exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2008-11-15

Mandriva Linux Security Advisory 2008-229
Posted Nov 15, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - An off-by-one error was found in ClamAV versions prior to 0.94.1 that could allow remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted VBA project file. Other bugs have also been corrected in 0.94.1 which is being provided with this update.

tags | advisory, remote, denial of service, arbitrary
systems | linux, mandriva
advisories | CVE-2008-5050
SHA-256 | e1aab69495ae010aa0a9d6938ae571c19e5e88391968e5aa2b5b8c8d698fc850
Secunia Security Advisory 32658
Posted Nov 15, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Interchange, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | e1b6ca5daa2a9dbd4dc6e2bff33cc21b24f4cc0a3118f2fc62196e92df3e2825
Secunia Security Advisory 32676
Posted Nov 15, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged some vulnerabilities in Sun StarOffice/StarSuite, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | e09b19c2ff0928731f24d4264c737337727d9e0518b22d62b0064d40c2ed9d25
Secunia Security Advisory 32690
Posted Nov 15, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ZoRLu has reported a vulnerability multiple ScriptsFeed products, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | ab1fd63559456ebff19fe4e7b6b1d219b0b0569b53f806ffff4160af0e0a0cac
Secunia Security Advisory 32696
Posted Nov 15, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hamid Ebadi has discovered a vulnerability in Pi3Web, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 3a6884e4ed6ed9c51861bb95d32c7af46cce7395f47ee430f959ee6296d41ffd
Secunia Security Advisory 32697
Posted Nov 15, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has acknowledged a vulnerability in vm-builder. This can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, ubuntu
SHA-256 | d555a699f6e5be74624d84f1dfcaf8b27046d74c47173564051537fd5db9bb16
Secunia Security Advisory 32706
Posted Nov 15, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Apple Safari, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose sensitive information or compromise a user's system.

tags | advisory, local, vulnerability
systems | apple
SHA-256 | c8a6d1ec0286fada36a681921711f23ca3df0d10e8c653696cdd01554d7c8539
Secunia Security Advisory 32719
Posted Nov 15, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.

tags | advisory, denial of service, kernel
systems | linux
SHA-256 | b61453ed68b9871500861190b3eda25732a3233f560a98660f01cf2cdbe35788
Secunia Security Advisory 32720
Posted Nov 15, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Astaro has issued an update for libspf2. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise an application using the library.

tags | advisory
SHA-256 | 45fd81748bf84f807c9005761de47d821d8617a36c571e8ec02370e426218f80
Secunia Security Advisory 32721
Posted Nov 15, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for firefox and xulrunner. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or compromise a user's system.

tags | advisory, vulnerability
systems | linux, fedora
SHA-256 | b55dae118c9350e89bc24854c1b4788b33d08d92387317755008060ca61142cc
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close