accept no compromises
Showing 1 - 25 of 800 RSS Feed

Files Date: 2011-06-01 to 2011-06-30

Valve Steam Client Application v1559/1559 Local Privilege Escalation
Posted Jun 29, 2011
Authored by LiquidWorm | Site zeroscience.mk

Valve Steam Client Application version 1.0.968.628 is vulnerable to an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice.

tags | exploit
MD5 | a520359ea1a44ddeefdb6d50fcde3fdb
Apple Security Advisory 2011-06-28
Posted Jun 29, 2011
Authored by Apple | Site apple.com

Apple Security Advisory 2011-06-28-1 - Multiple vulnerabilities exist in Java 1.6.0_24, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user. These issues are addressed by updating to Java version 1.6.0_26.

tags | advisory, java, web, arbitrary, vulnerability, code execution
systems | apple
advisories | CVE-2011-0802, CVE-2011-0814, CVE-2011-0862, CVE-2011-0863, CVE-2011-0864, CVE-2011-0865, CVE-2011-0867, CVE-2011-0868, CVE-2011-0869, CVE-2011-0871, CVE-2011-0873
MD5 | 06451743e7bba659d645d05af3734473
Novell ZenWorks Handheld Management 7.0.2.61213 Directory Traversal
Posted Jun 29, 2011
Authored by Luigi Auriemma | Site aluigi.org

Novell ZenWorks Handheld Management versions 7.0.2.61213 and below suffer from an upload directory traversal vulnerability.

tags | exploit, file inclusion
systems | linux
MD5 | 0833ad496b024e36a168c3a96ae4f138
Sybase Advantage Server 10.0.0.3 Off-By-One
Posted Jun 29, 2011
Authored by Luigi Auriemma | Site aluigi.org

Sybase Advantage Server versions 10.0.0.3 and below suffer from an off-by-one vulnerability.

tags | exploit
systems | linux
MD5 | 2b84c2c12f3feedb589305529fed813e
Secunia Security Advisory 44890
Posted Jun 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in RSLinx, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | ad31967bc7be57fbcd3c1d038d0524bc
Secunia Security Advisory 45108
Posted Jun 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in ALZip, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | ba9d5fe6be08feff0e841223238348c6
Secunia Security Advisory 45102
Posted Jun 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered multiple vulnerabilities in FlatPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | a918acbc7001793ecc46daf7436682d7
Secunia Security Advisory 45097
Posted Jun 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Google Chrome where some have unknown impacts and others can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 20d5e0f09d01af09c4b6ce60f8216c02
Secunia Security Advisory 45095
Posted Jun 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for Xen. This fixes a vulnerability, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, suse
MD5 | d4cd7aec083fdaafa4d045e6d36dd771
Secunia Security Advisory 45101
Posted Jun 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in Ashampoo 3D CAD Professional, which can be exploited by malicious people to manipulate certain data and compromise a user's system.

tags | advisory
MD5 | 41a263af9fd89103195d561e9bb6a049
Secunia Security Advisory 45110
Posted Jun 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for ruby. This fixes a security issue and two vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability, ruby
systems | linux, redhat
MD5 | 4e118655722551cb1fda78369a7d93c7
Secunia Security Advisory 45100
Posted Jun 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | 4f8da8cf766e9469358be8f09cca3962
Secunia Security Advisory 45109
Posted Jun 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for ruby. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, manipulate certain data, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability, xss, ruby
systems | linux, redhat
MD5 | f65097c7250fa5cc46c81e93ff2cb603
Secunia Security Advisory 45096
Posted Jun 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for ruby. This fixes a weakness and multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, manipulate certain data, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability, xss, ruby
systems | linux, redhat
MD5 | 487e0cb897a8d60b9b2fa0e54373e428
Secunia Security Advisory 45084
Posted Jun 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Apple has issued an update for Java for Mac OS X. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability
systems | apple, osx
MD5 | 75084afde3a2159de76fc60cce559497
Secunia Security Advisory 45028
Posted Jun 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in Winamp Essentials Pack, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
MD5 | 64cda671d4bd395badc8b65f4e60e14e
Secunia Security Advisory 45111
Posted Jun 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Plone, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
MD5 | 1bab1807df0c2ed996625e642082f1ff
Secunia Security Advisory 45056
Posted Jun 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Zope, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
MD5 | ce8358e480a3c71a5e2ff7d08cabd4f6
Secunia Security Advisory 45068
Posted Jun 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in Sybase Adaptive Server Enterprise, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service
MD5 | fe399a8da40e19c7f93ef9e2541328d2
Secunia Security Advisory 45060
Posted Jun 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Opera, where one has an unknown impact and the other can be exploited by malicious people to bypass certain security features.

tags | advisory, vulnerability
MD5 | 07afabc8e51b6577f25fd4f764be79f0
Secunia Security Advisory 45105
Posted Jun 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Accela / eAccela BizSearch, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 7cf77087de16a03961d26f89634ebf1e
Secunia Security Advisory 45075
Posted Jun 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for libgssglue. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, suse
MD5 | 52662cfdb4f0a88ef123d5ccc0819f60
Secunia Security Advisory 45094
Posted Jun 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Joomla!, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, and bypass certain security restrictions.

tags | advisory, vulnerability, xss
MD5 | df9ec03f47846291bb7da48dd12fb50e
Stunnel SSL Wrapper 4.38
Posted Jun 29, 2011
Authored by Michal Trojnara | Site stunnel.org

Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code.

Changes: Server Name Indication (SNI) TLS extension support was implemented for name-based virtual servers. Stunnel can now switch service section on the fly, based on the destination host name included in the Client Hello message. Numerous fixes were also added for bugs introduced in previous, experimental versions.
tags | arbitrary, encryption, tcp, imap, protocol
systems | windows, unix
MD5 | de5c0478303da746f946d9c112fa7f4b
Asterisk Project Security Advisory - AST-2011-011
Posted Jun 29, 2011
Authored by Terry Wilson | Site asterisk.org

Asterisk Project Security Advisory - Asterisk may respond differently to SIP requests from an invalid SIP user than it does to a user configured on the system, even when the alwaysauthreject option is set in the configuration. This can leak information about what SIP users are valid on the Asterisk system.

tags | advisory
advisories | CVE-2011-2536
MD5 | 1fb6a919290d6c332efc9acc3f315413
Page 1 of 32
Back12345Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    23 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close