what you don't know can hurt you
Showing 1 - 25 of 31 RSS Feed

Files from Pardus Linux

Email addresssecurity at pardus.org.tr
First Active2008-08-13
Last Active2008-12-02
Pardus Linux Security Advisory 2008.77
Posted Dec 2, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-77 - Two vulnerabilities have been fixed in ffmpeg which can cause to a DoS (Denial of Service).Versions below 0.4.9_20080909-48-16 are affected.

tags | advisory, denial of service, vulnerability
systems | linux
MD5 | d508983edcad9ea6b153a3aa8b1a2d83
Pardus Linux Security Advisory 2008.71
Posted Nov 14, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-71 -ClamAV contains an off-by-one heap overflow vulnerability in the code responsible for parsing VBA project files. Successful exploitation could allow an attacker to execute arbitrary code with the privileges of the 'clamd' process by sending an email with a prepared attachment.

tags | advisory, overflow, arbitrary
systems | linux
MD5 | 27aaa45d926a27a8397aab617e52a3fe
Pardus Linux Security Advisory 2008.70
Posted Nov 14, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-70 -A vulnerability has been reported in GnuTLS, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to an error when validating the X.509 certificate chain and can be exploited to spoof arbitrary names e.g. during a Man-in-the-Middle (MitM) attack.

tags | advisory, arbitrary, spoof
systems | linux
advisories | CVE-2008-4989
MD5 | 8fb670a8ebee5e9608715fcd9804fba7
Pardus Linux Security Advisory 2008.69
Posted Nov 11, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-69 - A vulnerability has been reported in libpng, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to a memory leak error within the "png_handle_tEXt()" function in pngrutil.c. This can be exploited to potentially exhaust all available memory via a specially crafted PNG image. Versions below 1.2.33-16-6 are affected.

tags | advisory, denial of service, memory leak
systems | linux
MD5 | a1ca73fef916077319590a28f04a5282
Pardus Linux Security Advisory 2008.67
Posted Nov 8, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-67 - A remotely exploitable heap-based buffer overflow exists in libcaudio versions prior to 0.99.12-2-2.

tags | advisory, overflow
systems | linux
MD5 | f7fc3b93688550b2623694dbb2e42a56
Pardus Linux Security Advisory 2008.66
Posted Nov 8, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-66 - An untrusted search path vulnerability in BPY_interface in Blender 2.46 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to an erroneous setting of sys.path by the PySys_SetArgv function.Blender versions prior to 2.47-14-3 are affected.

tags | advisory, arbitrary, local, trojan, python
systems | linux
MD5 | cd581dc8862d658954b6cb46ade16189
Pardus Linux Security Advisory 2008.64
Posted Nov 8, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-64 - A denial of service condition from invalid message address parsing exists in Dovecot versions before 1.1.6-18-3.

tags | advisory, denial of service
systems | linux
MD5 | 9a67b83338f15cc43c0607a84d775f2b
Pardus Linux Security Advisory 2008.63
Posted Nov 8, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-63 - Some vulnerabilities with unknown impact have been reported in imlib2. Versions before 1.4.2-10-3 are affected.

tags | advisory, vulnerability
systems | linux
MD5 | 981d10f015201cac3c06fdd47c17a8f6
Pardus Linux Security Advisory 2008.65
Posted Nov 5, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-62 - The getbulk code in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via vectors related to the number of responses or repeats.

tags | advisory, remote, denial of service
systems | linux
MD5 | 4c4e68ceeac299938dccf71ad7279967
Pardus Linux Security Advisory 2008.62
Posted Nov 5, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-62 - A vulnerability has been reported in Smarty, which can be exploited by malicious people to bypass certain security restrictions. Versions below 2.6.20-6-3 are affected.

tags | advisory
systems | linux
MD5 | d41e6f946a975b412df3725b0cf77593
Pardus Linux Security Advisory 2008.61
Posted Nov 5, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-61 - Some vulnerabilities have been discovered in KTorrent, which can be exploited by malicious users to compromise a vulnerable system and malicious people to bypass certain security restrictions. Versions below 2.2.7-30-4 are affected.

tags | advisory, vulnerability
systems | linux
MD5 | 8ed47fdf9ee9d22b950ff2d8e7df3315
Pardus Linux Security Advisory 2008.41
Posted Sep 6, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - Romain Francoise has found a security risk in a feature of GNU Emacs related to how Emacs interacts with Python.

tags | advisory, python
systems | linux
MD5 | 88d2dd8bd65b48977075d03284318f12
Pardus Linux Security Advisory 2008.40
Posted Sep 6, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - A security issue has been reported in Postfix, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux
MD5 | 7ed5de1fd98781b82d94775fb4118b89
Pardus Linux Security Advisory 2008.39
Posted Sep 6, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - Multiple vulnerabilities have been discovered in Clamav including a DoS (Denial of Service) vulnerability and memory leaks.

tags | advisory, denial of service, vulnerability, memory leak
systems | linux
MD5 | 4e13e65bd4014b7e14ea05b22c2ceea0
Pardus Linux Security Advisory 2008.38
Posted Sep 6, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - Some vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux
MD5 | 91d0bc451ed2fe45a70026ad0ff30d2d
Pardus Linux Security Advisory 2008.37
Posted Sep 6, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - A vulnerability has been reported in Django, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
systems | linux
MD5 | af6c823bb3a63082e54a1fca9c70c8d6
Pardus Linux Security Advisory 2008.36
Posted Sep 5, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - Multiple memory leaks and buffer overflows have been addressed in ffmpeg. Affected packages are mplayer versions below 0.0_20080825-92-11 and ffmpeg versions below 0.4.9_20080825-46-14.

tags | advisory, overflow, memory leak
systems | linux
MD5 | 08e25547abae389d971a09a044cf735f
Pardus Linux Security Advisory 2008.35
Posted Sep 3, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - A vulnerability has been reported in Ruby, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, ruby
systems | linux
advisories | CVE-2008-3790
MD5 | 0902863b7526e4a102f014c2ddbe7d40
Pardus Linux Security Advisory 2008.34
Posted Sep 3, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - A vulnerability was reported in GNU ed. A remote user can cause arbitrary code to be executed on the target user's system.

tags | advisory, remote, arbitrary
systems | linux
MD5 | 0602223c451d1ee61a0423fc54bfde9d
Pardus Linux Security Advisory 2008.33
Posted Aug 31, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - A security issue has been reported in OpenSC, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux
advisories | CVE-2008-2235
MD5 | 09e3b8dc9ef4a0333180e6e1a02ce6ba
Pardus Linux Security Advisory 2008.32
Posted Aug 31, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - Juraj Skripsky has reported a vulnerability in Mono, which can be exploited by malicious people to conduct HTTP header injection attacks.

tags | advisory, web
systems | linux
MD5 | acca5f8f15ae95df11ff49d9288b0ebb
Pardus Linux Security Advisory 2008.31
Posted Aug 27, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - A vulnerability has been reported in LibTIFF, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a user's system.

tags | advisory, denial of service
systems | linux
advisories | CVE-2008-2327
MD5 | 89fde6963eee81805e587266f74bbffa
Pardus Linux Security Advisory 2008.30
Posted Aug 26, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - Insufficient sanitization can lead to Vim executing arbitrary commands when performing keyword or tag lookup.

tags | advisory, arbitrary
systems | linux
MD5 | bba89f851911b3ef0f74460ddb4d69a5
Pardus Linux Security Advisory 2008.29
Posted Aug 26, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - Multiple vulnerabilities have discovered by g_ which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux
advisories | CVE-2008-3732
MD5 | 353baefe1e7409fab29c0abd9c5f7291
Pardus Linux Security Advisory 2008.28
Posted Aug 26, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - A vulnerability has been reported in Libxml2, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux
advisories | CVE-2008-3281
MD5 | b5d695d395d852aa764c49dbd945acc7
Page 1 of 2
Back12Next

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    41 Files
  • 21
    Oct 21st
    18 Files
  • 22
    Oct 22nd
    16 Files
  • 23
    Oct 23rd
    2 Files
  • 24
    Oct 24th
    1 Files
  • 25
    Oct 25th
    1 Files
  • 26
    Oct 26th
    17 Files
  • 27
    Oct 27th
    19 Files
  • 28
    Oct 28th
    29 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close