Exploit the possiblities
Showing 1 - 25 of 82 RSS Feed

Files Date: 2010-06-02

Debian Security Advisory 2252-1
Posted Jun 2, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2252-1 - It was discovered that the message header parser in the Dovecot mail server parsed NUL characters incorrectly, which could lead to denial of service through malformed mail headers.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2011-1929
MD5 | 880a6b2452a16f1f9152fdd23a48f865
Debian Security Advisory 2251-1
Posted Jun 2, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2251-1 - Several vulnerabilities were discovered in Subversion, the version control system.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2011-1752, CVE-2011-1783, CVE-2011-1921
MD5 | e6ac763601f8bca6bab0b28c7ad0409b
Secunia Security Advisory 39985
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for sudo. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, gentoo
MD5 | c1ae83cca205cac84a7d022f7423c9ca
Secunia Security Advisory 39852
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in CompleteFTP, which can be exploited by malicious users to bypass certain security restrictions and compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | f01fd5b5bdceea3f3dfb82cb0e591dd0
Secunia Security Advisory 40024
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in OpenSSL, which potentially can be exploited by malicious people to compromise an application using the library or to conduct spoofing attacks.

tags | advisory, spoof, vulnerability
MD5 | 453b9a54b06ca23704ff38d89a862ebc
Secunia Security Advisory 39959
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for transmission. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, gentoo
MD5 | 3592c2198a381e2da4b351eebdf192f9
Secunia Security Advisory 39996
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for rhn-client-tools. This fixes a security issue, which can be exploited by malicious, local users to disclose sensitive information and manipulate certain data.

tags | advisory, local
systems | linux, redhat
MD5 | 176685cd8c6a2b0f25b9ae88e2ff3783
Secunia Security Advisory 40000
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in OpenSSL, which can be exploited by malicious people to potentially compromise an application using the library.

tags | advisory
MD5 | f14ab55446d416bd87174cc459381075
Secunia Security Advisory 39928
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for fetchmail. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks or potentially compromise a vulnerable system.

tags | advisory, spoof, vulnerability
systems | linux, gentoo
MD5 | 1729e3a87c7d66c3c7e018e1319afc2f
Secunia Security Advisory 39995
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Kerio MailServer and Kerio WinRoute Firewall, which can be exploited by malicious users to disclose potentially sensitive information and manipulate certain data.

tags | advisory
MD5 | 1d1d43059d3bd7ae3f9fe052c2e95df5
Secunia Security Advisory 40029
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in e-Pares, which can be exploited by malicious people to conduct cross-site scripting, cross-site request forgery, and session fixation attacks.

tags | advisory, vulnerability, xss, csrf
MD5 | cd76429829156cf0e1d8fa85c061b13c
Secunia Security Advisory 39994
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HP has issued an update for JRE / JDK. This fixes some vulnerabilities, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, disclose potentially sensitive information, cause a DoS (Denial of Service), or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | daf948b4d6e377cdf299fb0fec740923
Secunia Security Advisory 39984
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for nano. This fixes two security issues, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, gentoo
MD5 | 40ca224071dd91a34fb1aeed63bcf021
Secunia Security Advisory 39955
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for wireshark. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
MD5 | c39328749afd1e87cb8f7a6b40581d6e
Secunia Security Advisory 39927
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for BIND. This fixes some vulnerabilities, which can be exploited by malicious people to poison the DNS cache.

tags | advisory, vulnerability
systems | linux, gentoo
MD5 | a47147a83cfe75ff27698ea464c39aea
Secunia Security Advisory 40013
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has reported two vulnerabilities in Ecomat CMS, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
MD5 | f994c85508e32c91c2a7bcaaaa770e73
Secunia Security Advisory 40030
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in LightNEasy, which can be exploited by malicious people to conduct script insertion vulnerabilities.

tags | advisory, vulnerability
MD5 | 29af45abc03d1b5e2c6e03ddbb32a960
Secunia Security Advisory 40011
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - John Leitch has discovered a vulnerability in TCExam, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 4d29ec970dfc3bd1a4da6239ce0a92a0
Secunia Security Advisory 39926
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issues an update for multipath-tools. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
systems | linux, gentoo
MD5 | 1de92cc1c8645fdc1c7df8e6ae330bd3
Secunia Security Advisory 39949
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for xine-lib. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise the user's system.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
MD5 | ad43acca8860d032c1e58a2c297cb8d5
Secunia Security Advisory 39998
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ilja van Sprundel has discovered some vulnerabilities in Accoria Rock Web Server, which can be exploited by malicious people to conduct brute force attacks, cross-site scripting attacks, and cross-site request forgery attacks.

tags | advisory, web, vulnerability, xss, csrf
MD5 | c57184ad9e23a275a94c533e76333339
Secunia Security Advisory 40005
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for imagemagick. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise the user's system. For more information: SA35216

tags | advisory, denial of service
systems | linux, gentoo
MD5 | bbef507aa2616baa2ff05960ecf5cd69
Secunia Security Advisory 39992
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for camlimages. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
MD5 | e0b0527e9b8ccbd8d42a5671597a5e6f
Secunia Security Advisory 39962
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for silc-toolkit and silc-client. This fixes multiple vulnerabilities that can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
MD5 | b4129c329f4a4f3bbe34acf4c03e6f19
Secunia Security Advisory 39993
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for freetype. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise applications using the library.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
MD5 | 65cbee06cd75a484f620fb5e1a307608
Page 1 of 4
Back1234Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    4 Files
  • 19
    Nov 19th
    2 Files
  • 20
    Nov 20th
    9 Files
  • 21
    Nov 21st
    15 Files
  • 22
    Nov 22nd
    23 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close