exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 60 RSS Feed

Files Date: 2010-10-15

Secunia Security Advisory 41800
Posted Oct 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged some vulnerabilities in Sun Solaris, which can potentially be exploited by malicious people to cause a DoS (Denial of Service) and compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | solaris
SHA-256 | 9f8963e6f30069e3dc240989ff6f2aafb311624e165f001508b9c12cfd3b06d5
Secunia Security Advisory 41875
Posted Oct 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged some vulnerabilities in Sun Solaris, which can be exploited by malicious users and malicious people to manipulate certain data and by malicious people to disclose certain system information and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | solaris
SHA-256 | 53733e3c270ceae124bed0a73e452196798453c264dd2992f6c09f170067b824
Secunia Security Advisory 41876
Posted Oct 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged some vulnerabilities in Sun Solaris, which can potentially be exploited by malicious people to cause a DoS (Denial of Service) and compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | solaris
SHA-256 | 220ba0058b06fe9fd64e073c9d25692f4581df5377b3f0fb75d706687fe77e15
Secunia Security Advisory 41793
Posted Oct 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for poppler. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | 7ba246960416d03098dd745749a7b0616fa0e3ff6737045dd8223f5b057f2743
Secunia Security Advisory 41838
Posted Oct 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Sun PDF Import Extension for OpenOffice.org / Oracle Open Office, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | 0e153031530dc90410733005fdfea0e3344db29ca02976d223422d7c89dd5263
Secunia Security Advisory 41859
Posted Oct 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in FTPShell Client, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 2ca4254335e05af2c17c260f28c272c23e6269d645e8de09a95c1408a5b21df5
Secunia Security Advisory 41807
Posted Oct 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for gnome-subtitles. This fixes a security issue, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, fedora
SHA-256 | ab871616474b2fdd4ff692ab9a2ca2d5a40224d7d965d93f2748f1c9aec0d448
Secunia Security Advisory 41754
Posted Oct 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Gnome Subtitles, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 93498c1e0fe2a3db6e890e2a2dfe774d0b61e7bc7d83bdf967b811a9352c47b9
Secunia Security Advisory 41862
Posted Oct 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in LeapFTP, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 95625d39f035fe971f3f7027d731d68d64373d082d245b9d9ffbfc379ab27e3d
Secunia Security Advisory 41843
Posted Oct 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in MEO Encryption Software, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 5dadd0953741d704631e0c27c3f96cc69a0a131990349018da4b2318e96de8ff
Secunia Security Advisory 41850
Posted Oct 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in XacRett, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | db8b5c17b6fa16d81c016544289b5a52aacaed3ace4692efe15654cd4d347647
Secunia Security Advisory 41872
Posted Oct 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for ardour. This fixes a security issue, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, fedora
SHA-256 | 9b30cd65fe3baeb2841a961c215b7dd5061746e5012bf80fd1d1c1b4f510a1f1
Secunia Security Advisory 41713
Posted Oct 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Felipe Aragon has reported a vulnerability in Visual Synapse HTTP Server, which can be exploited by malicious people to disclose sensitive information.

tags | advisory, web
SHA-256 | 9ec2f706a7e87be2ee851f4d67d9387bb62b3793c066277da25b3bae16c3fc34
Secunia Security Advisory 41868
Posted Oct 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged a weakness in Sun Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | solaris
SHA-256 | 7c8fd6228652069cb45364bf248a62a2f4a565a81864c76f141b7d5aa6a846a4
Secunia Security Advisory 41845
Posted Oct 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in STDU Explorer, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | f942889d8fb0b45a0e9931615b333c71e5bccb8b3d0b2a3986d37aaba652b4e5
Secunia Security Advisory 41861
Posted Oct 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Gekko Manager, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | ad6ac63537f4e7283bbb8de32ab04ac8360b143b84757b7a672810e60714f6e4
Secunia Security Advisory 41866
Posted Oct 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in K2Editor, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | eafb3cf04ea91e73831a8570c3be131009ada60253d4909a6b7f447ea22ee3d0
Secunia Security Advisory 41820
Posted Oct 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in Ettercap, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
SHA-256 | 7a52a36ad5f213ba55ec732ebfb01c0394141f8b2c5213437f12ceb44d8672f4
Oracle Database CREATE_CHANGE_SET SQL Injection
Posted Oct 15, 2010
Authored by Esteban Martinez Fayo | Site appsecinc.com

Team SHATTER Security Advisory - Oracle Database provides the DBMS_CDC_PUBLISH PL/SQL package owned by SYS that is part of the Change Data Capture component. This package has a SQL Injection vulnerability in CREATE_CHANGE_SET procedure. A malicious user can call the vulnerable procedure of this package with specially crafted parameters and execute SQL statements with the elevated privileges of the SYS user.

tags | advisory, sql injection
advisories | CVE-2010-2415
SHA-256 | a4826476bad8dd89e0725984586be712f1bfa2620f4faad2b0e241fb72a4af3a
Technical Cyber Security Alert 2010-287A
Posted Oct 15, 2010
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2010-287A - The Oracle products and components listed above are affected by multiple vulnerabilities. The impacts of these vulnerabilities include remote execution of arbitrary code, information disclosure, and denial of service.

tags | advisory, remote, denial of service, arbitrary, vulnerability, info disclosure
SHA-256 | 4653063038b657b44064ccba3a0917c5150ecfd9e3e6a2061783aaeefd712519
STDU Explorer DLL Hijacking
Posted Oct 15, 2010
Authored by anT!-Tr0J4n

STDU Explorer DLL hijacking exploit that leverages dwmapi.dll.

tags | exploit
SHA-256 | 5808633f97576a12a6abaf94de3656f7cc765c120fb34881085da8418d551872
Mandriva Linux Security Advisory 2010-204
Posted Oct 15, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-204 - The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in Avahi 0.6.16 and 0.6.25 allows remote attackers to cause a denial of service via a DNS packet with an invalid checksum followed by a DNS packet with a valid checksum, a different vulnerability than CVE-2008-5081.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2010-2244
SHA-256 | e9aed73886bba232f98bd3ff83da8f9955f3de8217fede33e8b29d6545a0c120
MEO DLL Hijacking
Posted Oct 15, 2010
Authored by anT!-Tr0J4n

MEO DLL hijacking exploit that leverages dwmapi.dll.

tags | exploit
SHA-256 | 8d0ef7b8a5420681a2e7932033c0101571625cfea5d68325f828d6b3afe996d7
Core Security Technologies Advisory 2010.0517
Posted Oct 15, 2010
Authored by Core Security Technologies | Site coresecurity.com

Core Security Technologies Advisory - Microsoft Windows is prone to a memory corruption vulnerability when instantiating the 'HtmlDlgHelper Class Object' in a Microsoft Office Document (ie: .XLS, .DOC). The affected vulnerable module is part of Internet Explorer ('mshtmled.dll'). This vulnerability could be used by a remote attacker to execute arbitrary code with the privileges of the user that opened the malicious file.

tags | exploit, remote, arbitrary
systems | windows
advisories | CVE-2010-3329
SHA-256 | bb59f66cda31716061e9c2463f85b59f48bb279fd9de23460eb3a002793bbf7c
ShmooCon VII Call For Papers 2011
Posted Oct 15, 2010
Site shmoocon.org

Call For Papers for ShmooCon VII. This conference will be held January 28th through the 30th, 2011.

tags | paper, conference
SHA-256 | 2412669a39743a92c26ed5c6339902bea978d5ac8881958f4480e1edfcc48ec4
Page 1 of 3
Back123Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close