what you don't know can hurt you
Showing 1 - 25 of 39 RSS Feed

Files Date: 2007-11-01

Gentoo Linux Security Advisory 200711-3
Posted Nov 1, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200711-03 - Merrick Manalastas and Nicklous Roberts have discovered multiple vulnerabilities in the WebDAV and Reupload modules. Versions less than 2.2.3 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
advisories | CVE-2007-4650
MD5 | fca538bf60e1b808729a818070d619a2
Gentoo Linux Security Advisory 200711-2
Posted Nov 1, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200711-02 - Jan Pechanec discovered that OpenSSH uses a trusted X11 cookie when it cannot create an untrusted one. Versions less than 4.7 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2007-4752
MD5 | 923a61c425ebd36a8682043f00698487
Gentoo Linux Security Advisory 200711-1
Posted Nov 1, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200711-01 - Kalle Olavi Niemitalo discovered two boundary errors in fsplib code included in gFTP when processing overly long directory or file names. Versions less than 2.0.18-r6 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2007-3961, CVE-2007-3962
MD5 | d1a24e7c8aaf28b4a5e6ef96ba68dbde
Mandriva Linux Security Advisory 2007.204
Posted Nov 1, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Alin Rad Pop of Secunia Research discovered a vulnerability in CUPS that can be exploited by malicious individuals to execute arbitrary code. This flaw is due to a boundary error when processing IPP (Internet Printing Protocol) tags.

tags | advisory, arbitrary, protocol
systems | linux, mandriva
advisories | CVE-2007-4351
MD5 | 44babeda85cd8ca51254fec4e4811a3f
ProCheckUp Security Advisory 2007.29
Posted Nov 1, 2007
Authored by Adrian Pastor, ProCheckUp | Site procheckup.com

Two cross site scripting vulnerabilities have been discovered in the Blue coat ProxySG Management Console. Versions below 4.2.6.1 and 5.2.2.5 are susceptible.

tags | exploit, vulnerability, xss
MD5 | 4300508a909c96cafc2e2f84ee679c17
Mandriva Linux Security Advisory 2007.203
Posted Nov 1, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Tavis Ormandy discovered a heap overflow flaw during video-to-video copy operations in the Cirrus VGA extension code that is used in Xen. A malicious local administrator of a guest domain could potentially trigger this flaw and execute arbitrary code outside of the domain. Tavis Ormandy also discovered insufficient input validation leading to a heap overflow in the NE2000 network driver in Xen. If the driver is in use, a malicious local administrator of a guest domain could potentially trigger this flaw and execute arbitrary code outside of the domain. Steve Kemp found that xen-utils used insecure temporary files within the xenmon tool that could allow local users to truncate arbitrary files. Joris van Rantwijk discovered a flaw in Pygrub, which is used as a boot loader for guest domains. A malicious local administrator of a guest domain could create a carefully-crafted grub.conf file which could trigger the execution of arbitrary code outside of that domain.

tags | advisory, overflow, arbitrary, local
systems | linux, mandriva
advisories | CVE-2007-4993, CVE-2007-3919, CVE-2007-1321, CVE-2007-5729, CVE-2007-5730, CVE-2007-1320
MD5 | ff8364f820413cda18b424722daf1611
Secunia Security Advisory 27426
Posted Nov 1, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities with unknown impact have been reported in WORK system e-commerce.

tags | advisory, vulnerability
MD5 | 97e3a511f8728fb751d45fb77a9af9b4
Secunia Security Advisory 27439
Posted Nov 1, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued updates for multiple packages. These fix some vulnerabilities, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, suse
MD5 | cdf743caf7426dbf893019dd575efaf5
Secunia Security Advisory 27440
Posted Nov 1, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - d3hydr8 has reported a vulnerability in CONTENTCustomizer, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | 2041d66774e4647a23cfb58bfe2b31a9
Secunia Security Advisory 27468
Posted Nov 1, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Novell BorderManager, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | cd4337af318941751d8b50ed3a8b8f19
Secunia Security Advisory 27470
Posted Nov 1, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - GoLd_M has discovered two vulnerabilities in ISPworker, which can be exploited by malicious people to disclose sensitive information.

tags | advisory, vulnerability
MD5 | 03ed2cc992074e5ad6772ce43d8b2904
Secunia Security Advisory 27473
Posted Nov 1, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in IBM Tivoli Continuous Data Protection for Files, which can be exploited by malicious, local users to compromise other systems.

tags | advisory, local
MD5 | eaa172b30a4f0f934c353b6bdfa17f5b
Secunia Security Advisory 27478
Posted Nov 1, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged a security issue in WebSphere Application Server Community Edition, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | f10301eb569e04cb0760899372796fcc
Secunia Security Advisory 27481
Posted Nov 1, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been acknowledged in Apache Geronimo, which can be exploited by malicious users to disclose potentially sensitive information.

tags | advisory
MD5 | 65534a6820e583e04cd0c4d7526f1428
Secunia Security Advisory 27482
Posted Nov 1, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Apache Geronimo, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 9282534a545e096966fc2a78a0f9a029
0710-exploits.tgz
Posted Nov 1, 2007
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for October, 2007.

tags | exploit
MD5 | b8850194b0738c65eb4e403ac8879cf1
Secunia Security Advisory 27436
Posted Nov 1, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes a weakness, some security issues and vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and malicious users and malicious people to bypass certain security restrictions.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, redhat
MD5 | cce9369675f131351f6afbad4f68c626
cfp-sse2008.txt
Posted Nov 1, 2007
Site sintef.no

Call for papers: Second International Workshop on Secure Software Engineering in conjunction with ARES 2008.

tags | paper, conference
MD5 | a9a15785a758331ff70152047bde32af
SA-20071101-0.txt
Posted Nov 1, 2007
Authored by Bernhard Mueller | Site sec-consult.com

SEC Consult Security Advisory 20071101-0 - The SonicWALL SSL-VPN solution comes with various ActiveX Controls which allows users to access the VPN with Internet Explorer. These controls contain various vulnerabilities. Some details provided. Vulnerable versions include SonicWALL SSL-VPN 1.3.0.3, WebCacheCleaner ActiveX Control 1.3.0.3, and NeLaunchCtrl ActiveX Control 2.1.0.49.

tags | exploit, vulnerability, activex
MD5 | 4d8c8385c3e51e858ef006e53fd8e09c
syner-lfi.txt
Posted Nov 1, 2007
Authored by KiNgOfThEwOrLd | Site inj3ct-it.org

Synergiser versions 1.2 RC1 and below suffer from local file inclusion and full path disclosure vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
MD5 | 5de83e685a1ff681bc49a850ddee626d
Secunia Security Advisory 27431
Posted Nov 1, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for opera. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and to compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, gentoo
MD5 | 65c2d22bff07dd9839cdb8d76e5d26a1
Secunia Security Advisory 26372
Posted Nov 1, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in McAfee E-Business Server, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 6e01bcd28ab562dae28d61d2aadc134d
Secunia Security Advisory 27421
Posted Nov 1, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in the Hitachi Web Server, which can be exploited by malicious people to bypass certain security restrictions or conduct cross-site scripting attacks.

tags | advisory, web, vulnerability, xss
MD5 | 3779c93b89c1caaaa8e4d1cd47a63ddc
Secunia Security Advisory 27423
Posted Nov 1, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged some vulnerabilities in Mozilla 1.7 for Sun Solaris, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | solaris
MD5 | 95cac8e0eaf2aeb67674e0ff6e3d9251
Secunia Security Advisory 27434
Posted Nov 1, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | linux, gentoo
MD5 | abd3974ca207fecc715dac3d1c9f4410
Page 1 of 2
Back12Next

File Archive:

June 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    10 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close