exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 37 RSS Feed

Files Date: 2009-03-19

Secunia Security Advisory 34362
Posted Mar 19, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for opensc. This fixes some security issues, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, fedora
SHA-256 | f56c53fb7128d3d77323d7f9f651d6cde2d1faf5f3861c198889ae48837ef1fc
Secunia Security Advisory 34377
Posted Mar 19, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for opensc. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, fedora
SHA-256 | 11f420792ecc7983922cf3e0969b5fed9106f06e284156fa31200cd13fc990d0
Secunia Security Advisory 34361
Posted Mar 19, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for bugzilla. This fixes some vulnerabilities and a security issue, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, or conduct script insertion attacks and by malicious people to potentially disclose sensitive information or to conduct cross-site request forgery attacks.

tags | advisory, vulnerability, csrf
systems | linux, fedora
SHA-256 | b173ed92c4d617028ec574751cbb7a73f158e3b9b43b61476e97ebdb81216b3c
Secunia Security Advisory 34363
Posted Mar 19, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for evolution-data-server. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks or disclose potentially sensitive information.

tags | advisory, spoof, vulnerability
systems | linux, fedora
SHA-256 | cc79627a415f37ce6f75245b38dc35115d18b02c4622a1b3280cd45d84b0b215
Secunia Security Advisory 34375
Posted Mar 19, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged some vulnerabilities in Avaya CMS, which can be exploited by malicious, local users to cause a DoS (Denial of Service), bypass certain security restrictions, and potentially gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
SHA-256 | 8b2025bdcde862b10197c62f0bc1b0971f443a51bf6335c65c55bf4e2e00cc40
Secunia Security Advisory 34369
Posted Mar 19, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - zAx has discovered some vulnerabilities in Chasys Media Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 65c13a69d20fc932d4450a89d7b693435902363ff0c7a5371dd924bbc63f7154
Secunia Security Advisory 34371
Posted Mar 19, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya CMS, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
SHA-256 | e3018d9de0d0fffe30ff366a7b77c08a429f4bc9f8d1737404ee548890bfa69c
Secunia Security Advisory 34352
Posted Mar 19, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for phpmyadmin. This fixes some vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct cross-site scripting and request forgery attacks.

tags | advisory, vulnerability, xss
systems | linux, gentoo
SHA-256 | a612f18e43b65b61dc3c4f82242e0403bdedcb28147a85b654da5914df5a5f1d
Secunia Security Advisory 34378
Posted Mar 19, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Drupal Plus 1 Module, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | cc9a759e72f8d49e709d3a7cf0f987a8676f172ffb5da889b8fba5fc41bff92a
Secunia Security Advisory 34354
Posted Mar 19, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for ejabberd. This fixes a vulnerability, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
systems | linux, fedora
SHA-256 | 2fc627cae22fef8e46b63b5a73fc97fa83e58e2260b643532675e64e40f6df24
Secunia Security Advisory 34374
Posted Mar 19, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Drupal Print Module, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 010d3ca0de611aac0f95f249b2dbeecbe563ae3f69f9c1928c98b91dd833d1ac
Secunia Security Advisory 34370
Posted Mar 19, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in the Drupal Content Construction Kit, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory, vulnerability
SHA-256 | d1cb2cacdc4e8242098745abb44a90bd1f6186a1e8035637c0512f4bc16a1181
Secunia Security Advisory 34366
Posted Mar 19, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Advanced Image Hosting, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 5fc57481f231b424e02b641550b6e3171831b3526aa5d1637ccb2d58335e1e86
Secunia Security Advisory 34376
Posted Mar 19, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in the Tasklist module for Drupal, which can be exploited by malicious users to conduct script insertion or SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 6ac5a9a1edb6a1c75ea5db5265b1b8393f34e9662c6f0a0a82eb1bfb62a90c7a
Secunia Security Advisory 34365
Posted Mar 19, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in DeluxeBB, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 2f7485cbed060752dbe091e017bf8b0cc6e725a94dd86b092384e5ccef31a048
Secunia Security Advisory 34368
Posted Mar 19, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Icarus, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 6ee217f18fc1a2dae6a192ea0a340d2f037eb509332cd4d88697da7983d6e253
Secunia Security Advisory 34309
Posted Mar 19, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in WinAsm Studio, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | 5d7b417d8a29d86f934ad12340e9391fba8a71034a03e14a571d0c5fd16dbb7a
SilverNews 2.04 Local File Inclusion
Posted Mar 19, 2009
Authored by d3b4g

SilverNews version 2.04 local file inclusion exploit.

tags | exploit, local, file inclusion
SHA-256 | e823cb5858d2b7fa7e0f9fc89ddf3e8fdcedb09bff81f89503a2a28049d9e19d
Gentoo Linux Security Advisory 200903-32
Posted Mar 19, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200903-32 - Multiple vulnerabilities have been discovered in phpMyAdmin, the worst of which may allow for remote code execution. Versions less than 2.11.9.4 are affected.

tags | advisory, remote, vulnerability, code execution
systems | linux, gentoo
advisories | CVE-2006-6942, CVE-2007-5977, CVE-2008-4096, CVE-2008-4775, CVE-2008-5621, CVE-2008-5622
SHA-256 | 84b576d5d56dcb25d0b1e8a4382cbe137d6660a1b4ff09053f94cae238c4e503
Debian Linux Security Advisory 1744-1
Posted Mar 19, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1744-1 - Sebastien Helleu discovered that an error in the handling of color codes in the weechat IRC client could cause an out-of-bounds read of an internal color array. This can be used by an attacker to crash user clients via a crafted PRIVMSG command.

tags | advisory
systems | linux, debian
advisories | CVE-2009-0661
SHA-256 | d0e055b93c820df9c6ed406891a6db9c732da85cf16671a88f6ccb7c250e925e
Epic Web Honeypot Project
Posted Mar 19, 2009
Authored by Malformation | Site sourceforge.net

The Epic Web Honeypot Project aims to lure attackers using various types of web vulnerability scanners by tricking them into believing that they have found a vulnerability on a host.

tags | tool, web, intrusion detection
systems | unix
SHA-256 | 5229ce6225601acbbf98f5eedc2a7dccd7a22fb2bf841287a31210fd53ab15c0
libssh2 C Library 1.0
Posted Mar 19, 2009
Site libssh2.org

libssh2 is a library implementing the SSH2 protocol as defined by Internet Drafts: SECSH-TRANS, SECSH-USERAUTH, SECSH-CONNECTION, SECSH-ARCH, SECSH-FILEXFER, SECSH-DHGEX, SECSH-NUMBERS, and SECSH-PUBLICKEY.

Changes: This release adds libssh2_sftp_tell64, libssh2_session_block_directions, libssh2_channel_request_pty_size_ex, libssh2_sftp_seek64, and the start of a test suite. Many bugs were fixed.
tags | encryption, protocol
SHA-256 | 2601c58bee8126b0a2adf1596010fc042abe0f2a8f446c6f7cfedf71e3d90e62
Secure Internet Live Conferencing
Posted Mar 19, 2009
Authored by priikone | Site silcnet.org

SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all developer related files.

Changes: This version fixes lots of bugs and many security bugs such as crashes. In fact this release fixes as many as 8 major crashes and many other bugs.
tags | protocol
SHA-256 | cae36cb446c7568e8b01c626484c073751502c1d81eef6c75bd2ac28b227490c
OpenSC Tools And Libraries For Smart Cards
Posted Mar 19, 2009
Site opensc-project.org

OpenSC consists of tools and libraries and a PKCS#11 module to use smart cards and initialize blank smart cards. It supports many commercial smart cards with filesystems, many national ID cards (read only), and some Java Card cards with specific Java Card applets. OpenSC implements the PKCS#15 standard. Cards initialized with OpenSC can be used (read-only) with other software implementing PKCS#15 standard and vice versa.

Changes: Major security fixes.
tags | java, library
SHA-256 | 6dab273cbdba8e92c59207715199f48f4f9e541e6d873561e30154bd40c4011d
sptrace LKM ptrace Control
Posted Mar 19, 2009
Authored by Krzysztof Burghardt | Site underground.org.pl

sptrace is a secure ptrace() module for Linux. It limits users' access to the ptrace() call. It can disable ptrace altogether, or if you add a ptrace group to your system, only users in that group will be able to use ptrace().

Changes: This version was adjusted to reflect changes in Linux, and was tested with kernel 2.6.23. Support for the 2.4 line is still there, but it is no longer tested.
systems | linux
SHA-256 | 6930bc9c9ee364d44e11ca82990ed89fcb6f0fbb39d10cfb065b9a069d1253d2
Page 1 of 2
Back12Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close