Exploit the possiblities
Showing 1 - 25 of 457 RSS Feed

Files

Debian Linux Security Advisory 1719-2
Posted Feb 28, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1719-2 - Changes in DSA-1719-1 caused GNUTLS to reject X.509v1 certificates as CA root certificates by default, as originally described in the documentation. However, it turned out that there is still significant use of historic X.509v1 CA root certificates, so this constitutes an unacceptable regression. This update reverses this part of the changes in DSA-1719-1. Note that the X.509v1 certificate format does not distinguish between server and CA certificates, which means that an X.509v1 server certificates is implicitly converted into a CA certificate when added to the trust store (which was the reason for the change in DSA-1719-1).

tags | advisory, root
systems | linux, debian
advisories | CVE-2008-4989
MD5 | 92873edc4e79ecccf66227b800620956
Secunia Security Advisory 34071
Posted Feb 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for mldonkey. This fixes a vulnerability, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
systems | linux, fedora
MD5 | e001bade50faca9c5a2dbf8014da47a6
Mandriva Linux Security Advisory 2009-060
Posted Feb 28, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-060 - A security vulnerability has been identified and fixed in nfs-utils, which caused TCP Wrappers to ignore netgroups and allows remote attackers to bypass intended access restrictions. The updated packages have been patched to prevent this.

tags | advisory, remote, tcp
systems | linux, mandriva
advisories | CVE-2008-4552
MD5 | 797e6287ed71d645595fdcc2d7c933c8
Mandriva Linux Security Advisory 2009-059
Posted Feb 27, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-059 - Python has a variable called sys.path that contains all paths where Python loads modules by using import scripting procedure. A wrong handling of that variable enables local attackers to execute arbitrary code via Python scripting in the current X-Chat working directory. This update provides fix for that vulnerability.

tags | advisory, arbitrary, local, python
systems | linux, mandriva
advisories | CVE-2009-0315
MD5 | 7274b4efdabde5a46185ad99bba0cb04
POP Peeper 3.4.0.0 UIDL Buffer Overflow Advisory
Posted Feb 27, 2009
Authored by Jeremy Brown | Site krakowlabs.com

POP Peeper version 3.4.0.0 suffers from an UIDL command related remote buffer overflow vulnerability in the client.

tags | advisory, remote, overflow
MD5 | d82d9e1b78eb2f986cdcd9e2b58b442e
Shoutcast 1.9.8 Cross Site Scripting
Posted Feb 27, 2009
Authored by Joseph Puran, Ronald Gutierrez, Stephen Komal

SHOUTcast version 1.9.8 suffers from a user-agent related cross site scripting vulnerability.

tags | advisory, xss
MD5 | e628376b60bd850827bd0e16b6567120
VMware Security Advisory 2009-0003
Posted Feb 27, 2009
Authored by VMware | Site vmware.com

VMware Security Advisory - A heap-based buffer overflow was discovered in the way ed, the GNU line editor, processed long file names. An attacker could create a file with a specially-crafted name that could possibly execute an arbitrary code when opened in the ed editor.

tags | advisory, overflow, arbitrary
advisories | CVE-2008-3916
MD5 | 75617133ef80ad3c7604cda09531c539
Ubuntu Security Notice 725-1
Posted Feb 27, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-725-1 - It was discovered that Kmail did not adequately prevent execution of arbitrary code when a user clicked on a URL to an executable within an HTML mail. If a user clicked on a malicious URL and chose to execute the file, a remote attacker could execute arbitrary code with user privileges. This update changes KMail's behavior to instead launch a helper program to view the file if the user chooses to execute such a link.

tags | advisory, remote, arbitrary
systems | linux, ubuntu
MD5 | 0eda36c8c9e6e1e1f71a69879a36c78f
Debian Linux Security Advisory 1728-1
Posted Feb 27, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1728-1 - It was discovered that dkim-milter, an implementation of the DomainKeys Identified Mail protocol, may crash during DKIM verification if it encounters a specially-crafted or revoked public key record in DNS.

tags | advisory, protocol
systems | linux, debian
MD5 | f17daccbfabfb3c44ec2f31e493e904d
Mandriva Linux Security Advisory 2009-058
Posted Feb 27, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-058 - Buffer overflow in wiretap/netscreen.c in Wireshark 0.99.7 through 1.0.5 allows user-assisted remote attackers to cause a denial of service (application crash) via a malformed NetScreen snoop file. Wireshark 0.99.6 through 1.0.5 allows user-assisted remote attackers to cause a denial of service (application crash) via a crafted Tektronix K12 text capture file, as demonstrated by a file with exactly one frame. Format string vulnerability in Wireshark 0.99.8 through 1.0.5 on non-Windows platforms allows local users to cause a denial of service (application crash) via format string specifiers in the HOME environment variable. This update provides Wireshark 1.0.6, which is not vulnerable to these issues.

tags | advisory, remote, denial of service, overflow, local
systems | linux, windows, mandriva
advisories | CVE-2009-0599, CVE-2009-0600, CVE-2009-0601
MD5 | df009a77b440818d40a16a5c4e1bd4f4
Secunia Security Advisory 34081
Posted Feb 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in PHP, where some have an unknown impact an others can potentially be exploited by malicious people to disclose sensitive information or cause a DoS (Denial of Service).

tags | advisory, denial of service, php, vulnerability
MD5 | d9b3ce970dd4c980a5840d785fd451bf
Secunia Security Advisory 34026
Posted Feb 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for python-crypto. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, crypto, python
systems | linux, debian
MD5 | 4500a0dd568da19a456801534a369810
Secunia Security Advisory 34069
Posted Feb 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for the kernel. This fixes a weakness, some security issues, and some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), bypass certain security restrictions, and potentially gain escalated privileges.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, suse
MD5 | 2862fe6edc50abc7e3d33d447e72a524
Secunia Security Advisory 34040
Posted Feb 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for python-crypto. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, crypto, python
systems | linux, fedora
MD5 | cfd8403cb688817a070c88e7ec98859b
Secunia Security Advisory 34072
Posted Feb 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for optipng. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
systems | linux, fedora
MD5 | 56f71e90b0cc37d01ad5b8e66525b120
Secunia Security Advisory 34070
Posted Feb 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for libpng. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise an application using the library.

tags | advisory, denial of service
systems | linux, fedora
MD5 | e3441bb588fae96c105a1e28b331e06b
Secunia Security Advisory 34080
Posted Feb 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Justin C. Klein Keane has discovered a vulnerability in the Taxonomy Theme module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | b6097eb7ab218e282fc9c10f81e13442
Secunia Security Advisory 34079
Posted Feb 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - VMware has issued an update for VMware ESX Server. This fixes a security issue, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 1d1d9ecc202b4c0ee8bb060de7dc116b
Secunia Security Advisory 34087
Posted Feb 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Nortel has acknowledged a vulnerability in some Nortel products, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
MD5 | be0245bc5a8d9354db20236ffcb0a4f4
Secunia Security Advisory 34076
Posted Feb 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Coppermine Photo Gallery, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
MD5 | 55a2ed344987bc3472cc16200782c85c
Secunia Security Advisory 34086
Posted Feb 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Novell eDirectory, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.

tags | advisory, denial of service
MD5 | 14285706b90476fc20646915978b7a2d
Secunia Security Advisory 34085
Posted Feb 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in vbDrupal, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
MD5 | 29707fffd5cd8ccc4e1a55daaf33bba7
Secunia Security Advisory 34092
Posted Feb 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Internet Download Manager, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | b5f24b0becf060cf615c536e6430f324
Secunia Security Advisory 33984
Posted Feb 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oliver Greiter has reported a vulnerability in Libero, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | c5cdbe9d97d20d68cca4433e5ea6a0c8
Secunia Security Advisory 34090
Posted Feb 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in various Etoshop products, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
MD5 | f41926318f719f0448712cc9a4b4bb8e
Page 1 of 19
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close