what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 188 RSS Feed

Files

Ubuntu Security Notice USN-1834-1
Posted May 24, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1834-1 - A buffer overflow vulnerability was discovered in the Broadcom tg3 ethernet driver for the Linux kernel. A local user could exploit this flaw to cause a denial of service (crash the system) or potentially escalate privileges on the system. A flaw was discovered in the Linux kernel's ftrace subsystem interface. A local user could exploit this flaw to cause a denial of service (system crash). Various other issues were also addressed.

tags | advisory, denial of service, overflow, kernel, local
systems | linux, ubuntu
advisories | CVE-2013-1929, CVE-2013-3301, CVE-2013-1929, CVE-2013-3301
SHA-256 | 8e41d633140011cdf2b30daf96cf03e74a1fa2e124d4f2cea965b7093ae21e71
Ubuntu Security Notice USN-1833-1
Posted May 24, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1833-1 - Andy Lutomirski discover an error in the Linux kernel's credential handling on unix sockets. A local user could exploit this flaw to gain administrative privileges. A buffer overflow vulnerability was discovered in the Broadcom tg3 ethernet driver for the Linux kernel. A local user could exploit this flaw to cause a denial of service (crash the system) or potentially escalate privileges on the system. Various other issues were also addressed.

tags | advisory, denial of service, overflow, kernel, local
systems | linux, unix, ubuntu
advisories | CVE-2013-1979, CVE-2013-1929, CVE-2013-3301, CVE-2013-1929, CVE-2013-1979, CVE-2013-3301
SHA-256 | 4d5293bf941b5722cc6d5edd9647abe268ec879cb11d85d2e92c470be2f80158
Show In Browser 0.0.3 Ruby Gem File Injection
Posted May 24, 2013
Authored by Larry W. Cashdollar | Site rubygems.org

Show In Browser 0.0.3 is a Ruby Gem that suffers from a file injection vulnerability, allowing arbitrary text to be opened in a browser.

tags | advisory, arbitrary, ruby
SHA-256 | d8ef5225f129ed45cb3685bdff5c084d39d71818984f62b5fb94e0176be4b90f
Apple Security Advisory 2013-05-22-1
Posted May 23, 2013
Authored by Apple | Site apple.com

Apple Security Advisory 2013-05-22-1 - QuickTime 7.7.4 is now available and addresses multiple issues including buffer overflows and arbitrary code execution vulnerabilities.

tags | advisory, overflow, arbitrary, vulnerability, code execution
systems | apple
advisories | CVE-2013-0986, CVE-2013-0987, CVE-2013-0988, CVE-2013-0989, CVE-2013-1015, CVE-2013-1016, CVE-2013-1017, CVE-2013-1018, CVE-2013-1019, CVE-2013-1020, CVE-2013-1021, CVE-2013-1022
SHA-256 | 86bbe08e4962075f0ac3583cedede6a84c05e0fd1931a516233e0cc9267e7b8c
IBM WebSphere DataPower 3.8.2 / 4.0.x / 5.0 Cross Site Scripting
Posted May 23, 2013
Authored by A. Falkenberg | Site sec-consult.com

IBM WebSphere DataPower Integration Appliance XI50 versions 3.8.2, 4.0, 4.0.1, 4.0.2, 5.0.0 suffer from a cross site scripting vulnerability.

tags | advisory, xss
advisories | CVE-2013-0499
SHA-256 | 270c7bd1e92e6d4356421e934c684be0a8b6decbbecbca3eb5ac34d6614075eb
Debian Security Advisory 2677-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2677-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1987
SHA-256 | 3e4e60f82f5c54ccc3974aebea45459d716192d6537ea2eed11c8571e1a33e41
Red Hat Security Advisory 2013-0849-01
Posted May 23, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0849-01 - Red Hat provides a Red Hat Enterprise Linux 6.4 KVM Guest Image for cloud instances. This image is provided as a minimally configured system image which is available for use as-is or for configuration and customization as required by end users. The Red Hat Enterprise Linux 6.4 KVM Guest Image for cloud instances had an empty root password by default. To address this, Red Hat has created an updated image that locks the root password by default. This updated image is now available on RHN. To correct existing Red Hat Enterprise Linux 6.4 KVM Guest Images, any images or systems built using this Red Hat Enterprise Linux 6.4 KVM Guest Image, or any currently running Red Hat Enterprise Linux instances instantiated from this image, users can lock the root password by issuing, as root, the command:

tags | advisory, root
systems | linux, redhat
advisories | CVE-2013-2069
SHA-256 | ed81676847ea07381394f4b095304e4b8701c53c9df8ba9180e3231725962273
Debian Security Advisory 2692-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2692-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-2001
SHA-256 | 526f15356521032803f94e40efdea3b2461981087fa14e87a10f626602a29d80
Debian Security Advisory 2691-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2691-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1985
SHA-256 | 2c5cad57c6bb9cde6c9f8fc2a3819f22c331ef8388c7641ef69aa5a7c92a1c3d
Debian Security Advisory 2690-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2690-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1991, CVE-2013-2000
SHA-256 | c047858dde6acb83b7d74912771272a3d3a29c8897e3605b0c566d5e573641fb
Debian Security Advisory 2673-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2673-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1992
SHA-256 | d3cf30dc091a2c682af08c1d7d689fa49e5cb88b760b654d7c92d96297dab9b7
Debian Security Advisory 2674-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2674-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1989, CVE-2013-2066
SHA-256 | 8afc4286d2bbe5ea5912d78b68cf404d320aa23d4a3f0c060cd79a79b2759037
Debian Security Advisory 2675-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2675-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1990, CVE-2013-1999
SHA-256 | b8ac1fc21efed3d049577f301a8b248402ecfd6a8f0b5ec564169a0c53d6b5f0
Debian Security Advisory 2676-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2676-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1983
SHA-256 | 21600a8fff01cf4794c8df916e26d9cb6720c4580b26409c850fcd015eb0067d
Debian Security Advisory 2689-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2689-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-2063
SHA-256 | 5cc52699b441bc1fde71e455aa292c458d738dc72983d9f99b443c8d35a2626b
Debian Security Advisory 2688-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2688-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1988
SHA-256 | f0f238273af66cc3adfe3cf4c1d1f708cbf8597f7e07dd972df9e40ede5f30bd
Debian Security Advisory 2687-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2687-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1996
SHA-256 | 868a4ce0c0e8d42507868963a9b2862ee64cf34c927c53bb4150f72f1dfd173a
Debian Security Advisory 2686-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2686-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-2064
SHA-256 | 0d8970061669321737667fe62dd9f6a041bb951b9c6d14c70999c68bbd574bee
Debian Security Advisory 2685-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2685-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-2062
SHA-256 | 01ad1f85ac6a0247839237052f398416bafa9611850bdd4def488fa7b5cadffa
Debian Security Advisory 2684-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2684-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1986
SHA-256 | b76fd94fe0c9ef57d4632b1650b0b35f3451fbb1053a74ec242b0d816e58e939
Debian Security Advisory 2683-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2683-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1984, CVE-2013-1995, CVE-2013-1998
SHA-256 | a5914817d55af5bf1a0d2bf0c45ddc3086895b9b384a641d0c52134a0b60c8d5
Debian Security Advisory 2682-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
SHA-256 | 96d283f8f40acf4da7b73b48e8c1023cbc9edb3e82a68669c43b68bc9fb705b9
Debian Security Advisory 2681-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2681-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-2003
SHA-256 | d42547a5d3b60bb7ed89f36193f6d7679130e77dbc9c52bd2dc4f45136dd326a
Debian Security Advisory 2680-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
advisories | CVE-2013-2002, CVE-2013-2005
SHA-256 | 34a20cd92d2e61a5bdbf55c9c9f8fd426cfeb97d4fe419b8efd37ad50cea7a4d
Debian Security Advisory 2679-1
Posted May 23, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2679-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2013-1994
SHA-256 | b8f2eef330925d42b333e25e059c8502f48b03bc2786b5fd113eff186fbc70f0
Page 3 of 8
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close