what you don't know can hurt you
Showing 1 - 25 of 51 RSS Feed

Files Date: 2010-07-16

Secunia Security Advisory 40584
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for avahi. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, redhat
SHA-256 | 67b6715c27d80d2913bd919442d0e80c7cb5d1a61997ab629b38b7424bdda5e4
Secunia Security Advisory 40619
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has reported a vulnerability in DSite CMS, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | 7f74e3e4e566e87a3a4f893ed012a0b8c86168003c85552c23008387e18238e8
Secunia Security Advisory 40582
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM solidDB, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
SHA-256 | d437731c994324e20552810297cb3c07d26179d1f8b6cd292d9f9d545b246f74
Secunia Security Advisory 40652
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in BIND, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | d6e91def315c441964cfe66632de03c3fefcc9ad6670d2686e7a6fbeb1ff409c
Secunia Security Advisory 40648
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported a vulnerability in the Unreal Engine, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 2aceef1e11c1000050a31170dcff3c297a4e29b8b6b3ae48e5285f14a2368778
Secunia Security Advisory 40591
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in Pixie CMS, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 30b2522e01471f68a266f863f0e888f166edb7aafe1ea570eed2e9041ab6d4d1
Secunia Security Advisory 40635
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Gnome VTE, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | f50e00d57c417b36c50f5dfbb68234da344f09f5048bfa1ad095b78956820d25
Secunia Security Advisory 40640
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Salvatore Fresta has discovered a vulnerability in the redSHOP component for Joomla, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 12bb9fe27f984ea4392e9e9c6bb4bcfb8388f2597b7b7cfe1de415fb2aa15c9a
Secunia Security Advisory 40657
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for vte. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, ubuntu
SHA-256 | f169da69213e17c214c420f777505070f7f0ce5ed0029b1af314257d8ad14d85
Secunia Security Advisory 40644
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Joomla, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 4711cf64cea566fe2fd5dcaf964e63600373ab78a5145d9eb58b29ed1740b53f
Secunia Security Advisory 40638
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Ipswitch IMail Server, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 462693521ec74dd119c5e7635348ed814fcf6a41ef56a80d473b46a6180f32b7
Secunia Security Advisory 40593
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in FestOS, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 0357423101f88cb0e443564c9ce5a50f377ab7f35afc74d131dea23a5bf0937f
Secunia Security Advisory 40625
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SkyLined has discovered a vulnerability in UltraEdit, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | a27a337b7fa4cd1c91ecccd3f854a5625c0ba9def6f7d1a83a9383fbd7acad62
Secunia Security Advisory 40633
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Elazar Broad has reported a vulnerability in SAP GUI, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 1a28c3ec1a4257969e365aaf9a430ace74631fa0f135373c8d1a3f4f0020f120
Secunia Security Advisory 40626
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Whizzy CMS, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | bb89298209fe0f0dee2f6ac5d6c846bbb79621f6d28a08c386ee640a96314a12
Secunia Security Advisory 40616
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in Pligg, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 5a9d4dd8913f0b0927e455f43e3f377aaf8155fedef85deb4e2d7faec996a387
Secunia Security Advisory 40596
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Oracle TimesTen, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 72e0e102e9c323ccad608bf36d135e96131d59ff3b2c8bd264aaacb13267f941
Zero Day Initiative Advisory 10-128
Posted Jul 16, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-128 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IPSwitch IMail. Authentication is not required to exploit this vulnerability. The specific flaw exists within SMTPDLL.dll (called by queuemgr.exe). When handling a message queued for remote delivery user supplied data can be used to specify additional format specifiers to a vsprintf call. This can be accomplished by providing a specially crafted -NOTIFY argument to the SMTP "RCPT TO:" argument. Additionally, the destination buffer supplied to vsprintf is a local stack buffer and can also be overflowed with a large -NOTIFY argument. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.

tags | advisory, remote, overflow, arbitrary, local
SHA-256 | 37ce4e96b82bcbbb30c5465567f06bd93fbb056083143279c00663505e89a796
Kiwicon 2010 Call For Papers
Posted Jul 16, 2010
Site kiwicon.org

Kiwicon '10 Call For Papers - This year Kiwicon will be held from November 27th through 28th, 2010 in Wellington, New Zealand.

tags | paper, conference
SHA-256 | 092e3df5929c816e6d15328da8296b90daff45007d94b9e0e436333471a0b337
Zero Day Initiative Advisory 10-127
Posted Jul 16, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-127 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IPSwitch IMail. Authentication might be required to exploit this vulnerability. The specific flaw exists within imailsrv.exe which is invoked to handle messages sent to the imailsrv. When a message subject contains a "?Q?" operator the string following that sequence is copied to a local stack buffer. No validation of the data or data length is done. In order to reach this code path a mailing list must be password protected (authentication required) or have previously had a password configured (no authentication required). A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.

tags | advisory, remote, arbitrary, local
SHA-256 | fb402162bacb3d8b6e64e4a1aa1bbde1598d7c8988808c9a74716f131ba6ef8f
SAPGui BI wadmxhtml.dll Tags Property Heap Corruption
Posted Jul 16, 2010
Authored by Elazar Broad

The SAPGui BI component version 7100.1.400.8 suffers from a heap corruption vulnerability that can result in the execution of arbitrary code.

tags | advisory, arbitrary
SHA-256 | 48281966e185d95a67bcf3b10926975fea33c0f7622999f0956eade3661b272b
Zero Day Initiative Advisory 10-126
Posted Jul 16, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-126 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IPSwitch IMail List Mailer. Authentication is not required to exploit this vulnerability. The specific flaw exists within imailsrv.exe which is invoked to handle messages sent to the imailsrv. When a message contains multiple "Reply-To:" headers the imailsrv.exe process concatenates these into a single fixed length buffer on the stack. No validation of the data or data length is done. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.

tags | advisory, remote, arbitrary
SHA-256 | ebbdc56c6961aa1b5a00fba623e5ec83c7e6155db97b3dbd2d88dea4062486ac
ClubHack 2010 Call For Papers
Posted Jul 16, 2010
Site clubhack.com

The Call For Papers for ClubHack 2010 has been announced. For a full list of topics and more information on the convention, hit the home page.

tags | paper, conference
SHA-256 | 42a8e81e63da7e01426eb310ae9c0d83ee10f2d9edc499f369802f6670e7213c
Ubuntu Security Notice 962-1
Posted Jul 16, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 962-1 - Janne Snabb discovered that applications using VTE, such as gnome-terminal, did not correctly filter window and icon title request escape codes. If a user were tricked into viewing specially crafted output in their terminal, a remote attacker could execute arbitrary commands with user privileges.

tags | advisory, remote, arbitrary
systems | linux, ubuntu
advisories | CVE-2010-2713
SHA-256 | 80c4d64b72f9a308db9f8e5b218bb0ad4dff2e8abe8e73d44a908a8521f7dfe1
Media Design Studio Cross Site Scripting
Posted Jul 16, 2010
Authored by D4rk357

Media Design Studio suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 2ff3669cc6cd612ef4920846f1ac13a928ef7b67e3642cf7d6e98aa8a027252b
Page 1 of 3
Back123Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close