what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 615 RSS Feed

Files

Secunia Security Advisory 30398
Posted May 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Ortro, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 8868a1663caee4030b5c66fbe477a57b1d534cf774d0cdbc876754ce81d52f60
Secunia Security Advisory 30403
Posted May 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Creative Software AutoUpdate Engine ActiveX Control, which can be exploited by malicious people to compromise a user's system.

tags | advisory, activex
SHA-256 | b5f83493345205170c196a3771a7ef5b8119732f0c1acc3976a325340f39e7e3
Secunia Security Advisory 30408
Posted May 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in spamdyke, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 379be6b1508b72720d17ee5ba9e71124e3db7df43adf1e1e9388ec8ef4ef7473
Secunia Security Advisory 30409
Posted May 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Motorola RAZR, which can be exploited by malicious people to compromise a vulnerable device.

tags | advisory
SHA-256 | df58f3399105910a69c672be37d60ea9fbfcd39c5d60ffffd113dc22de7187c1
Secunia Security Advisory 30410
Posted May 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in EMC AlphaStor, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | a158f8be169cd3f96aa5c1c1354a67c329d752029e719f949ac04ac9d0279d8d
secadv_20080528.txt
Posted May 28, 2008
Site openssl.org

OpenSSL Security Advisory - Two moderate severity security flaws have been fixed in OpenSSL 0.9.8h. Testing using the Codenomicon TLS test suite discovered a flaw in the handling of server name extension data in OpenSSL 0.9.8f and OpenSSL 0.9.8g. Testing using the Codenomicon TLS test suite discovered a flaw if the 'Server Key exchange message' is omitted from a TLS handshake in OpenSSL 0.9.8f and OpenSSL 0.9.8g.

tags | advisory
advisories | CVE-2008-0891, CVE-2008-1672
SHA-256 | 798bc0606364fec82629c9cbf4774497ca88fe671a7f59a54d0c210d236374c8
aklink-sa-2008-006-opera-heap-overflow.txt
Posted May 28, 2008
Authored by FX, Alexander Klink | Site cynops.de

Opera versions below 9.25 are susceptible to a heap-based buffer overflow that allows for a denial of service and possibly code execution.

tags | advisory, denial of service, overflow, code execution
advisories | CVE-2007-6521
SHA-256 | f6dc341cce8dd3f5bc84c05a0c44cde29463acefebfde3867a34bf222e7aabf7
Debian Linux Security Advisory 1589-1
Posted May 28, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1589-1 - It was discovered that libxslt, an XSLT processing runtime library, could be coerced into executing arbitrary code via a buffer overflow when an XSL style sheet file with a long XSLT "transformation match" condition triggered a large number of steps.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2008-1767
SHA-256 | 3f71ed6525424de09bdb4c065d5f0d71884755d3d298d7a2f09c76bf171bc7cf
Secunia Security Advisory 30360
Posted May 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in IBM AIX, which can be exploited by malicious people to disclose system information.

tags | advisory
systems | aix
SHA-256 | 7b5014a03048ed2a6fc25ee0b197386be1fda83098e4618f7768e230e4407862
Secunia Security Advisory 30357
Posted May 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | solaris
SHA-256 | fc0a1b5efd1652a58c80143a93e3a22f3e8e87c57a13cd1c5c7edcda6aa74afa
Zero Day Initiative Advisory 08-033
Posted May 27, 2008
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable Motorola RAZR firmware based cell phones. User interaction is required to exploit this vulnerability in that the target must accept a malicious image sent via MMS. The specific flaw exists in the JPEG thumbprint component of the EXIF parser. A corrupt JPEG received via MMS can cause a memory corruption which can be leveraged to execute arbitrary code on the affected device.

tags | advisory, remote, arbitrary
SHA-256 | 73dad834e8ff64514f4a305d4cd194246463b06aed7c666a0862feb68f6c97d4
iDEFENSE Security Advisory 2008-05-27.2
Posted May 27, 2008
Authored by iDefense Labs, Stephen Fewer | Site idefense.com

iDefense Security Advisory 05.27.08 - Remote exploitation of an arbitrary command execution vulnerability in EMC Corp.'s AlphaStor could allow an attacker to execute arbitrary code with SYSTEM privileges. AlphaStor consists of multiple applications, one of which is the Library Manager. The Library Manager is used to manage the replacement of disk drives in distributed locations. The Manager consists of a single process, the "robotd" process, that listens on TCP port 3500 for incoming connections. The Library Manager is prone to an arbitrary command execution vulnerability. When sent a specific request, "robotd" will use a string from the packet as a command to execute on the system via the CreateProcess() function. This allows an attacker to run arbitrary programs on the host with SYSTEM privileges. iDefense has confirmed the existence of this vulnerability in AlphaStor version 3.1 SP1 for Windows. Previous versions, as well as versions for other platforms, may also be affected.

tags | advisory, remote, arbitrary, tcp
systems | windows
advisories | CVE-2008-2157
SHA-256 | 89af74c8a928b81854ee449e94087273d27f78d647c9fd326a1544aff4057f61
iDEFENSE Security Advisory 2008-05-27.1
Posted May 27, 2008
Authored by iDefense Labs, Sean Larsson, Stephen Fewer | Site idefense.com

iDefense Security Advisory 05.27.08 - Remote exploitation of multiple stack based buffer overflow vulnerabilities in EMC Corp.'s AlphaStor could allow an attacker to execute arbitrary code with SYSTEM privileges. AlphaStor consists of multiple applications, one of which is the Server Agent. The Server Agent is one of the core components of AlphaStor, and is used to initiate disk management requests. The Agent consists of several processes, one of which is the AlphaStor Command Line Interface process. This process listens on TCP port 41025, and is prone to multiple stack based buffer overflow vulnerabilities. iDefense has confirmed the existence of these vulnerabilities in AlphaStor version 3.1 SP1 for Windows. Previous versions, as well as versions for other platforms, may also be affected.

tags | advisory, remote, overflow, arbitrary, tcp, vulnerability
systems | windows
advisories | CVE-2008-2158
SHA-256 | 8da9b9e7f94fd0d1345754a53a84aca4080928bbb8dcd14ed122e9038bc29440
Secunia Security Advisory 30289
Posted May 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco Voice Portal (CVP), which can be exploited by malicious users to gain escalated privileges.

tags | advisory
systems | cisco
SHA-256 | 23d19ebd5d2722b6d0316f55bf74fb45a7631b3b9a9d99e462d0afd271de8801
Secunia Security Advisory 30316
Posted May 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Cisco Service Control Engine, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | cisco
SHA-256 | bd0ae3a4b7ce74da4ba0b008d75cbddd679e33ab0b0f94f0664ebbbf9464b23a
Secunia Security Advisory 30322
Posted May 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | cisco
SHA-256 | db68766e691e65d24a21bfff0d3c413c6a92c61d80175da01db437d42966a5af
Secunia Security Advisory 30329
Posted May 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for compiz. This fixes a security issue, which can be exploited by malicious people with physical access to a system to bypass certain security restrictions.

tags | advisory
systems | linux, redhat
SHA-256 | 4f0b6497b83e76b87a0da9874aaee7eae875a3736422d9211db450c944543222
Secunia Security Advisory 30334
Posted May 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Digital Security Research Group has reported a vulnerability in SAP Web Application Server, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, web, xss
SHA-256 | b528e46e31a3863ba167d4d6b01f92cca168196b2334f49dfbc679e86a642a34
Secunia Security Advisory 30336
Posted May 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Trillian, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | ae38d7ea7febd97bff46ccfbd229a071ac6d53a12d300699540ae3d437b136ae
Secunia Security Advisory 30339
Posted May 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for setroubleshoot. This fixes two security issues, which can be exploited by malicious, local users to conduct script insertion attacks and to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, redhat
SHA-256 | d28120733c771149894189614380fb10fe8a855ff15243e91cb2212bc0698aff
Secunia Security Advisory 30342
Posted May 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for dovecot. This fixes a weakness and a security issue, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
systems | linux, redhat
SHA-256 | b2c3cc75ad8dcdd0145e47216725672e02a3bc8e6f0b3593bf09c3848125a7aa
Secunia Security Advisory 30351
Posted May 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for mysql. This fixes some security issues and vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service), bypass certain security restrictions, and gain escalated privileges.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
SHA-256 | c0421023293c75ae791415120934d2e3cf3d4c3ce4e26226ac6d2ba650f69855
Secunia Security Advisory 30371
Posted May 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in PCPIN Chat, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | a82bd6c1ac78f14ca3933f70605f2572811a990afc1d04f5e1bb9184606fdc6d
Debian Linux Security Advisory 1588-1
Posted May 27, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1588-1 - Johannes Bauer discovered an integer overflow condition in the hrtimer subsystem on 64-bit systems. This can be exploited by local users to trigger a denial of service (DoS) by causing the kernel to execute an infinite loop. Jan Kratochvil reported a local denial of service condition that permits local users on systems running the amd64 flavor kernel to cause a system crash. Paul Harks discovered a memory leak in the Simple Internet Transition (SIT) code used for IPv6 over IPv4 tunnels. This can be exploited by remote users to cause a denial of service condition. David Miller and Jan Lieskovsky discovered issues with the virtual address range checking of mmaped regions on the sparc architecture that may be exploited by local users to cause a denial of service.

tags | advisory, remote, denial of service, overflow, kernel, local, memory leak
systems | linux, debian
advisories | CVE-2007-6712, CVE-2008-1615, CVE-2008-2136, CVE-2008-2137
SHA-256 | 7d370613a9637a5c92997661524dbca3c8c5f98f4be417a3dc5f5aa9a147b85c
HP Security Bulletin 2007-14.54
Posted May 27, 2008
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified HP-UX running the useradd(1M) command. The vulnerability could be exploited locally to allow unauthorized access to directories or files.

tags | advisory
systems | hpux
advisories | CVE-2008-1660
SHA-256 | fabe48a5968d90a3679f2d3ed465834be43c8c6cd071959bf8788762c32d220a
Page 4 of 25
Back23456Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close