accept no compromises
Showing 1 - 25 of 781 RSS Feed

Files Date: 2007-11-01 to 2007-11-30

Secunia Security Advisory 27747
Posted Nov 29, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged some vulnerabilities, security issues, and a weakness in various Avaya products, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and disclose potentially sensitive information, and by malicious users and malicious people to bypass certain security restrictions.

tags | advisory, denial of service, local, vulnerability
MD5 | 73945ee3bd2b0f737cd374b1b5988dd8
Secunia Security Advisory 27804
Posted Nov 29, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for java-1.5.0-ibm. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, manipulate data, disclose sensitive/system information, or potentially compromise a vulnerable system.

tags | advisory, java, vulnerability
systems | linux, redhat
MD5 | 3ecdaf757fe4e0775a99080cc4a2a2f6
Secunia Security Advisory 27821
Posted Nov 29, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Joshua Morin has reported a vulnerability in Liferay Portal, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 99eaa3a1b34aed910c086d03f85218bd
Secunia Security Advisory 27828
Posted Nov 29, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in PHPDevShell, which can be exploited by malicious users to gain escalated privileges.

tags | advisory
MD5 | 0c32a4f2c9af64b74760cd42dc1ba6d7
Ubuntu Security Notice 548-1
Posted Nov 29, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 548-1 - It was discovered that Pidgin did not correctly handle certain logging events. A remote attacker could send specially crafted messages and cause the application to crash, leading to a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2007-4999
MD5 | 1213091793c5e019bc3dcdb9fc792219
Mandriva Linux Security Advisory 2007.233
Posted Nov 29, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Buffer overflow in the safer_name_suffix function in GNU cpio has unspecified attack vectors and impact, resulting in a crashing stack. This problem is originally found in tar, but affects cpio too, due to similar code fragments. Directory traversal vulnerability in cpio 2.6 and earlier allows remote attackers to write to arbitrary directories via a .. (dot dot) in a cpio file. This is an old issue, affecting only Mandriva Corporate Server 4 and Mandriva Linux 2007.

tags | advisory, remote, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2007-4476, CVE-2005-1229
MD5 | 2a70c32f8fe21ac3d4b0c4bb809adf50
Mandriva Linux Security Advisory 2007.232
Posted Nov 29, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel. The minix filesystem code allows local users to cause a denial of service (hang) via a malformed minix file stream. An integer underflow in the Linux kernel prior to 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set.

tags | advisory, remote, denial of service, kernel, local, vulnerability
systems | linux, minix, mandriva
advisories | CVE-2007-4997, CVE-2006-6058
MD5 | 766cc256ddbcf93d4722fa79a16929c1
bcoos-sqlxss.txt
Posted Nov 29, 2007
Authored by Lostmon | Site lostmon.blogspot.com

bcoos versions 1.0.10 and below suffer from cross site scripting and SQL injection vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
MD5 | 051227c1abe093f587291db4854390ec
SYM07-029.txt
Posted Nov 29, 2007
Site symantec.com

Symantec Backup Exec for Windows Servers (BEWS) may be susceptible to multiple denial of service attacks (DoS) if maliciously formatted packets are passed to the BEWS Job Engine. Versions affected are Symantec Backup Exec for Windows Servers 11d and 11.0.6325.

tags | advisory, denial of service
systems | windows
advisories | CVE-2007-4346, CVE-2007-4347
MD5 | 3d13b69bded52fd01eb59c73aae1c1b7
secunia-symantecbackup.txt
Posted Nov 29, 2007
Authored by JJ Reyes | Site secunia.com

Secunia Research has discovered some vulnerabilities in Symantec Backup Exec for Windows Servers, which can be exploited by malicious people to cause a DoS (Denial of Service). Affected software includes Symantec Backup Exec for Windows Servers version 11d (11.0 rev 7170).

tags | advisory, denial of service, vulnerability
systems | windows
advisories | CVE-2007-4346, CVE-2007-4347
MD5 | 70be5dcb65405683c82b0fdaf41ddbda
charrays-rfi.txt
Posted Nov 29, 2007
Authored by MhZ91 | Site inj3ct-it.org

Charrays CMS version 0.9.3 suffers from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
MD5 | 03378f132fba2d0c8642c5e906af52c1
ehcp-rfi.txt
Posted Nov 29, 2007
Authored by MhZ91 | Site inj3ct-it.org

EHCP versions 0.22.8 and below suffer from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
MD5 | 96d23787130e22bae7ab1aae6b53c59a
phpcon-rfi.txt
Posted Nov 29, 2007
Authored by GolD_M | Site tryag.cc

PHP-CON version 1.3 suffers from a remote file inclusion vulnerability in include.php.

tags | exploit, remote, php, code execution, file inclusion
MD5 | 1b2245850cdd8bc0ce2db14a132a198e
Secunia Security Advisory 27800
Posted Nov 29, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Netscape has acknowledged some vulnerabilities in Netscape Navigator, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks or potentially to compromise a user's system.

tags | advisory, vulnerability, xss, csrf
MD5 | 96120e6ad6d0119706ee2e126f77db96
Secunia Security Advisory 26975
Posted Nov 29, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered some vulnerabilities in Symantec Backup Exec for Windows Servers, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | windows
MD5 | de86c821d363c465edddac7a4478d8e9
Secunia Security Advisory 27742
Posted Nov 29, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, gentoo
MD5 | 8fa93700650158f0534ee8ff2625d56a
Secunia Security Advisory 27746
Posted Nov 29, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for libpng. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, slackware
MD5 | c4d35bbbe602ea51b88fa701c5484834
Secunia Security Advisory 27749
Posted Nov 29, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Feed2JS, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 5f19b4bd190297494708d860e367ab5d
Secunia Security Advisory 27750
Posted Nov 29, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in FileMaker Pro/Server, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 15fd9ff8fad14adf999ccfd4f7277591
Secunia Security Advisory 27752
Posted Nov 29, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM Director, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 0cbdda23c21e105fa9bad3b994089df2
Secunia Security Advisory 27786
Posted Nov 29, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Wesnoth, which can be exploited by malicious people to cause a DoS (Denial of Service), disclose potentially sensitive information, or potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | 75a68d700486770f6e6343be8d68afad
Secunia Security Advisory 27801
Posted Nov 29, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for tk8.4. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, debian
MD5 | 8e55db29765186da6d67ec150e5fb0dd
Secunia Security Advisory 27806
Posted Nov 29, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for tk8.3. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, debian
MD5 | f9ad32f8f443e3590e11adaf2cfacfad
Secunia Security Advisory 27814
Posted Nov 29, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Crackers_Child has reported a vulnerability in vBTube, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | c27846b76f2242107fd0f73091eabb6e
Secunia Security Advisory 27825
Posted Nov 29, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Chris Rohlf has reported a vulnerability in Ruby-GNOME2, which can potentially be exploited by malicious people to compromise an application using the library.

tags | advisory, ruby
MD5 | ea2354c0124d53fdff2f8203b933b3f5
Page 1 of 32
Back12345Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    22 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close