what you don't know can hurt you
Showing 1 - 25 of 51 RSS Feed

Files Date: 2010-07-16

Secunia Security Advisory 40584
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for avahi. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, redhat
MD5 | e4f5f1ee5e38e542fab299673cc59c2c
Secunia Security Advisory 40619
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has reported a vulnerability in DSite CMS, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | 8369f34401ab9b8e7a6d9540c2e308ce
Secunia Security Advisory 40582
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM solidDB, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
MD5 | 29ed2518756f9e732a3253e2f1eb01c3
Secunia Security Advisory 40652
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in BIND, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 838b3045cf054db4a1493e4a1ad9aac9
Secunia Security Advisory 40648
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported a vulnerability in the Unreal Engine, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 90317d6858e2714660aac78dc036d300
Secunia Security Advisory 40591
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in Pixie CMS, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
MD5 | 6d1dfec10b396a4ebb7654f52bc2a38f
Secunia Security Advisory 40635
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Gnome VTE, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | b4915cb0d173e401ce8d542ecedad082
Secunia Security Advisory 40640
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Salvatore Fresta has discovered a vulnerability in the redSHOP component for Joomla, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 3d5a437333bc39822ea5010627f439a3
Secunia Security Advisory 40657
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for vte. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, ubuntu
MD5 | bcf161fc58cf532041163fbe9314cebd
Secunia Security Advisory 40644
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Joomla, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss, sql injection
MD5 | 786d7afee4d92a9b4c99f99ca258847f
Secunia Security Advisory 40638
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Ipswitch IMail Server, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | e6c2dae5e53103648ced3ae6272bf9e1
Secunia Security Advisory 40593
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in FestOS, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
MD5 | 3662484fe3c558363f8b71bf7cb29a5d
Secunia Security Advisory 40625
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SkyLined has discovered a vulnerability in UltraEdit, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | e797ebcbeb6d845e2484513df8e23a49
Secunia Security Advisory 40633
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Elazar Broad has reported a vulnerability in SAP GUI, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | d6a978fa29533046ceec5224a079857a
Secunia Security Advisory 40626
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Whizzy CMS, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | 55b26b7873d7121a84a1b8cfa0514acc
Secunia Security Advisory 40616
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in Pligg, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 3ee669230da5a2e68a3860b09c116bac
Secunia Security Advisory 40596
Posted Jul 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Oracle TimesTen, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | a2504fd8910bcee0b6c784535eef8ac5
Zero Day Initiative Advisory 10-128
Posted Jul 16, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-128 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IPSwitch IMail. Authentication is not required to exploit this vulnerability. The specific flaw exists within SMTPDLL.dll (called by queuemgr.exe). When handling a message queued for remote delivery user supplied data can be used to specify additional format specifiers to a vsprintf call. This can be accomplished by providing a specially crafted -NOTIFY argument to the SMTP "RCPT TO:" argument. Additionally, the destination buffer supplied to vsprintf is a local stack buffer and can also be overflowed with a large -NOTIFY argument. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.

tags | advisory, remote, overflow, arbitrary, local
MD5 | 6925dd6d0ca2b42d7c557b71d25be680
Kiwicon 2010 Call For Papers
Posted Jul 16, 2010
Site kiwicon.org

Kiwicon '10 Call For Papers - This year Kiwicon will be held from November 27th through 28th, 2010 in Wellington, New Zealand.

tags | paper, conference
MD5 | b9f227561ed34b15eceac54105cea256
Zero Day Initiative Advisory 10-127
Posted Jul 16, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-127 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IPSwitch IMail. Authentication might be required to exploit this vulnerability. The specific flaw exists within imailsrv.exe which is invoked to handle messages sent to the imailsrv. When a message subject contains a "?Q?" operator the string following that sequence is copied to a local stack buffer. No validation of the data or data length is done. In order to reach this code path a mailing list must be password protected (authentication required) or have previously had a password configured (no authentication required). A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.

tags | advisory, remote, arbitrary, local
MD5 | ee9eae402ef5c43b7deb5f45af40fc1a
SAPGui BI wadmxhtml.dll Tags Property Heap Corruption
Posted Jul 16, 2010
Authored by Elazar Broad

The SAPGui BI component version 7100.1.400.8 suffers from a heap corruption vulnerability that can result in the execution of arbitrary code.

tags | advisory, arbitrary
MD5 | 1518bf3e5e2cbc644a76b75abd4f9cc5
Zero Day Initiative Advisory 10-126
Posted Jul 16, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-126 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IPSwitch IMail List Mailer. Authentication is not required to exploit this vulnerability. The specific flaw exists within imailsrv.exe which is invoked to handle messages sent to the imailsrv. When a message contains multiple "Reply-To:" headers the imailsrv.exe process concatenates these into a single fixed length buffer on the stack. No validation of the data or data length is done. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.

tags | advisory, remote, arbitrary
MD5 | 9b8f1251cea7ac0e563a6ba86bf15714
ClubHack 2010 Call For Papers
Posted Jul 16, 2010
Site clubhack.com

The Call For Papers for ClubHack 2010 has been announced. For a full list of topics and more information on the convention, hit the home page.

tags | paper, conference
MD5 | ff19c2f02a34adbe62b7d061179a2a9e
Ubuntu Security Notice 962-1
Posted Jul 16, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 962-1 - Janne Snabb discovered that applications using VTE, such as gnome-terminal, did not correctly filter window and icon title request escape codes. If a user were tricked into viewing specially crafted output in their terminal, a remote attacker could execute arbitrary commands with user privileges.

tags | advisory, remote, arbitrary
systems | linux, ubuntu
advisories | CVE-2010-2713
MD5 | 72e5c0962211bf21fc37eef4b8782523
Media Design Studio Cross Site Scripting
Posted Jul 16, 2010
Authored by D4rk357

Media Design Studio suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | d9d7946e681dd82ad2c7a7570392fd38
Page 1 of 3
Back123Next

File Archive:

December 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    1 Files
  • 2
    Dec 2nd
    16 Files
  • 3
    Dec 3rd
    17 Files
  • 4
    Dec 4th
    23 Files
  • 5
    Dec 5th
    11 Files
  • 6
    Dec 6th
    9 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close