exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 43 of 43 RSS Feed

Files Date: 2008-04-18 to 2008-04-19

Gentoo Linux Security Advisory 200804-19
Posted Apr 18, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200804-19 - Toni Arnold, David Sveningsson, Michal Bartoszkiewicz, and Joseph reported that php-select does not quote parameters passed to the tr command, which could convert the -D PHP5 argument in the APACHE2_OPTS setting in the file /etc/conf.d/apache2 to lower case. Versions less than 1.0.1 are affected.

tags | advisory, php
systems | linux, gentoo
advisories | CVE-2008-1734
SHA-256 | 22f8f552c798b750cc3082c56ab99bb2707728441379e1de966626ca5cd008d6
Secunia Security Advisory 29787
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Mozilla Firefox, which can potentially be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 64f389bd4f3256ca5b08d06b494b2c16eb94ebb86e4d91a2f1e2c3c3fda1ffa6
Secunia Security Advisory 29790
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in eGroupWare, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 5e31376ecc9815ff8ad255a409274bcf1d1c830d7a6bd5ed1a97fb8492f97d66
Secunia Security Advisory 29793
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for firefox. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, redhat
SHA-256 | c816f61800032b38ac996e27f693de5074ce9ae38959a651c0fc49d06e07adc5
Secunia Security Advisory 29820
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Security Assurance Team of the National Australia Bank have reported a vulnerability in the Jom Comment component for Joomla!, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | e15aeec9a6d221268ff6624fe0d4ab5a42051b9aa455acb465f791eaca3b2707
Secunia Security Advisory 29822
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Cisco Network Admission Control (NAC), which can be exploited by malicious people to disclose sensitive information.

tags | advisory
systems | cisco
SHA-256 | 9e2f8104729b1509c72d31e90dc28350bd3eefbe7314ab2584fb0ef4fe06cd99
Secunia Security Advisory 29828
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for seamonkey. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, redhat
SHA-256 | a488f13e3cb0ea157f6b319d827ed8feda8445ea9841854ad58fb89594d52406
Secunia Security Advisory 29837
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in various CA products, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 75e3002f507a7c6e0d235bf826b808812daa6cd63e0ed39d3926452b3cac30a6
Secunia Security Advisory 29839
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for gallery2. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, fedora
SHA-256 | 32509f95d723e89875a0c4fec4d80fe42a7875782e0eeca8b7a248fe76a42987
Secunia Security Advisory 29840
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - cO2 has discovered a vulnerability in AutoTutorials, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 6099901449c41c8b01a53127cd79e89c3ae6e5649bcfffcc189d4528de2725ea
Secunia Security Advisory 29841
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in BEA JRockit, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), or compromise a user's system.

tags | advisory, denial of service, vulnerability
SHA-256 | 4bda00aca19267c53ea48d3804d06443526cc2dcce6af49751bac35554f77cdf
Secunia Security Advisory 29845
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for libfishsound. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, fedora
SHA-256 | 42d71eec3d740e39ea9361b5e92143cf508a71db42262379944ac77327f07cd6
Secunia Security Advisory 29846
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Safari, which can be exploited by malicious people to conduct cross-site scripting attacks or potentially to compromise a user's system.

tags | advisory, vulnerability, xss
SHA-256 | 9db1c1752b53fb037c3880fdae45d5005eea22d10c94da95015f842ab4a9a89e
Secunia Security Advisory 29849
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HP has acknowledged some vulnerabilities in OpenView Network Node Manager, which can be exploited by malicious people to conduct cross-site scripting attacks, cause a DoS (Denial of Service), or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability, xss
SHA-256 | afc361ed9d524fdeba21f35fe9ca65b498b5c43f2a2a5aaf4a342e092b76a4ed
Secunia Security Advisory 29852
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in OpenOffice, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 0014fa74f9a73315059523e75c88da154ca3ae2a3ed8ce00ba76bf8716c5eb4e
Secunia Security Advisory 29860
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Mozilla SeaMonkey, which can potentially be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | d8e72e8618f7e022091df2859dc599ac1f6c4220f17a2c618f0740622386b86e
Secunia Security Advisory 29862
Posted Apr 18, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for nagios and nagios-plugins. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, fedora
SHA-256 | cb3d5ae07808dd5bb8863e0b3d4240efedb6bf38c09053fabf1240f7f2e5a5b8
D1T2_-_Meling_Mudin_and_Lee_Chin_Sheng_-_Defensive_Network_Security.pdf
Posted Apr 18, 2008
Authored by Meling Mudin, Lee Chin Shing | Site conference.hitb.org

Defensive Network Security: Practical Methodologies - Emerging computer and network security threats have greatly changed the landscape of the security security scene. These new, advanced and unknown threats and attack methodologies have rendered traditional perimeter security devices such as firewall and IDS/IPS useless. However, the concept of Network Security Monitoring (NSM) has not make these devices obsolete - instead IDS/IPS and firewall device have become one of the essential parts of NSM.

SHA-256 | d6efb6ecc881241878e69a397336c5b9d70ab7e0b3978a23dafa738ad831a18b
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close