exploit the possibilities
Showing 1 - 25 of 38 RSS Feed

Files Date: 2009-12-04

Secunia Security Advisory 37586
Posted Dec 4, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for request-tracker. This fixes a vulnerability, which can be exploited by malicious people to conduct session fixation attacks.

tags | advisory
systems | linux, debian
MD5 | 19cc6dc08c1a93f76d4b1fc8f51b6426
Secunia Security Advisory 37582
Posted Dec 4, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged a vulnerability in Solaris, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
systems | solaris
MD5 | 4e2cc0ce83beaf2d02622bbb49d805ba
Secunia Security Advisory 37593
Posted Dec 4, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged some vulnerabilities in Solaris, which can be exploited by malicious people to crash an application linked against the libexpat library.

tags | advisory, vulnerability
systems | solaris
MD5 | 29ca12d92a7a92ede2a971a20254621e
Secunia Security Advisory 37555
Posted Dec 4, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged some vulnerabilities in Sun Management Center, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the libxml2 library.

tags | advisory, denial of service, vulnerability
MD5 | 6cb78c6319873a0f35a19c488ca994a0
Secunia Security Advisory 37581
Posted Dec 4, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Apple has issued an update for Java for Mac OS X. This fixes some vulnerabilities, which can be exploited by malicious people to potentially disclose sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), or to compromise a user's system.

tags | advisory, java, denial of service, vulnerability
systems | apple, osx
MD5 | b2ba05a95d2569736245b6cf139ef6bf
Secunia Security Advisory 37565
Posted Dec 4, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in IIPImage Server, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | c21492a8f7926edf4f51d8ffd61a9ac1
Secunia Security Advisory 37594
Posted Dec 4, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged some vulnerabilities in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | solaris
MD5 | 9a4e02cf9202562069a0081ccc819a19
Secunia Security Advisory 37570
Posted Dec 4, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Diego Juarez has reported a security issue in DAZ Studio, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | c5ffb0a8c3ca9a5b7bea7fcd9243deaa
Secunia Security Advisory 37590
Posted Dec 4, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue and some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to manipulate certain data and cause a DoS (Denial of Service), and by malicious people to potentially compromise a vulnerable system.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux
MD5 | 532b0bcc6507e9986af725e2e4415c08
Secunia Security Advisory 37507
Posted Dec 4, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in DevIL, which can be exploited by malicious people to compromise an application using the library.

tags | advisory
MD5 | 85e3287e62fa2cea5e381df720b708dd
Secunia Security Advisory 37587
Posted Dec 4, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for gforge. This fixes a security issue, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, debian
MD5 | 7b8e82800fe860a431a33a9eb1eed2b8
Secunia Security Advisory 37514
Posted Dec 4, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - K053 has reported a vulnerability in Micronet SP1910 Network Access Controller, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 911d0afe29d1f5c9b522a58da826ecbb
Secunia Security Advisory 37595
Posted Dec 4, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes some security issues and a vulnerability, which can be exploited by malicious, local users to manipulate certain data, cause a DoS (Denial of Service), or gain escalated privileges.

tags | advisory, denial of service, kernel, local
systems | linux, redhat
MD5 | df028178a9e97778f914734640c93dc2
Secunia Security Advisory 37576
Posted Dec 4, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Nac Mac Feegle has discovered multiple vulnerabilities in Uiga Church Portal, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting, script insertion, and SQL injection attacks, bypass certain security restrictions, and compromise a vulnerable system.

tags | advisory, vulnerability, xss, sql injection
MD5 | 71838e2bb3dee52a1ca542826f99e0df
Secunia Security Advisory 37557
Posted Dec 4, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Simple Machines Forum, which can be exploited by malicious users and malicious people to conduct cross-site request forgery attacks.

tags | advisory, vulnerability, csrf
MD5 | b0b976868594dfbe2e498ee980d9c62a
Secunia Security Advisory 37525
Posted Dec 4, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - andresg888 has discovered a vulnerability in YJ Whois module for Joomla, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | bbe0f2cb2873c3a1f32de8b602c66c61
Secunia Security Advisory 37591
Posted Dec 4, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - fl0 fl0w has discovered a vulnerability in Jasc Paint Shop Pro, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 35514fc4025b70a357a6bfa49645dbae
Secunia Security Advisory 37583
Posted Dec 4, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for qemu-kvm. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
MD5 | 293d26698589367d1e3312f285d601e7
Jasc Paint Shop Pro 8 Buffer Overflow
Posted Dec 4, 2009
Authored by fl0 fl0w

Jasc Paint Shop pro version 8 universal local buffer overflow exploit that creates a malicious .png file.

tags | exploit, overflow, local
MD5 | 52b6b166c29ecc4b4c37be3072c46e42
Vivid Ads Shopping Cart SQL Injection
Posted Dec 4, 2009
Authored by Pr0T3cT10n

Vivid Ads Shopping Cart suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 4957ee144f8b1ed4ae40d8e40df23c94
PHP ini_restore Memory Disclosure
Posted Dec 4, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

PHP suffers from an ini_restore() related memory information disclosure vulnerability.

tags | exploit, php, info disclosure
advisories | CVE-2009-2626
MD5 | 528d5771690c304d9f777f64e8cd30b9
Mandriva Linux Security Advisory 2009-203
Posted Dec 4, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-203 - lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. This update provides a solution to this vulnerability. Packages for 2008.0 are being provided due to extended support for Corporate products.

tags | advisory, arbitrary, spoof
systems | linux, mandriva
advisories | CVE-2009-2417
MD5 | d5b7ff1118b213916ed9fca6dc9d7ada
Mandriva Linux Security Advisory 2009-201
Posted Dec 4, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-201 - socket.c in fetchmail before 6.3.11 does not properly handle a '\\0' (NUL) character in a domain name in the subject's Common Name (CN) and subjectAlt(ernative)Name fields of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. This update provides a solution to this vulnerability. Packages for 2008.0 are being provided due to extended support for Corporate products.

tags | advisory, arbitrary, spoof
systems | linux, mandriva
advisories | CVE-2009-2666
MD5 | 66ad858f876df6fb5769d815b5069946
Mandriva Linux Security Advisory 2009-200
Posted Dec 4, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-200 - Stack consumption vulnerability in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allows context-dependent attackers to cause a denial of service (application crash) via a large depth of element declarations in a DTD, related to a function recursion, as demonstrated by the Codenomicon XML fuzzing framework. Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, as demonstrated by the Codenomicon XML fuzzing framework. This update provides a solution to these vulnerabilities. Packages for 2008.0 are being provided due to extended support for Corporate products.

tags | advisory, denial of service, vulnerability
systems | linux, mandriva
advisories | CVE-2009-2414, CVE-2009-2416
MD5 | 2a759ebefa7d6e93de5b7769a47728a0
Mandriva Linux Security Advisory 2009-287
Posted Dec 4, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-287 - Multiple vulnerabilities have been found and corrected in xpdf.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2009-3603, CVE-2009-3604, CVE-2009-3606, CVE-2009-3608, CVE-2009-3609
MD5 | 2a144a49681185841621d5a6d5155cc2
Page 1 of 2
Back12Next

File Archive:

August 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    10 Files
  • 2
    Aug 2nd
    8 Files
  • 3
    Aug 3rd
    2 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    79 Files
  • 7
    Aug 7th
    16 Files
  • 8
    Aug 8th
    10 Files
  • 9
    Aug 9th
    10 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    6 Files
  • 12
    Aug 12th
    26 Files
  • 13
    Aug 13th
    15 Files
  • 14
    Aug 14th
    19 Files
  • 15
    Aug 15th
    52 Files
  • 16
    Aug 16th
    11 Files
  • 17
    Aug 17th
    1 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close