accept no compromises
Showing 1 - 25 of 660 RSS Feed

Files

Debian Security Advisory 2227-1
Posted Apr 30, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2227-1 - Several vulnerabilities have been found in the Iceape internet suite, an unbranded version of Seamonkey.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2011-0065, CVE-2011-0066, CVE-2011-0067, CVE-2011-0069, CVE-2011-0070, CVE-2011-0071, CVE-2011-0072, CVE-2011-0073, CVE-2011-0074, CVE-2011-0075, CVE-2011-0077, CVE-2011-0078, CVE-2011-0080, CVE-2011-0081
MD5 | d04e72b084f80f9bc68780f6f8a867b8
Mandriva Linux Security Advisory 2011-079
Posted Apr 30, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-079 - Chris Evans of the Chrome Security Team reported that the XSLT generate-id() function returned a string that revealed a specific valid address of an object on the memory heap. It is possible that in some cases this address would be valuable information that could be used by an attacker while exploiting a different memory corruption but, in order to make an exploit more reliable or work around mitigation features in the browser or operating system. Various other issues were also addressed.

tags | advisory, protocol
systems | linux, windows, mandriva
advisories | CVE-2011-1202, CVE-2011-0071, CVE-2011-0076, CVE-2011-0067, CVE-2011-0065, CVE-2011-0066, CVE-2011-0073, CVE-2011-0081, CVE-2011-0069, CVE-2011-0070, CVE-2011-0080, CVE-2011-0074, CVE-2011-0075, CVE-2011-0077, CVE-2011-0078, CVE-2011-0072
MD5 | f064f3484c3c7ec337377972e1d0496b
Ubuntu Security Notice USN-1121-1
Posted Apr 30, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1121-1 - Boris Zbarsky, Gary Kwong, Jesse Ruderman, Michael Wu, and Ted Mielczarek discovered multiple memory vulnerabilities. An attacker could exploit these to possibly run arbitrary code as the user running Firefox. It was discovered that there was a vulnerability in the memory handling of certain types of content. An attacker could exploit this to possibly run arbitrary code as the user running Firefox. It was discovered that Firefox incorrectly handled certain JavaScript requests. An attacker could exploit this to possibly run arbitrary code as the user running Firefox. Ian Beer discovered a vulnerability in the memory handling of a certain types of documents. An attacker could exploit this to possibly run arbitrary code as the user running Firefox. Chris Evans discovered a vulnerability in Firefox's XSLT generate-id() function. An attacker could possibly use this vulnerability to make other attacks more reliable.

tags | advisory, arbitrary, javascript, vulnerability
systems | linux, ubuntu
advisories | CVE-2011-0079, CVE-2011-0081, CVE-2011-0069, CVE-2011-0070, CVE-2011-1202
MD5 | 803133b4970afe64e5480dff85cefc23
Ubuntu Security Notice USN-1123-1
Posted Apr 30, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1123-1 - A large number of security issues were discovered in the Gecko rendering engine. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.

tags | advisory, remote, web, denial of service, arbitrary, code execution, xss
systems | linux, ubuntu
advisories | CVE-2010-3776, CVE-2010-3778, CVE-2011-0053, CVE-2011-0062, CVE-2011-0051, CVE-2011-0055, CVE-2011-0054, CVE-2011-0056, CVE-2011-0057, CVE-2011-0058, CVE-2010-1585, CVE-2011-0059, CVE-2011-0069, CVE-2011-0070, CVE-2011-0080, CVE-2011-0074, CVE-2011-0075, CVE-2011-0077, CVE-2011-0078, CVE-2011-0072, CVE-2011-0065, CVE-2011-0066, CVE-2011-0073, CVE-2011-0067, CVE-2011-0071, CVE-2011-1202
MD5 | 19bf2b5b7f2b9cc69998f3c55978d406
Ubuntu Security Notice USN-1112-1
Posted Apr 30, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1112-1 - Multiple vulnerabilities have been identified and fixed in Firefox. It was discovered that there was a vulnerability in the memory handling of certain types of content. It was discovered that Firefox incorrectly handled certain JavaScript requests. Ian Beer discovered a vulnerability in the memory handling of a certain types of documents. Various other issues were also addressed.

tags | advisory, javascript, vulnerability
systems | linux, ubuntu
advisories | CVE-2011-0081, CVE-2011-0069, CVE-2011-0070, CVE-2011-0080, CVE-2011-0074, CVE-2011-0075, CVE-2011-0077, CVE-2011-0078, CVE-2011-0072, CVE-2011-0065, CVE-2011-0066, CVE-2011-0073, CVE-2011-0067, CVE-2011-0071, CVE-2011-1202
MD5 | 7ac1674d1fedf1492981b5b85921b68c
Secunia Security Advisory 44406
Posted Apr 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 13af25de1431e698c982aba8c5ee42e9
Secunia Security Advisory 44346
Posted Apr 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - James Burton has discovered a vulnerability in Up.Time Monitoring Station, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | b08da72f17000fd48153ba5bb0d95bcc
Secunia Security Advisory 44403
Posted Apr 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges and by malicious users to cause a DoS and potentially compromise a vulnerable system.

tags | advisory, denial of service, local
systems | linux, suse
MD5 | aa336a198bed55d124fcc57b33b57126
Secunia Security Advisory 44357
Posted Apr 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Mozilla Firefox and Mozilla SeaMonkey, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to disclose sensitive information and compromise a user's system.

tags | advisory, local, vulnerability
MD5 | f40b714fd8b48a3ee16cb41998b7e442
Secunia Security Advisory 44407
Posted Apr 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Mozilla Thunderbird, which can be exploited by malicious people to disclose sensitive information and compromise a user's system.

tags | advisory, vulnerability
MD5 | 0b2c445ab4e2022eea2a7aef277482b6
Secunia Security Advisory 44368
Posted Apr 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for firefox. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose sensitive information and compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
MD5 | 05a68ab2de88f700357b9466c248f34b
Secunia Security Advisory 44345
Posted Apr 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Insomnia Security has reported a vulnerability in 7-Technologies Interactive Graphical SCADA System, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | d4ed298b8ff6683115f7f3af92d820aa
Secunia Security Advisory 44381
Posted Apr 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for polkit. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, suse
MD5 | 9e2914619cbab2fb25ae56855968bb63
Secunia Security Advisory 44377
Posted Apr 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for libtiff. This fixes two vulnerabilities, which can be exploited by malicious people to potentially compromise an application using the library.

tags | advisory, vulnerability
systems | linux, suse
MD5 | 150262dc0dc967852c9161fef23c4184
Secunia Security Advisory 44394
Posted Apr 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for libtiff. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise an application using the library.

tags | advisory, vulnerability
systems | linux, suse
MD5 | 81f1d656b372b71d948074938ee94e6d
Secunia Security Advisory 44391
Posted Apr 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - VMware has acknowledged multiple vulnerabilities in VMware ESX Server and ESXi, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges, malicious users and malicious people to conduct spoofing attacks and bypass certain security restrictions, and by malicious people to cause a DoS.

tags | advisory, denial of service, local, spoof, vulnerability
MD5 | fbf9943d28de306f11da20525c91d3cf
Secunia Security Advisory 44362
Posted Apr 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for udisks. This fixes a weakness, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
systems | linux, suse
MD5 | 8143b729accec9910c4a5435c42d4a1c
Secunia Security Advisory 43399
Posted Apr 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in IBM Rational System Architect, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 36d844c1af6904d57078670bc4db703c
Secunia Security Advisory 44349
Posted Apr 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Likewise Open and Likewise Enterprise, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 71726fb71fbff1cb421cb44f1837bc4d
Secunia Security Advisory 44402
Posted Apr 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | 0d9ecabef60e87e5bf42201d7c82c572
Secunia Security Advisory 44390
Posted Apr 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for thunderbird. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
MD5 | cbd8afdb9d7ffa4e58bd7f17a349284c
Ubuntu Security Notice USN-1126-1
Posted Apr 29, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1126-1 - Stephane Chazelas discovered that the /etc/cron.d/php5 cron job for PHP 5.3.5 allows local users to delete arbitrary files via a symlink attack on a directory under /var/lib/php5/. Raphael Geisert and Dan Rosenberg discovered that the PEAR installer allows local users to overwrite arbitrary files via a symlink attack on the package.xml file. Martin Barbella discovered a buffer overflow in the PHP GD extension that allows an attacker to cause a denial of service (application crash) via a large number of anti-aliasing steps in an argument to the imagepstext function. It was discovered that PHP accepts the \0 character in a pathname, which might allow an attacker to bypass intended access restrictions by placing a safe file extension after this character. Various other issues with PHP 5 were also identified and resolved.

tags | advisory, denial of service, overflow, arbitrary, local, php
systems | linux, ubuntu
advisories | CVE-2011-1144, CVE-2006-7243, CVE-2010-4697, CVE-2010-4698, CVE-2011-0420, CVE-2011-0421, CVE-2011-0441, CVE-2011-0708, CVE-2011-1072, CVE-2011-1092, CVE-2011-1144, CVE-2011-1148, CVE-2011-1153, CVE-2011-1464, CVE-2011-1466, CVE-2011-1467, CVE-2011-1468, CVE-2011-1469, CVE-2011-1470, CVE-2011-1471
MD5 | 2c7a97fe636fd30935212ae6c190fea6
Zero Day Initiative Advisory 11-153
Posted Apr 29, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-153 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Borland Interbase. Authentication is not required to exploit these vulnerabilities. The specific flaws exists within the database service, ibserver.exe, which binds to TCP port 3050. When a specially crafted "connect" (opcode 0x01) message is sent a stack-based buffer overflow can occur. If properly exploited this can lead to remote compromise of the system with SYSTEM credentials.

tags | advisory, remote, overflow, arbitrary, tcp, vulnerability
MD5 | 1f46e22d147fff89eec1b34de93c13cc
Zero Day Initiative Advisory 11-152
Posted Apr 29, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-152 - This vulnerability allows remote attackers directory traversal on vulnerable installations of HP OpenView Data Protector. Authentication is not required to exploit this vulnerability. This specific flaw exists in the Backup Client Service (OmniInet.exe). The Backup Client Service listens on TCP port 5555 for communications between systems in the cell. The process has insufficient sanitization on user-supplied data when handling certain messages. Remote, unauthenticated attackers can exploit this vulnerability by sending crafted filename strings to the target, which would allow attackers to view or download arbitrary files on the target system.

tags | advisory, remote, arbitrary, tcp
advisories | CVE-2011-1736
MD5 | 6ceb32c63571b4806fec8bfa1ca94d17
Zero Day Initiative Advisory 11-151
Posted Apr 29, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-151 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP OpenView Data Protector. Authentication is not required to exploit this vulnerability. This specific flaw exists in the Backup Client Service (OmniInet.exe). The Backup Client Service listens on TCP port 5555 for communications between systems in the cell. The process has insufficient bounds checking on user-supplied data in a fixed-length buffer on the stack. Remote, unauthenticated attackers can exploit this vulnerability by sending malformed bm message packets to the target, which could ultimately lead to arbitrary code execution under the context of the SYSTEM user.

tags | advisory, remote, arbitrary, tcp, code execution
advisories | CVE-2011-1735
MD5 | 054aaeaf23a49aa8a902cb7926cc4c40
Page 1 of 27
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
macOS Fruitfly Backdoor Analysis And Spying Capabilities
Posted Jul 25, 2017

tags | headline, malware, spyware, apple, backdoor
How Coders Hacked Back To Rescue $208 Million In Ethereum
Posted Jul 25, 2017

tags | headline, hacker, bank, fraud
Pathetic Patching Leaves Over 70,000 Memcached Servers Still Up For Grabs
Posted Jul 25, 2017

tags | headline, hacker, data loss, flaw
Video: Cash Machine Hacked In 5 Minutes
Posted Jul 25, 2017

tags | headline, bank, cybercrime, fraud, flaw
Companies Are Still Dealing With The Aftermath Of Petya
Posted Jul 24, 2017

tags | headline, malware, cybercrime, fraud, cryptography
Sweden Leaked Every Car Owners' Details Last Year
Posted Jul 24, 2017

tags | headline, government, privacy, data loss, sweden
Someone Tried To Off John McAfee?
Posted Jul 24, 2017

tags | headline, mcafee
China Wants To Build A $150 Billion AI Industry
Posted Jul 24, 2017

tags | headline, china, botnet, cyberwar, science
The Purpose Of Ransomware
Posted Jul 21, 2017

tags | headline, malware, cybercrime, fraud
Symantec Tricked Into Removing Legit Certificates By Security Researcher
Posted Jul 21, 2017

tags | headline, hacker, symantec, cryptography
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close