all things security
Showing 1 - 25 of 865 RSS Feed

Files Date: 2008-03-01 to 2008-03-31

cuteflow-sqlxss.txt
Posted Mar 29, 2008
Authored by hadihadi | Site virangar.org

CuteFlow version 1.5.0 suffers from SQL injection and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
MD5 | 7ce3317e8139880959000094ec922651
VMware Security Advisory 2008-0006
Posted Mar 29, 2008
Authored by VMware | Site vmware.com

VMware Security Advisory - VMware has released an updated libxml2 package that addresses a security issue.

tags | advisory
advisories | CVE-2007-6284
MD5 | 2a723fe9cc3a345fee9423b599fb6de1
Mandriva Linux Security Advisory 2008-080
Posted Mar 29, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A number of security vulnerabilities have been discovered and corrected in the latest Mozilla Firefox program, version 2.0.0.13.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2007-4879, CVE-2008-1195, CVE-2008-1233, CVE-2008-1234, CVE-2008-1235, CVE-2008-1236, CVE-2008-1237, CVE-2008-1238, CVE-2008-1240, CVE-2008-1241
MD5 | 2218b65744065e433bf5b605e7dd01af
Secunia Security Advisory 29325
Posted Mar 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - laurent has reported a vulnerability in Siemens SpeedStream 6520, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 32549143b4f0316587bf44c7903b06fc
Secunia Security Advisory 29391
Posted Mar 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for seamonkey. This fixes some vulnerabilities and a weakness, which can be exploited to conduct cross-site scripting attacks, bypass certain security restrictions, and potentially compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, redhat
MD5 | 5c886361e05d0ce979478d0e27ec8326
Secunia Security Advisory 29500
Posted Mar 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for sarg. This fixes some vulnerabilities, which can be exploited by malicious people to conduct script insertion attacks or to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, mandriva
MD5 | b98dac9373279af9512e0c3575b7bece
Secunia Security Advisory 29539
Posted Mar 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for xulrunner. This fixes some vulnerabilities and weaknesses, which can be exploited by malicious people to bypass certain security restrictions, disclose potentially sensitive information, conduct cross-site scripting and phishing attacks, and potentially compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, debian
MD5 | da2709ac98af76d93f9131b22514100a
Secunia Security Advisory 29560
Posted Mar 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for firefox. This fixes some vulnerabilities and weaknesses, which can be exploited by malicious people to bypass certain security restrictions, disclose potentially sensitive information, conduct cross-site scripting and phishing attacks, and potentially compromise a user's system.

tags | advisory, vulnerability, xss
MD5 | cb78640c33730b23c44e609fa0e49cb2
Secunia Security Advisory 29564
Posted Mar 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Yogesh Kulkarni has reported a vulnerability in ManageEngine Applications Manager, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 851c9fe1b7acc7ffd49545d653e4a89d
Secunia Security Advisory 29566
Posted Mar 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the HP TCP/IP services for OpenVMS, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, tcp
MD5 | 4063252afbf711414252495bc44cae13
Secunia Security Advisory 29567
Posted Mar 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for epiphany. This fixes some vulnerabilities and weaknesses, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, conduct spoofing attacks, or to compromise a user's system.

tags | advisory, spoof, vulnerability
systems | linux, suse
MD5 | d24c55b1068d4e9c53988670c01f8e57
Secunia Security Advisory 29569
Posted Mar 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
MD5 | 8d8ce671a92878e3141acde0cb2fa9ca
Secunia Security Advisory 29572
Posted Mar 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Linux_Drox has reported some vulnerabilities in DigiDomain, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 44aeb8791a059265cef5487bdcc45f86
Secunia Security Advisory 29574
Posted Mar 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Maksymilian Arciemowicz has reported some vulnerabilities in FreeBSD, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | freebsd
MD5 | ca0d06cda71cf805a2446153c26a74cb
Secunia Security Advisory 29580
Posted Mar 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for exiftags. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, debian
MD5 | 829a685e4ae7cdb95bb11460d7097125
HP Security Bulletin 2007-14.79
Posted Mar 28, 2008
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential vulnerability has been identified with the SSH server in HP OpenVMS TCP/IP Services running on HP Integrity and HP Alpha. The vulnerability could be exploited to allow remote unauthorized access.

tags | advisory, remote, tcp
advisories | CVE-2008-0704
MD5 | e8987aa585b9f93d71d1d5725421a50a
HP Security Bulletin 2008-00.27
Posted Mar 28, 2008
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP Compaq Notebook PC BIOS. The vulnerability could be exploited to allow local unauthorized users access to the system.

tags | advisory, local
advisories | CVE-2008-0706
MD5 | 7b1b890b374ccbff7e77d8bb86e61f49
HP Security Bulletin 2008-00.4
Posted Mar 28, 2008
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP Compaq Business Notebook PC BIOS. The vulnerability could be exploited to create a Denial of Service (DoS).

tags | advisory, denial of service
advisories | CVE-2008-0211
MD5 | ff0afcf49d063bd287de5ec4c1fa5000
Secunia Security Advisory 29553
Posted Mar 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for policyd-weight. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, debian
MD5 | 8a3a97421cb892c5166ef407df788ff4
camulti-overflow.txt
Posted Mar 28, 2008
Authored by Ken Williams | Site www3.ca.com

CA Security Advisory - CA products that implement the DSM ListCtrl ActiveX control are vulnerable to a buffer overflow condition that can allow a remote attacker to cause a denial of service or execute arbitrary code with the privileges of the user running the web browser.

tags | advisory, remote, web, denial of service, overflow, arbitrary, activex
advisories | CVE-2008-1472
MD5 | 65eda83c7e5bae337d11f91b9d4e591b
xchat-disclose.txt
Posted Mar 28, 2008
Authored by Omnipresent, Evilcry | Site evilcry.altervista.org

XChat version 2.8.4-1 suffers from a password disclosure vulnerability.

tags | advisory, info disclosure
MD5 | 8859a198df5ac9c75c54cfc73d614c38
ie-spoof.txt
Posted Mar 28, 2008
Authored by Juan Pablo Lopez Yacubian

It appears that Internet Explorer 7 may have an address bar spoofing vulnerability.

tags | advisory, spoof
MD5 | a2a9fcbc095113cb1345ed904bad851c
Mandriva Linux Security Advisory 2008-079
Posted Mar 28, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A stack-based buffer overflow in sarg (Squid Analysis Report Generator) allowed remote attackers to execute arbitrary code via a long Squid proxy server User-Agent header. A cross-site scripting vulnerability in sarg version 2.x prior to 2.2.5 allowed remote attackers to inject arbitrary web script or HTML via the User-Agent header, which is not properly handled when displaying the Squid proxy log. In addition, a number of other fixes have been made such as making the getword() function more robust which should prevent any overflows, other segfaults have been fixed, and the useragent report is now more consistent with the other reports.

tags | advisory, remote, web, overflow, arbitrary, xss
systems | linux, mandriva
advisories | CVE-2008-1168, CVE-2008-1167
MD5 | 6af2f57b4645d90a917e19aa7812867a
arpalert-2.0.10.tar.gz
Posted Mar 28, 2008
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

Changes: A bug fix and a new script added.
tags | local
systems | unix
MD5 | 762298e677122c6ab2786ef3d57aa2f1
nuface-2.0.1.tar.bz2
Posted Mar 28, 2008
Authored by Vincent Deffontaines | Site inl.fr

Nuface is a web-based administration tool that generates Edenwall, NuFW, or simple Netfilter firewall rules. It features a high level abstraction on the security policy set by the administrator, and works internally on an XML data scheme. Its philosophy is to let you agglomerate subjects, resources, or protocols into meta-objects, and use those meta objects to generate ACLs, which are then interpreted as netfilter rules by Nupyf, the internal XML parser. This tool may easily be extended to support firewall implementations other than Netfilter.

Changes: Multiple bug fixes.
tags | tool, web, firewall, protocol
systems | unix
MD5 | 7032b47fd3932ad796f735bd3d661ed0
Page 1 of 35
Back12345Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    14 Files
  • 19
    Oct 19th
    8 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close