar 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Chris Evans has reported a vulnerability in Ghostscript, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 46c0bacfff915718dd405c70fa1bebdc
Secunia Security Advisory 29119
Posted Mar 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - nnposter has reported a vulnerability in Packeteer PacketShaper, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 5b16bf0b4032b1af8daee0a0df3c77a8
Secunia Security Advisory 29121
Posted Mar 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - nnposter has reported a vulnerability in Alkacon OpenCms, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | fdb93856f0523eaa3c05e50391d75079
Secunia Security Advisory 29123
Posted Mar 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Iron has discovered a vulnerability in eazyPortal, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | cb47a98a621691a66331891baa424891
Secunia Security Advisory 29124
Posted Mar 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered some vulnerabilities in Trend Micro OfficeScan, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | 4731232e550fa1cb161db161bc1ba1e1
Secunia Security Advisory 29125
Posted Mar 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Steve Kemp has reported two security issues in XWine, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
MD5 | cb57c5d6be832700263402b35482de9c
Secunia Security Advisory 29135
Posted Mar 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for ghostscript. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, debian
MD5 | 1b5280a9bfacd390e7013cfcf2481cea
Secunia Security Advisory 29139
Posted Mar 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged some vulnerabilities in AIX, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or to gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
systems | aix
MD5 | 8b4cd5e73cb441579076bb9e98d67e46
Secunia Security Advisory 29144
Posted Mar 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Berkely Automounter Suite of Utilities (am-utils), which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
MD5 | b419e6cfec1d1aae18e33b54a495f0cf
Secunia Security Advisory 29156
Posted Mar 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
MD5 | 79f4023374bdb603cd7d05707f6fce78
Secunia Security Advisory 29158
Posted Mar 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Julien Cayssol has reported some vulnerabilities in Centreon, which can be exploited by malicious people to conduct cross-site scripting attacks or to disclose sensitive information.

tags | advisory, vulnerability, xss
MD5 | be1ea137282acb67747999af03262c7b
Secunia Security Advisory 29175
Posted Mar 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for pcre. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library.

tags | advisory, denial of service
MD5 | d0f17042d7e0287ee65af9cf363c6db6
Secunia Security Advisory 29176
Posted Mar 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some security issues have been reported in ViewVC, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 20d96e28d6144521207d72524269e837
Secunia Security Advisory 29177
Posted Mar 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - vijayv has reported a vulnerability in XRMS CRM, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | d4c5c76acc5c8fd28338013da6cc5a9d
Secunia Security Advisory 29185
Posted Mar 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for imp. This fixes a security issue and a vulnerability, which can be exploited by malicious users to bypass certain security restrictions, and by malicious people to bypass certain security restrictions and manipulate data.

tags | advisory
systems | linux, fedora
MD5 | 389f8bb9a06d98e690000228f15f66c9
Secunia Security Advisory 29186
Posted Mar 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for horde. This fixes a security issue and a vulnerability, which can be exploited by malicious people to bypass certain security restrictions and manipulate data.

tags | advisory
systems | linux, fedora
MD5 | 9d3f64b9744f1ec4564c7fccf6b3af57
Secunia Security Advisory 29187
Posted Mar 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for am-utils. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
MD5 | 37d0a8f82527222fb4e0ecb25137bed4
Mandriva Linux Security Advisory 2008-054
Posted Feb 29, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability was discovered by Havoc Pennington in how the dbus-daemon applied its security policy. A user with the ability to connect to the dbus-daemon could possibly execute certain method calls that they should not normally have access to.

tags | advisory
systems | linux, mandriva
advisories | CVE-2008-0595
MD5 | 394afef1d0e71f4050d6ba10e9acccd4
Secunia Security Advisory 29112
Posted Feb 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for ghostscript. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, redhat
MD5 | c9831d3ca5e48f9e880de84f0e748819
Page 1 of 25
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close