what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 503 RSS Feed

Files

Secunia Security Advisory 38619
Posted Feb 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Cisco Security Agent, which can be exploited by malicious users to disclose sensitive information or conduct SQL injection attacks, and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability, sql injection
systems | cisco
SHA-256 | 91851836eda761acaad5a64cca3d8764daf5b25c907f185a8c9223a03a45625a
Secunia Security Advisory 38496
Posted Feb 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Google Gadget ActiveX control, which can be exploited by malicious people to compromise a user's system.

tags | advisory, activex
SHA-256 | d119a068178111f3c42a2001d5df80000d37ed24ef43790d1be06408d6cd8aaf
Secunia Security Advisory 38612
Posted Feb 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Novell has acknowledged some vulnerabilities in Novell products, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 9003d8b78627fc8d16a43e1b56fe14f51235bb61ea85c56e8417187708667cf1
Secunia Security Advisory 38622
Posted Feb 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM Lotus Notes, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 25172b34f83752280f38f357a7838ddec260e7d515282e354a88cf38ceaa2940
Secunia Security Advisory 38608
Posted Feb 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Mozilla Firefox, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | f11f255a6964f6c7b2118ca81194fbd8fb89db1b65a7d386396311c6b2d7f2a9
Secunia Security Advisory 38527
Posted Feb 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in OmniDocs, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 47a78afb33d63530d462d5782ed2ef4c47c88179606e8bf148d1eefea0389f4e
Secunia Security Advisory 38615
Posted Feb 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Nicolas Derouet has discovered some vulnerabilities in OCS Inventory NG, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 232344af9ff360bc061ea5f26fb5e311e73b549a5ed40d040d378f53ba32e796
Secunia Security Advisory 38631
Posted Feb 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Alberto Fontanella has discovered some vulnerabilities in New-CMS, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site request forgery attacks.

tags | advisory, vulnerability, csrf
SHA-256 | aa4602d7fa4c071bc215209bb0d604a950eb3b43bb921faf2cbc3458232499df
Secunia Security Advisory 38634
Posted Feb 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in DotNetNuke, which can be exploited by malicious users to gain escalated privileges.

tags | advisory
SHA-256 | 42078cced977731a2940a4745ff379dfec1c739ab07c3e8693f16e5cb5c620ac
Secunia Security Advisory 38639
Posted Feb 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for acroread. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions or compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | 053fc8edd793265f1ae46e019c637e760f51175112c3919bcf69aebe785a5f29
Secunia Security Advisory 38680
Posted Feb 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for systemtap. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
systems | linux, fedora
SHA-256 | e78990fee1fd14c0559fbfc89e0d95b57fde3c752aee73f0d7fb3174c974c636
Secunia Security Advisory 38683
Posted Feb 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for the kernel. This fixes a weakness, some security issues and some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions, cause a DoS (Denial of Service), and potentially gain escalated privileges, and by malicious people to cause a DoS.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, suse
SHA-256 | b611d701ee877aabf79699241cd77a4c2490189bd7d9aab27d0cf8dccef1bd17
Secunia Security Advisory 38643
Posted Feb 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for ffmpeg. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | 2515856db4520cf73e3b8c5417052ab764f0fa1afea1d07fc77747ce30275d30
Secunia Security Advisory 38558
Posted Feb 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in ActivePerl, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 5fdc963b7e3c2d004df47d6b30f7708208372a3072af4828d1f7e38fcbd8ae5b
Secunia Security Advisory 38682
Posted Feb 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for krb5. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | c65f0f1bd60926705d9bcc4b13a2fc16cb536b6fb9b4fe5f43df4032bf0b96a4
Zero Day Initiative Advisory 10-021
Posted Feb 24, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-021 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell NetStorage. Authentication is not required to exploit this vulnerability. The specific flaws exists within the xsrvd process during the wide character conversion of requested file paths. In conjunction with a long username value the file path conversion will result in a heap overflow corrupting a chunk that will be immediately freed. This can be leveraged by remote attackers to compromise the NetStorage server.

tags | advisory, remote, overflow, arbitrary
SHA-256 | 86505f34da0ba244fc5a53e391d9c482ced37a1f06a9ea9729dafd66600e35c5
CA eHealth Performance Manager Security Notice
Posted Feb 24, 2010
Authored by Kevin Kotas | Site www3.ca.com

CA's support is alerting customers to a security risk with CA eHealth Performance Manager. A cross-site scripting vulnerability exists that can allow a remote attacker to potentially gain sensitive information. CA has provided guidance to remediate the vulnerability.

tags | advisory, remote, xss
advisories | CVE-2010-0640
SHA-256 | 39d84995aec8b0cb22c76241f4147383e8b61c3f330f9f6678b33fe9bd42b489
Mandriva Linux Security Advisory 2010-047
Posted Feb 24, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-047 - A race condition has been found in fuse that could escalate privileges for local users and lead to a DoS (Denial of Service). The updated packages have been patched to correct this issue.

tags | advisory, denial of service, local
systems | linux, mandriva
advisories | CVE-2009-3297
SHA-256 | 5496a7be3557bf95039baacc383fe0397de4ec0b2e027ce7564be91becfda6f2
Mandriva Linux Security Advisory 2010-046
Posted Feb 24, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-046 - A vulnerability has been found in ncpfs which can be exploited by local users to disclose potentially sensitive information, cause a DoS (Denial of Service), and potentially gain escalated privileges. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct this issue.

tags | advisory, denial of service, local
systems | linux, mandriva
advisories | CVE-2009-3297
SHA-256 | c108ed4df6585f5e3cdddb5770d4b2bf29a048d9140b0b94f6ac40e25242e1c4
Mandriva Linux Security Advisory 2010-045
Posted Feb 24, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-045 - PHP before 5.2.12 does not properly handle session data, which has unspecified impact and attack vectors related to (1) interrupt corruption of the SESSION superglobal array and (2) the session.save_path directive. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct this issue.

tags | advisory, php
systems | linux, mandriva
advisories | CVE-2009-4143
SHA-256 | 5e1d79fbc714c342600f61a55faaf39702ec104c83371e68e25ff475aa0b22d2
Debian Linux Security Advisory 2003-1
Posted Feb 24, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2003-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation.

tags | advisory, denial of service, kernel, vulnerability
systems | linux, debian
advisories | CVE-2009-3080, CVE-2009-3726, CVE-2009-4005, CVE-2009-4020, CVE-2009-4021, CVE-2009-4536, CVE-2010-0007, CVE-2010-0410, CVE-2010-0415, CVE-2010-0622
SHA-256 | 190008779715122c274b3af16405f0cf335d68634de01dbd876c3af3c9e0c4ac
Bournal Insecure Temporary Files
Posted Feb 24, 2010
Site secunia.com

Secunia Research has discovered a security issue in Bournal, which can be exploited by malicious, local users to perform certain actions with escalated privileges. The script uses temporary files in an insecure manner, which can be exploited to e.g. overwrite arbitrary files via symlink attacks when running the update check via the "--hack_the_gibson" parameter. Version 1.4 is affected.

tags | advisory, arbitrary, local
advisories | CVE-2010-0118
SHA-256 | a3704c22bb29dbe74497c72e16245dccd303f51f27b7e0ceadaa0047b32b368b
Bournal ccrypt Information Disclosure
Posted Feb 24, 2010
Site secunia.com

Secunia Research has discovered a security issue in Bournal, which can be exploited by malicious, local users to disclose sensitive information. The script uses e.g. the insecure "-K" command line parameter to pass the key to the ccrypt utilities, which can be exploited to obtain the key from the list of running processes. Note: This may not affect recent Linux versions, but is confirmed for FreeBSD 8.0. Other systems may also be affected. Version 1.4 is affected.

tags | advisory, local
systems | linux, freebsd
advisories | CVE-2010-0119
SHA-256 | 28a7ae6c7e9250897654b9dd6ec9de66b67ea1f3c9d8407ce433899cb325f213
Secunia Security Advisory 38640
Posted Feb 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for pidgin. This fixes multiple weaknesses, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, redhat
SHA-256 | 7fd9e1555ddf49c0f8b6ed3fbd5f906196e16e94a449771e3f62b16574f48852
Secunia Security Advisory 38591
Posted Feb 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ivan Markovic has reported some vulnerabilities in Huawei HG510, which can be exploited by malicious people to bypass certain security restrictions and conduct cross-site request forgery attacks.

tags | advisory, vulnerability, csrf
SHA-256 | 21d49a0a862c57cdcab2b01b68c95a2d59fe06c151a5579889e4a32ee30e738b
Page 4 of 21
Back23456Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close