seeing is believing
Showing 1 - 25 of 405 RSS Feed

Files

GnuPG 1.4.12 Database Corruption
Posted Dec 31, 2012
Authored by KB Sriram

GnuPG versions 1.4.12 and below are vulnerable to memory access violations and public keyring database corruption when importing public keys that have been manipulated.

tags | advisory
advisories | CVE-2012-6085
MD5 | 44c38dd98e95d8c5f60f04d75b485c60
Debian Security Advisory 2596-1
Posted Dec 31, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2596-1 - Thorsten Glaser discovered that the RSSReader extension for mediawiki, a website engine for collaborative work, does not properly escape tags in feeds. This could allow a malicious feed to inject JavaScript into the mediawiki pages.

tags | advisory, javascript
systems | linux, debian
MD5 | 6798068e5ba26764f19ed73b982a6979
Debian Security Advisory 2595-1
Posted Dec 31, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2595-1 - Marc Schoenefeld discovered that an integer overflow in the ICC parsing code of Ghostscript can lead to the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2012-4405
MD5 | d94e4da21b5b6d82be7d6ec9ff822d67
Debian Security Advisory 2594-1
Posted Dec 31, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2594-1 - halfdog discovered that incorrect interrupt handling in Virtualbox, a x86 virtualization solution, can lead to denial of service.

tags | advisory, denial of service, x86
systems | linux, debian
advisories | CVE-2012-3221
MD5 | daf6bd56caaa2d67179bb639d3d76549
Ubuntu Security Notice USN-1680-1
Posted Dec 31, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1680-1 - It was discovered that MoinMoin did not properly sanitize its input when processing AnyWikiDraw and TWikiDraw actions. A remote attacker with write access could exploit this to overwrite arbitrary files and execute arbitrary code with the privileges of the web server (user 'www-data'). It was discovered that MoinMoin also did not properly sanitize its input when processing the AttachFile action. A remote attacker could exploit this to overwrite files via directory traversal. Various other issues were also addressed.

tags | advisory, remote, web, arbitrary
systems | linux, ubuntu
MD5 | b17e480df84fb29f9c114da4de256394
Debian Security Advisory 2593-1
Posted Dec 31, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2593-1 - It was discovered that missing input validation in the twikidraw and anywikidraw actions can result in the execution of arbitrary code. This security issue in being actively exploited.

tags | advisory, arbitrary
systems | linux, debian
MD5 | 3f839f24cb2fa5d9cd660c9e0289ff38
Secunia Security Advisory 51695
Posted Dec 30, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Internet Explorer, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 2c263183452455637bc863b734b8d13e
Debian Security Advisory 2592-1
Posted Dec 29, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2592-1 - Marko Myllynen discovered that elinks, a powerful text-mode browser, incorrectly delegates user credentials during GSS-Negotiate.

tags | advisory
systems | linux, debian
advisories | CVE-2012-4545
MD5 | bb894ccf1f5a17221eed1c80e236b3db
Secunia Security Advisory 51693
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for tomcat. This fixes multiple weaknesses, one security issue and three vulnerabilities, which can be exploited by malicious users to manipulate certain data and by malicious people to bypass certain security restrictions, manipulate certain data, gain access to potentially sensitive information, and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, suse
MD5 | 4e29fb2a72e53df729c1bd1d8b20b859
Secunia Security Advisory 51673
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in i-GEN opLYNX, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | e17b6a4db2b9633d7141528f61ff8036
Secunia Security Advisory 51649
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for opera. This fixes a security issue and two vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious people to conduct spoofing attacks and potentially compromise a user's system.

tags | advisory, local, spoof, vulnerability
systems | linux, suse
MD5 | 09161f6554d354d53461c25dbc5dc02a
Secunia Security Advisory 51638
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for mahara. This fixes multiple vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct click-jacking, cross-site scripting and request forgery attacks, and disclose potentially sensitive information.

tags | advisory, vulnerability, xss
systems | linux, debian
MD5 | daa4c3ecefbd923462ea52d7d555d2e8
Secunia Security Advisory 51654
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - MustLive has discovered a weakness in MODx, which can be exploited by malicious people to determine valid usernames.

tags | advisory
MD5 | db6f870023be8df53bb7101177ae1812
Secunia Security Advisory 51692
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in VLC Media Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 209a33102dcdb61f770ecf54a4126538
Secunia Security Advisory 51678
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in IBM InfoSphere Guardium, where one has an unknown impact and the others can be exploited by malicious users to potentially compromise a vulnerable system and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 07c817134709dd269972b2a5242b2dc3
Secunia Security Advisory 51569
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for elinks. This fixes a weakness, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
systems | linux, debian
MD5 | c0913c7229f4aa2744ad3a20fdc25eed
Polycom HDX Video End Points Cross Site Scripting
Posted Dec 28, 2012
Authored by Fara Denise Rustein

The Polycom HDX Video End Points web management interface suffers from a cross site scripting vulnerability.

tags | advisory, web, xss
advisories | CVE-2012-4970
MD5 | df171b9517f59dd19d38db0494be6791
Debian Security Advisory 2591-1
Posted Dec 28, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2591-1 - Multiple security issues have been found in Mahara, an electronic portfolio, weblog, and resume builder, which can result in cross-site scripting, clickjacking or arbitrary file execution.

tags | advisory, arbitrary, xss
systems | linux, debian
advisories | CVE-2012-2239, CVE-2012-2243, CVE-2012-2244, CVE-2012-2246, CVE-2012-2247, CVE-2012-2253, CVE-2012-6037
MD5 | 22c790064639a4d679dd4d74c00f9333
Mandriva Linux Security Advisory 2012-184
Posted Dec 27, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-184 - A stack-based buffer overflow was found in the way libtiff handled DOTRANGE tags. An attacker could use this flaw to create a specially-crafted TIFF file that, when opened, would cause an application linked against libtiff to crash or, possibly, execute arbitrary code. The updated packages have been patched to correct this issue.

tags | advisory, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2012-5581
MD5 | ff69d9541734261be383ad63a1cb2046
Debian Security Advisory 2590-1
Posted Dec 27, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2590-1 - Bjorn Mork and Laurent Butti discovered crashes in the PPP and RTPS2 dissectors, which could potentially result in the execution of arbitrary code.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2012-4048, CVE-2012-4296
MD5 | 38e1328c7999cb63dd5e37489bad3eb9
Secunia Security Advisory 51688
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged multiple vulnerabilities in IBM Rational Functional Tester, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | 200142a0f71185b8845383059e1cf6bb
Secunia Security Advisory 51651
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in cPanel, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 79ffb8c2d9692167295853dcb13c42f2
Secunia Security Advisory 51672
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in EMC Data Protection Advisor, which can be exploited by malicious people to disclose certain sensitive information.

tags | advisory
MD5 | 088196a84a360da0662106b83344910e
Secunia Security Advisory 51519
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in FreeType, which can be exploited by malicious people to potentially compromise an application using the library.

tags | advisory
MD5 | 78c3cabe2ba0befeb973eea82528278f
Secunia Security Advisory 51664
Posted Dec 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hitachi has acknowledged a vulnerability in multiple products, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 0d2939bd16cc7455c3b3cf6d791d8638
Page 1 of 17
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Microsoft Mocks Google For Failed Security Fix Deployment Methodology
Posted Oct 19, 2017

tags | headline, microsoft, flaw, google, chrome
Malicious Mineraft Apps In Google Play Enslave Your Device To A Botnet
Posted Oct 19, 2017

tags | headline, malware, microsoft, phone, botnet, google
OAIC Received 114 Voluntary Data Breach Notifications In Two Years
Posted Oct 19, 2017

tags | headline, hacker, privacy, australia, data loss
US-CERT Predicts Machine Learning To Become Security Risk
Posted Oct 19, 2017

tags | headline, flaw
ATM Malware Available Online For Online $5,000
Posted Oct 18, 2017

tags | headline, malware, bank, cybercrime, fraud
Oracle Swats 252 Bugs In Patch Update
Posted Oct 18, 2017

tags | headline, flaw, patch, oracle
Child Safety Smartwatches Easy To Hack, Watchdog Says
Posted Oct 18, 2017

tags | headline, privacy, flaw
Domino's Pizza Delivers User Details To Spammers
Posted Oct 18, 2017

tags | headline, privacy, email, spam, fraud
Microsoft Never Disclosed 2013 Hack Of Secret Vulnerability Database
Posted Oct 18, 2017

tags | headline, hacker, microsoft, data loss, flaw
Adobe Patches Zero-Day Used To Plant Gov't Spying Software
Posted Oct 17, 2017

tags | headline, hacker, government, usa, flaw, cyberwar, adobe, zero day, nsa
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close