Exploit the possiblities
Showing 1 - 25 of 387 RSS Feed

Files

My Remote File Server Privilege Escalation
Posted Oct 30, 2009
Authored by Francis Provencher

My Remote File Server suffers from a local privilege escalation vulnerability.

tags | advisory, remote, local
MD5 | 996e1566a6e551502ae42f789ccd2008
Windows Media Player Local File Detection
Posted Oct 30, 2009
Authored by Renard Volant | Site lrv.ch.vu

Windows Media Player version 11 suffers from a local file detection vulnerability.

tags | advisory, local
systems | windows
MD5 | 98d84d1e1313d92d599b98256f2cb656
Joomla Jumi Is Backdoored
Posted Oct 30, 2009
Authored by Jan van Niekerk

The Joomla Jumi component is backdoored and apparently sends user passwords to another site.

tags | advisory
MD5 | d2f1e119420378da415a4687d0c51ac1
SafeNet SoftRemote Local Buffer Overflow
Posted Oct 30, 2009
Site senseofsecurity.com.au

SafeNet SoftRemote is vulnerable to a local stack based buffer overflow which can lead to the compromise of a vulnerable system. Versions 10.8.5 Build 2 and 10.3.5 Build 6 are verified vulnerable.

tags | advisory, overflow, local
MD5 | 1360d5a09524a3e81447e05a39eab5d2
Debian Linux Security Advisory 1923-1
Posted Oct 30, 2009
Authored by Debian | Site debian.org

Debian Linux Security Advisory 1923-1 - A denial of service vulnerability has been found in libhtml-parser-perl, a collection of modules to parse HTML in text documents which is used by several other projects like e.g. SpamAssassin.

tags | advisory, denial of service, perl
systems | linux, debian
advisories | CVE-2009-3627
MD5 | 13668574cbe66bc7e4b56e0660d327fe
2WIRE Remote Denial Of Service
Posted Oct 30, 2009
Authored by hkm

The remote management interface on tcp/50001 of various 2WIRE devices suffers from a remote denial of service vulnerability.

tags | advisory, remote, denial of service, tcp
MD5 | ba747caf5b01b98af810e96f4bf91fcd
Mandriva Linux Security Advisory 2009-291
Posted Oct 29, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-291 - Directory traversal vulnerability in the HTTP server in Mort Bay Jetty before 6.1.17, and 7.0.0.M2 and earlier 7.x versions, allows remote attackers to access arbitrary files via directory traversal sequences in the URI. This update fixes this vulnerability.

tags | advisory, remote, web, arbitrary
systems | linux, mandriva
advisories | CVE-2009-1523
MD5 | f38d6bc2709f9dfac9d2011e8b7a2cc7
Mandriva Linux Security Advisory 2009-290
Posted Oct 29, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-290 - Security issues were identified and fixed in Firefox 3.0.x. This update provides the latest Mozilla Firefox 3.0.x to correct these issues. Additionally, some packages which require so, have been rebuilt and are being provided as updates.

tags | advisory
systems | linux, mandriva
advisories | CVE-2009-1563, CVE-2009-3274, CVE-2009-3370, CVE-2009-3372, CVE-2009-3373, CVE-2009-3374, CVE-2009-3375, CVE-2009-3376, CVE-2009-3380, CVE-2009-3382
MD5 | dd3c4b8af7865f0b5de535d51060b4e6
Zero Day Initiative Advisory 09-074
Posted Oct 29, 2009
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 09-074 - This vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of EMC Documentum eRoom, OpenText Hummingbird and OpenText Search Server. Authentication is not required to exploit this vulnerability. The specific flaw exists in the Hummingbird STR service (STRsvc.exe) which listens by default on TCP port 10500. The STRlib.dll module receives network packet data into a static stack buffer. By providing a large enough packet, this buffer can overflow. Exploitation allows remote attackers to execute arbitrary code under the context of the SYSTEM user.

tags | advisory, remote, overflow, arbitrary, tcp
MD5 | eaeb27eb7d075ac3825ee59b650be142
Secunia Security Advisory 37175
Posted Oct 29, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
MD5 | 8630b563d21eb81c103122e21011976e
Secunia Security Advisory 36711
Posted Oct 29, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, manipulate certain data, or compromise a user's system.

tags | advisory, vulnerability
MD5 | 12e8ba1aa809cdc66e8298061dd40855
Secunia Security Advisory 37173
Posted Oct 29, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Mozilla SeaMonkey, which can be exploited by malicious people to manipulate certain data or compromise a user's system.

tags | advisory, vulnerability
MD5 | d26034de093c9d83b49242b424f85bf4
Secunia Security Advisory 37143
Posted Oct 29, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in AOL AIM, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 8164e6c186d04fbbd937170a7d64d5b3
Debian Linux Security Advisory 1922-1
Posted Oct 28, 2009
Authored by Debian | Site debian.org

Debian Linux Security Advisory 1922-1 - Several remote vulnerabilities have been discovered in Xulrunner, a runtime environment for XUL applications, such as the Iceweasel web browser.

tags | advisory, remote, web, vulnerability
systems | linux, debian
advisories | CVE-2009-3274, CVE-2009-3370, CVE-2009-3372, CVE-2009-3373, CVE-2009-3374, CVE-2009-3375, CVE-2009-3376, CVE-2009-3380, CVE-2009-3382
MD5 | 460655adb2782c43984b233624e94e5a
iDEFENSE Security Advisory 2009-10-28.1
Posted Oct 28, 2009
Authored by iDefense Labs, regenrecht | Site idefense.com

Remote exploitation of a buffer overflow in the Mozilla Foundation's libpr0n image processing library allows attackers to execute arbitrary code. The libpr0n GIF parser was designed using a state machine which is represented as a series of switch/case statements. One particularly interesting state, 'gif_image_header', is responsible for interpreting a single image/frame description record. A single GIF file may contain many images, each with a different color map associated. The problem lies in the handling of changes to the color map of subsequent images in a multiple-image GIF file. Memory reallocation is not managed correctly and can result in an exploitable heap overflow condition. iDefense confirmed the existence of this vulnerability using Mozilla Firefox versions 3.0.13 and 3.5.2 on 32-bit Windows XP SP3. Other versions, and potentially other applications using libpr0n, are suspected to be vulnerable.

tags | advisory, remote, overflow, arbitrary
systems | windows, xp
advisories | CVE-2009-3373
MD5 | 44a92ee1872b49c79818d60937028c4a
Opera RSS Hijacking
Posted Oct 28, 2009
Authored by Inferno from Secure Thoughts

Small write up called Hijacking Opera's Native Page Using Malicious RSS Payloads.

tags | advisory
MD5 | 3dcca7d61b2e38f2b980c1b733cf2b03
Secunia Security Advisory 37187
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, redhat
MD5 | dc33237f394d123f60d993541a94fdf5
Secunia Security Advisory 37186
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in VMware Server, VMware ESX, and VMware ESXi, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | 45efba161eb152a07fdcfd4ea1efb0a3
Secunia Security Advisory 37177
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for samba. This fixes some vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information, and by malicious users to bypass certain security restrictions, disclose sensitive information and cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
systems | linux, redhat
MD5 | 63c67a2e878f71fee93740f26fbc264b
Secunia Security Advisory 37184
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Sun Solaris, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
systems | solaris
MD5 | f5a9cae839f9180c970ac31180bdc246
Secunia Security Advisory 37172
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in various VMware products, which can be exploited by malicious, local users in a guest virtual machine to gain escalated privileges.

tags | advisory, local
MD5 | f28c64078feff0bdbfa8a1f1eca5f792
Secunia Security Advisory 37181
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Maxim A. Kulakov has discovered a security issue in multiple Rising products, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
MD5 | c9be2422784d2b7b4c7b16fd9b3ffc04
Secunia Security Advisory 37179
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some weaknesses have been reported in various McAfee products, which can be exploited by malware to bypass the scanning functionality.

tags | advisory
MD5 | 319dd023c7ab7178781b84cd39fab85a
Open Source CERT Security Advisory 2009.15
Posted Oct 28, 2009
Authored by Andrea Barisani, Open Source CERT | Site ocert.org

KDE suffers from multiple insufficient validation vulnerabilities that can result in the execution of active content. Versions below 4.3.2 are affected.

tags | advisory, vulnerability
MD5 | 6fc99ca72f8b5208b0333b8b1b8747f9
Mozilla Firefox Floating Point Memory Allocation
Posted Oct 28, 2009
Authored by Alin Rad Pop | Site secunia.com

Secunia Research has discovered a vulnerability in Mozilla Firefox, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an array indexing error while allocating space for floating point numbers. This can be exploited to trigger a memory corruption when a specially crafted floating point number is processed. Successful exploitation allows execution of arbitrary code.

tags | advisory, arbitrary
advisories | CVE-2009-1563
MD5 | 119ecb0e63b5c136c7eaa1af3b5aca1c
Page 1 of 16
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close