Exploit the possiblities
Showing 1 - 25 of 487 RSS Feed

Files

Debian Security Advisory 2154-1
Posted Jan 31, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2154-1 - A design flaw (CVE-2010-4345) in exim4 allowed the local Debian-exim user to obtain root privileges by specifying an alternate configuration file using the -C option or by using the macro override facility (-D option). Unfortunately, fixing this vulnerability is not possible without some changes in exim4's behavior. If you use the -C or -D options or use the system filter facility, you should evaluate the changes carefully and adjust your configuration accordingly. The Debian default configuration is not affected by the changes.

tags | advisory, local, root
systems | linux, debian
advisories | CVE-2010-4345, CVE-2011-0017
MD5 | a9004c8e32ff921f1a4802395f1a3ddf
Debian Security Advisory 2153-1
Posted Jan 31, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2153-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leak.

tags | advisory, denial of service, kernel, vulnerability
systems | linux, debian
advisories | CVE-2010-0435, CVE-2010-3699, CVE-2010-4158, CVE-2010-4162, CVE-2010-4163, CVE-2010-4242, CVE-2010-4243, CVE-2010-4248, CVE-2010-4249, CVE-2010-4258, CVE-2010-4342, CVE-2010-4346, CVE-2010-4526, CVE-2010-4527, CVE-2010-4529, CVE-2010-4565, CVE-2010-4649, CVE-2010-4656, CVE-2010-4668, CVE-2011-0521
MD5 | b4ea75a40c4f93350168f65673ea1ffb
Apache CouchDB Cross Site Scripting
Posted Jan 31, 2011
Authored by Jan Lehnardt | Site couchdb.apache.org

Apache CouchDB versions 0.8.0 through 1.0.1 suffer from a cross site scripting vulnerability.

tags | advisory, xss
advisories | CVE-2010-3854
MD5 | d0d3d927bcc86a3954a1f823c24627bf
Secunia Security Advisory 43046
Posted Jan 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Russ McRee has discovered some vulnerabilities in web@all, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct cross-site scripting attacks.

tags | advisory, web, vulnerability, xss, sql injection
MD5 | cf02888d104a6e82ddca54f475341d7b
Secunia Security Advisory 43101
Posted Jan 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Exim, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
MD5 | 618310e061ef2da58f70f7cb7f8b78ce
Secunia Security Advisory 43147
Posted Jan 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for perl-CGI-Simple. This fixes two vulnerabilities, which can be exploited by malicious people to conduct HTTP response splitting attacks in an application using the library.

tags | advisory, web, cgi, perl, vulnerability
systems | linux, fedora
MD5 | d54b7c2a43eced81603c507584be373b
Secunia Security Advisory 43138
Posted Jan 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for freetype. This fixes some vulnerabilities, which can be exploited to cause a DoS (Denial of Service) or potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, debian
MD5 | 234fa1a47ed2b68bcfd0442f7c6ca6d9
Secunia Security Advisory 43112
Posted Jan 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for pcscd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | linux, debian
MD5 | 6e571ba357b5d810912d7b0339317fe0
Secunia Security Advisory 43128
Posted Jan 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for exim4. This fixes a weakness, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, debian
MD5 | dffef89629549e080e343b82abf584d0
Secunia Security Advisory 43148
Posted Jan 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in IBM DB2, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
MD5 | c8f6545e06c274d6ee742fefa3ff5127
Secunia Security Advisory 43108
Posted Jan 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Virtuosa, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | dc5df0ea524604f9f973e91e73238887
Novell ZENworks Handheld Management ZfHIPCND.exe Buffer Overflow
Posted Jan 29, 2011
Authored by TELUS Security Labs | Site telussecuritylabs.com

A buffer overflow vulnerability exists in Novell ZENworks Handheld Management that could be exploited by remote unauthenticated attackers to execute arbitrary code with SYSTEM privileges on a vulnerable server. Novell ZENworks Handheld Management version 7.0 is affected.

tags | advisory, remote, overflow, arbitrary
MD5 | c283a48c010636cadcf747202eee2bd9
Symantec Alert Management System HNDLRSVC Arbitrary Command Execution
Posted Jan 29, 2011
Authored by TELUS Security Labs | Site telussecuritylabs.com

An arbitrary program execution vulnerability exists in Symantec Alert Management System (AMS) service shipped with multiple Symantec products. The vulnerability could be exploited by remote unauthenticated attackers to execute arbitrary code with SYSTEM privileges.

tags | advisory, remote, arbitrary
advisories | CVE-2010-0110
MD5 | 1c185951b14392584b9517f1cb3e2313
Secunia Security Advisory 43093
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
systems | windows
MD5 | ff97e75a6bf11099853eeced5238cc87
Secunia Security Advisory 43098
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | f5bf3f1dd373bc7545498c448c205099
Secunia Security Advisory 43113
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in EMC NetWorker, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 5866660250fa8296d5d461ef13ad26e5
Secunia Security Advisory 43059
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM DB2, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | e852e67695fc21c267a45eb9d20f3988
Secunia Security Advisory 43030
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged some vulnerabilities with unknown impact in IBM Tivoli Common Reporting.

tags | advisory, vulnerability
MD5 | e77c2e757a1e93cae06f97a6dc5d4e25
Secunia Security Advisory 43090
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Puppet, which can be exploited by malicious users to disclose potentially sensitive information and manipulate certain data.

tags | advisory
MD5 | 56742a26d809c4e96acc7566e5e6d0a8
Secunia Security Advisory 43083
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for hplip. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, debian
MD5 | 371cfbba6e44fafd061aa84adec181e8
Secunia Security Advisory 43109
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for chm2pdf. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges or to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, fedora
MD5 | da415053dff6017cba4b2cc3e2398947
Secunia Security Advisory 43097
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Weborf, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service
MD5 | 2e029c2a2373e194b38c0af8430988f3
Secunia Security Advisory 43100
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for pango and evolution28-pango. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service
systems | linux, redhat
MD5 | 21256b37d8720be492db9de0b1cede00
Secunia Security Advisory 42999
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for openoffice.org. This fixes a security issue and some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a user's system.

tags | advisory, local, vulnerability
systems | linux, redhat
MD5 | ea84041f7624fb7d079c830c006ab41b
Symantec Antivirus Intel Alert Handler Service Denial of Service
Posted Jan 28, 2011
Authored by TELUS Security Labs | Site telussecuritylabs.com

A denial of service vulnerability exists in Symantec Antivirus Intel Alert Handler service. Remote unauthenticated attackers can exploit this vulnerability by sending a malicious packet to the target service.

tags | advisory, remote, denial of service
advisories | CVE-2010-0111
MD5 | b7e18c91cdf6c80dae80828461228016
Page 1 of 20
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close