exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 109 of 109 RSS Feed

Files Date: 2008-03-13 to 2008-03-14

Secunia Security Advisory 29331
Posted Mar 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dave Lewis has reported a vulnerability in Adobe LiveCycle Workflow, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 958851828ac193f074dee05c080e1078052a81e5c26fb2eef4e01dae7e29ca3f
Secunia Security Advisory 29332
Posted Mar 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities and a weakness have been reported in Adobe ColdFusion, which can be exploited by malicious people to bypass certain security restrictions and to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | e666a3826ac10939f3e4e7ec21ae4ff30279b68fc00065fcf6f08e95df525a2a
Secunia Security Advisory 29333
Posted Mar 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for icu. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
SHA-256 | f78a16f7c60a05856cf2004f0007622972193ccab79b6f8444ce6142e1374c48
Secunia Security Advisory 29335
Posted Mar 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities and security issues have been reported in IBM WebSphere Application Server, some of which have unknown impacts while others can potentially be exploited by malicious, local users to gain knowledge of sensitive information.

tags | advisory, local, vulnerability
SHA-256 | dce4455186f1348e78928895800aa8e03293001d3b462951d987518a00d4b018
Secunia Security Advisory 29341
Posted Mar 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HP has acknowledged some vulnerabilities in HP-UX, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | hpux
SHA-256 | 5e1ad8da0ad539a8db7c4a588a7900877f94d328bfe6ff0915bfad65853c5884
Secunia Security Advisory 29343
Posted Mar 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Beyond Security has reported a vulnerability in the Net::DNS Perl module, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, perl
SHA-256 | 98b498575967f46463e96de1547be223bc8fb50f18192d8e96fcd4f7c5c1831a
Secunia Security Advisory 29347
Posted Mar 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM AIX, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | aix
SHA-256 | 18fa4a6b4cf0e732d69f6fb9c8a027565b18a6ff732d9a7d5776f9f8b9788281
Secunia Security Advisory 29348
Posted Mar 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for apache. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability, xss
systems | linux, gentoo
SHA-256 | 0b5ba5a677df1f6b001a5fc60d153f2762509c63f23cca61b489c5f0b6ac70fd
Secunia Security Advisory 29354
Posted Mar 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for libnet-dns-perl. This fixes some vulnerabilities, which can be exploited by malicious people to poison the DNS cache or to cause a DoS (Denial of Service).

tags | advisory, denial of service, perl, vulnerability
systems | linux, debian
SHA-256 | 60796c89cdf5a0520c324774b113ac7b07b41eb8a50a1391238c80486394e5cc
Page 5 of 5
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close