Exploit the possiblities
Showing 1 - 25 of 30 RSS Feed

Files Date: 2012-08-02

Ubuntu Security Notice USN-1522-1
Posted Aug 2, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1522-1 - It was discovered that QEMU incorrectly handled temporary files when creating a snapshot. A local attacker could use this flaw to possibly overwrite files with root privilege, or obtain sensitive information from the guest.

tags | advisory, local, root
systems | linux, ubuntu
advisories | CVE-2012-2652
MD5 | 086aa75ce2840b40bb4d1f0c3247c740
Secunia Security Advisory 50140
Posted Aug 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Citrix Access Gateway, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, and conduct spoofing attacks.

tags | advisory, spoof, vulnerability
MD5 | 1725ad614372eb9ff53a61545fbb57fc
Secunia Security Advisory 50127
Posted Aug 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Mahara, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 7afbaac2f20dee25305258ad2d78a889
Secunia Security Advisory 50142
Posted Aug 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in LibreOffice, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 0fc7ba9a40f88e254f5a7c543a9b9f79
Secunia Security Advisory 50044
Posted Aug 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Opera, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system.

tags | advisory, vulnerability, xss
MD5 | a15aeca3a4699e4f7a2045281c70903d
Secunia Security Advisory 50134
Posted Aug 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - OpenVZ has issued an update for the kernel. This fixes multiple vulnerabilities, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local, vulnerability
MD5 | 6358ba5a170d40ad71016ab6236fa41e
Secunia Security Advisory 50120
Posted Aug 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Monthly Archive by Node Type module for Drupal, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 236a40da96a324285e0b06b627b64524
Secunia Security Advisory 50123
Posted Aug 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for isc-dhcp. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, debian
MD5 | 729e7f1a5bec4f6b0382864b53befe16
Secunia Security Advisory 50146
Posted Aug 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for libreoffice. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
MD5 | a72e05c6a8044ecb18bdc904bdb0fe59
Secunia Security Advisory 50097
Posted Aug 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged multiple vulnerabilities in OpenSSL included in AIX and Virtual I/O Server, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | aix
MD5 | 5e8c1ea7d99bfda641faf62ca9bcdcaf
Secunia Security Advisory 50086
Posted Aug 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in bind-dyndb-ldap, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 6ae5e48bf21b1ffb0e536dbb47b1099a
Secunia Security Advisory 50125
Posted Aug 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness and a vulnerability have been reported in IBM Tivoli Directory Integrator, which can be exploited by malicious people to conduct spoofing and cross-site scripting attacks.

tags | advisory, spoof, xss
MD5 | 54b72832a9f6a7287d609498d2372aa5
Secunia Security Advisory 50149
Posted Aug 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for libpng14. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, suse
MD5 | 2c7897e50be68b647b801a3ceccb86d3
Secunia Security Advisory 50154
Posted Aug 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Joomgalaxy component for Joomla!, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | f4c823d6da4cf15c3bfa0d13d0d3f47b
Secunia Security Advisory 49792
Posted Aug 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Georgi Geshev has discovered a vulnerability in Novell Remote Manager, which can be exploited by malicious people to cause a DoS (Denial of Service)

tags | advisory, remote, denial of service
MD5 | 48810906565c4b2f687c03d02028bcd1
Secunia Security Advisory 50100
Posted Aug 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in the G-Lock Double Opt-in Manager plugin for WordPress, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory, vulnerability
MD5 | 4a85b959e8691c2e7207bb8b68578848
Secunia Security Advisory 50107
Posted Aug 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue and a vulnerability have been reported in BreakingPoint Storm CTM, which can be exploited by malicious people to disclose certain sensitive information.

tags | advisory
MD5 | eb3b9935ee062bc83a555f35e48c4c51
Secunia Security Advisory 50156
Posted Aug 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for openoffice.org. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
MD5 | d2d4aa507816dec81987e5f3107b0586
Secunia Security Advisory 50152
Posted Aug 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - GBS has acknowledged a vulnerability in multiple iQ.Suite products, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

tags | advisory, denial of service
MD5 | 4406ae9998b511447175f8010fff6318
Secunia Security Advisory 50132
Posted Aug 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for qemu-kvm. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, ubuntu
MD5 | deead7fa9a13413ccf38023ffb3874f2
Packet Fence 3.5.0
Posted Aug 2, 2012
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: This major release focuses on new features and enhancements. It adds a remediation module for SourceFire 3D, the ability to have different captive portals depending on the SSID you connect to, a new Web-based configuration tool which eases the installation and configuration process of a new PacketFence installation, and complete Suricata support.
tags | tool, remote
systems | unix
MD5 | 6a37889c02072ccc8a6fb731191bc477
Mandriva Linux Security Advisory 2012-121
Posted Aug 2, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-121 - A Heap-based buffer overflow was found in the way libjpeg-turbo decompressed certain corrupt JPEG images in which the component count was erroneously set to a large value. An attacker could create a specially-crafted JPEG image that, when opened, could cause an application using libpng to crash or, possibly, execute arbitrary code with the privileges of the user running the application. The updated packages have been patched to correct this issue.

tags | advisory, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2012-2806
MD5 | 8b4d81ef0fc31ed3e0bd518a0fc7d05a
Barracuda EMail Security 2.0.2 Filter Bypass / XSS
Posted Aug 2, 2012
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

Barracuda EMail Security version 2.0.2 suffers from filter bypass and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 1f1f36c8ab68033a7727a488715a3ca0
Joomla Joomgalaxy 1.2.0.4 Shell Upload / SQL Injection
Posted Aug 2, 2012
Authored by Daniel Barragan

Joomla Joomgalaxy component version 1.2.0.4 suffers from remote shell upload and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, vulnerability, sql injection
MD5 | 40f1d4f8234acfc5af5618ce2c192067
Drupal Monthly Archive By Node Type 6.x Access Bypass
Posted Aug 2, 2012
Authored by M Yaddoshi | Site drupal.org

Drupal Monthly Archive by Node Type third party module version 6.x suffers from an access bypass vulnerability.

tags | advisory, bypass
MD5 | 4288565c7ab7a6f83fa7bf5a234c2f5d
Page 1 of 2
Back12Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close