exploit the possibilities
Showing 1 - 25 of 47 RSS Feed

Files Date: 2012-09-28

Mandriva Linux Security Advisory 2012-155
Posted Sep 28, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-155 - builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1. The updated packages have been patched to correct this issue.

tags | advisory, remote
systems | linux, mandriva
advisories | CVE-2012-0862
MD5 | 8a064db68e05e8e45fda8c562f5cd968
Mandriva Linux Security Advisory 2012-154
Posted Sep 28, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-154 - Multiple vulnerabilities has been found and corrected in apache. Insecure handling of LD_LIBRARY_PATH was found that could lead to the current working directory to be searched for DSOs. This could allow a local user to execute code as root if an administrator runs apachectl from an untrusted directory. Possible XSS for sites which use mod_negotiation and allow untrusted uploads to locations which have MultiViews enabled. The updated packages have been upgraded to the latest 2.2.23 version which is not vulnerable to these issues.

tags | advisory, local, root, vulnerability
systems | linux, mandriva
advisories | CVE-2012-0883, CVE-2012-2687
MD5 | 731a861d001a0454d5e8c82185e5c2dd
Gentoo Linux Security Advisory 201209-24
Posted Sep 28, 2012
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201209-24 - Multiple vulnerabilities have been found in PostgreSQL which may allow a remote attacker to conduct several attacks. Versions less than 9.1.5 are affected.

tags | advisory, remote, vulnerability
systems | linux, gentoo
advisories | CVE-2012-0866, CVE-2012-0867, CVE-2012-0868, CVE-2012-2143, CVE-2012-2655, CVE-2012-3488, CVE-2012-3489
MD5 | b413793adf8cac8b1de5c98182898751
Ubuntu Security Notice USN-1551-2
Posted Sep 28, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1551-2 - USN-1551-1 fixed vulnerabilities in Thunderbird. The new package caused a regression in the message editor and certain performance regressions as well. This update fixes the problems.

tags | advisory, vulnerability
systems | linux, ubuntu
advisories | CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964, CVE-2012-1956, CVE-2012-3966, CVE-2012-3970, CVE-2012-3971, CVE-2012-3972, CVE-2012-3975, CVE-2012-3978, CVE-2012-3980
MD5 | 7e2ba174ec10c01fce0c731b332c6252
Gentoo Linux Security Advisory 201209-23
Posted Sep 28, 2012
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201209-23 - Multiple vulnerabilities have been found in GIMP, the worst of which allow execution of arbitrary code or Denial of Service. Versions less than 2.6.12-r2 are affected.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2009-1570, CVE-2009-3909, CVE-2010-4540, CVE-2010-4541, CVE-2010-4542, CVE-2010-4543, CVE-2011-1178, CVE-2011-2896, CVE-2012-2763, CVE-2012-3402
MD5 | a8b821baaae77956824d436955c1f75e
Gentoo Linux Security Advisory 201209-22
Posted Sep 28, 2012
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201209-22 - A vulnerability in libgssglue may allow a local attacker to gain escalated privileges. Versions less than 0.4 are affected.

tags | advisory, local
systems | linux, gentoo
advisories | CVE-2011-2709
MD5 | 42f3f370cd7e4f8c2961594d4ea21394
Gentoo Linux Security Advisory 201209-21
Posted Sep 28, 2012
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201209-21 - Two directory traversal vulnerabilities have been found in fastjar, allowing remote attackers to create or overwrite arbitrary files. Versions less than 0.98-r1 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2010-0831, CVE-2010-2322
MD5 | f3fcba12a1f880bfee0deaa1a7fa0d8f
360-FAAR Firewall Analysis Audit And Repair 0.3.1
Posted Sep 28, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release cleans up the output in the new columns, so that specific VPN policy and object negation usage is easier to see. The VPN rules marked "Any", which are all rules in the rule base not marked with a specific VPN, that pass traffic that can be tunnelled via a route based VPN after dropping out of the policy, are no longer printed. Object's not negated in the policy (marked negation: "no") are also removed from the new columns for clarity. The Cisco ASA/PIX reader has been upgraded so that it prints more user friendly info during the config read ('safe' warnings are now printed as info) and handles rules using protocol groups far better than before. The cisco config reader now also reads negated source and dest services and excludes rules using these from the "rr" mode rulebase builds as well as reading rules with logging and no destination port correctly.
tags | tool, perl
systems | unix
MD5 | bcc2532e92580d24bea535fd8dc81345
Secunia Security Advisory 50720
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two security issues have been reported in the Organic groups module for Drupal, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
MD5 | a7f98972f23013bd8d9677c463c3b331
Secunia Security Advisory 50775
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco Unified Communications Manager, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | cisco
MD5 | 0feb91740ee213fb6068d7e21630edff
Secunia Security Advisory 50776
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Catalyst 4500E Series Switch, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 1e9e0953365fd68b9fba9323ec2de2f1
Secunia Security Advisory 50769
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for transmission. This fixes two vulnerabilities, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, vulnerability
systems | linux, ubuntu
MD5 | 4ae1042af81c078f8064554bc7c2c4c1
Secunia Security Advisory 50777
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | cisco
MD5 | 5de82b85eece96e8ef899de7bc9a2907
Secunia Security Advisory 50801
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for emacs23. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, ubuntu
MD5 | 98cd93da6c0ae9451cc9e1c5cf594b59
Secunia Security Advisory 50665
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in OpenStack Keystone, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, vulnerability
MD5 | caa437fb7486073699cdcbf5ca639437
Secunia Security Advisory 50800
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for libxml2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
MD5 | 1b7db6bdc5adfa4a7d557342809ea10b
Secunia Security Advisory 50787
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for mod_rpaf. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) in an application using the module.

tags | advisory, denial of service
systems | linux, gentoo
MD5 | f013723674c7537550cd3ddc6684ca51
Secunia Security Advisory 50700
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for postgresql-server. This fixes a weakness and multiple vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to conduct brute force and spoofing attacks, manipulate certain data, disclose certain sensitive information, and compromise a user's system.

tags | advisory, spoof, vulnerability
systems | linux, gentoo
MD5 | a14d3937dd4dd6968dca784038e535e3
Secunia Security Advisory 50785
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for libgssglue. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, gentoo
MD5 | b14d7371b9ade0812e0a8e9fb26a9544
Secunia Security Advisory 50788
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for nut. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, gentoo
MD5 | 5ae1f76a98256a07ac0156c9047a33c2
Secunia Security Advisory 50786
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for fastjar. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, ubuntu
MD5 | c1537e42dfe9b36115d5c56dffd4c4aa
Secunia Security Advisory 50702
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in openCryptoki, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
MD5 | 379e6cf2eb6bae80bdde76dbd8c9921b
Secunia Security Advisory 50806
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged some vulnerabilities in IBM Rational Synergy, which can be exploited by malicious people to conduct spoofing and cross-site scripting attacks, disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, denial of service, spoof, vulnerability, xss
MD5 | 1e8703f957dda98bdafe6624d0b9168a
Secunia Security Advisory 50762
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in the Multisite Plugin Manager plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 3f3ce7e65f9c9d0a634ab6dc95c789d5
Secunia Security Advisory 50737
Posted Sep 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for gimp. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
MD5 | 92c41f69ccc46e9f20f14e6d442b24c2
Page 1 of 2
Back12Next

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    16 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    7 Files
  • 18
    Jul 18th
    5 Files
  • 19
    Jul 19th
    12 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close