the original cloud security
Showing 1 - 25 of 51 RSS Feed

Files Date: 2010-09-14

AIDE 0.15.1
Posted Sep 14, 2010
Authored by Rami Lehti

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

Changes: Various bug fixes.
tags | tool, intrusion detection
systems | unix
MD5 | d0b72535ff68b93a648e4d08b0ed7f07
Secunia Security Advisory 41393
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Kingsoft Antivirus, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges.

tags | advisory, denial of service, local
MD5 | 4b588016c65fd20efde5dddb3a88c779
Secunia Security Advisory 41292
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | windows
MD5 | ccd5d4af7f0fdb736b1f405e5ccb128b
Secunia Security Advisory 41419
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
systems | windows
MD5 | d16508a912e37a4d4ff88847375bf21f
Secunia Security Advisory 41420
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | windows
MD5 | 774faa3e714270dd49135bbc082b2696
Secunia Security Advisory 41395
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
MD5 | 42873226bc2bdbb4563bdf728a4e5d43
Secunia Security Advisory 41396
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows and Microsoft Office, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
MD5 | 66071cde60cdae498c71a1771ff0ae56
Secunia Security Advisory 41416
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
MD5 | b45c887c84981f603abb09bc65edb4f8
Secunia Security Advisory 41421
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Exchange Server, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
MD5 | 3c30f8694f28c6e4d64285809a936191
Secunia Security Advisory 34075
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Microsoft Outlook, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 364ea9d1224540952399dca51265d9d1
Secunia Security Advisory 41412
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | windows
MD5 | 883bd5a720163810ff99fe7d9dec0b48
Secunia Security Advisory 41375
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Internet Information Services, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 393c7c6c228a8b39f5f7a9989192c4b6
Secunia Security Advisory 41433
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM Lotus Domino, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 2ef64f8119cc86a7d1aafac3e9cc9f38
Secunia Security Advisory 41382
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in pidgin-knotify, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 1f8022bff8bd51d28c476a31e089ae36
Secunia Security Advisory 41386
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0t has discovered some vulnerabilities in Open Classifieds, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 9e12920c954c40305aa9fd27451e32e5
Secunia Security Advisory 41423
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for sudo. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, fedora
MD5 | 0861d8b607b426fdbd9ed6c88c74a9da
Secunia Security Advisory 41406
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Kingsoft Office 2010, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | ee8f4550a0852c4fdc17a52f73368309
Secunia Security Advisory 41358
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for cvsnt. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
systems | linux, debian
MD5 | 87155894096e8c6dcba6757c2c883f82
Secunia Security Advisory 41345
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in CVSNT, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
MD5 | f13169e3ebd6f1febf5f9602b2e64f36
Secunia Security Advisory 41399
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Internet Information Services, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 537e7c76f7d5bbf35cba447dfd4302e1
Secunia Security Advisory 41414
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in ALShow, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 0cee66c554a75f144608efb3fd9c749d
Secunia Security Advisory 41431
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Valentin Hoebel has reported some vulnerabilities in PaysiteReviewCMS, which can be exploited by malicious people to conduct cross-site scripting vulnerabilities.

tags | advisory, vulnerability, xss
MD5 | e4e60954bb4560d44f4422a735e38c27
Secunia Security Advisory 41447
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
systems | linux, ubuntu
MD5 | b1a41e159c28e2eb20aafa4f92d8448f
Secunia Security Advisory 41448
Posted Sep 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in ALZip, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 339dddd32bbfb3cfdb35231e14f41bb5
MailEnable SMTP Service Denial Of Service
Posted Sep 14, 2010
Authored by Dmitriy Pletnev | Site secunia.com

Secunia Research has discovered two vulnerabilities in MailEnable, which can be exploited by malicious people to cause a DoS (Denial of Service). An insufficient length check when appending data to a predefined log message into a buffer using strcat_s() may result in an unhandled invalid parameter error. This can be exploited to crash the SMTP service (MESMTPC.exe) via an overly long email address in the "MAIL FROM" command. An insufficient length check when copying data with a predefined log message into a buffer using strcpy_s() may result in an unhandled invalid parameter error. This can be exploited to crash the SMTP service (MESMTPC.exe) via an overly long domain name in the "RCPT TO" command.

tags | advisory, denial of service, vulnerability
advisories | CVE-2010-2580
MD5 | cad594361fd9da95cb143c0c13ce28c9
Page 1 of 3
Back123Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    15 Files
  • 19
    Oct 19th
    10 Files
  • 20
    Oct 20th
    7 Files
  • 21
    Oct 21st
    4 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close