what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 46 of 46 RSS Feed

Files Date: 2009-12-03 to 2009-12-04

Secunia Security Advisory 37569
Posted Dec 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for openldap. This fixes a vulnerability, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
systems | linux, debian
SHA-256 | 926c2c9ba8d2a91a77de061f254885566dd7c848af998eddb58d9b85979ce5a0
Secunia Security Advisory 37573
Posted Dec 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in the Taxonomy Timer module for Drupal, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 5f8f6956a01aabd39263db9908e4ebd8d6c7f5752ca293ee3e19c7e9400e8757
Secunia Security Advisory 37521
Posted Dec 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for the kernel. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), potentially gain escalated privileges, disclose potentially sensitive information, and disclose certain system information, and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, suse
SHA-256 | 776dfa6f4f7a6d3e5ea90e61e886c7b89148d54c278b61671662e332545aaacc
Secunia Security Advisory 37484
Posted Dec 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Cacti, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 76f1d903fdcf3cdb6b6b7759ee9425425e43481793f5563f8fdf249ab026c610
Secunia Security Advisory 37528
Posted Dec 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to poison the DNS cache.

tags | advisory
systems | linux, slackware
SHA-256 | 6b832c31ba4d955da1f78c3bbbe5a3227c63db50ca4a8af1c1edad1537baba3f
Secunia Security Advisory 37563
Posted Dec 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - pyrokinesis has discovered a vulnerability in Adobe Illustrator, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 23281e46323ffb5c7a356919d91473fa2ee26a0c452c3411464b42109144490b
Secunia Security Advisory 37544
Posted Dec 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - FreeBSD has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data.

tags | advisory
systems | freebsd
SHA-256 | e7f78cff2acc6f1e8bb0d33420fa68e1a84d3e6b5fc132e9c506da6036bcd4bf
Secunia Security Advisory 37571
Posted Dec 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - pedamachephepto liones has discovered a vulnerability in Xfig, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 8db7806136e88a5e37a25e16508510555402bbf09305b4a454f55bfe069b1557
Secunia Security Advisory 37508
Posted Dec 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in the Kide Shoutbox component for Joomla, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | a0f92ed9e6898b977f655c547d80bf765a8bc6295c58fe3260a718dcf0274c6f
Secunia Security Advisory 37577
Posted Dec 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - pedamachephepto liones has reported a vulnerability in transfig, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | e89e80a39d92d6e882405eebd53598b3fe2492078b2cdb9a73fc4e3b2ecec267
Secunia Security Advisory 37538
Posted Dec 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for libsndfile. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
systems | linux, fedora
SHA-256 | 25e0ad5b26dfac89d9fbe65e46ab71da89f8ddb6f98b6c70ed2487b796d4d460
Secunia Security Advisory 37539
Posted Dec 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for wget. This fixes a vulnerability, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
systems | linux, fedora
SHA-256 | a4cb187bed4e4b5ff36fd3938f81b839b3a479c10af33f21b5aa32074cc270bc
Secunia Security Advisory 37527
Posted Dec 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Golden FTP Server, which can be exploited by malicious users to delete arbitrary files.

tags | advisory, arbitrary
SHA-256 | f26188b4ec13b634c6847ab48dc8dd3a2673683c982b5eeaed8b2d254346c97d
Secunia Security Advisory 37575
Posted Dec 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in FreeBSD, which can be exploited by malicious, local users to disclose potentially sensitive information.

tags | advisory, local
systems | freebsd
SHA-256 | ce785ed11d72d014f6af56960bf3c3c8a55996d859c32122172687327490da56
Mandriva Linux Security Advisory 2009-121
Posted Dec 3, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-121 - Multiple security vulnerabilities has been identified and fixed in Little cms. This update provides fixes for these issues. Packages for 2008.0 are being provided due to extended support for Corporate products.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2009-0581, CVE-2009-0723, CVE-2009-0733, CVE-2009-0793
SHA-256 | b1c96bf179cf7611ccb91e5558988d8123f8e22c2f03322a9e4e4aa0b1473f0c
You Sh0t The Sheriff Call For Papers
Posted Dec 3, 2009
Site ysts.org

The 4th edition of YSTS (You Shot The Sheriff) has announced its call for papers. It will be held in Sao Paulo, Brazil on May 17th, 2010.

tags | paper, conference
SHA-256 | caf96b5a8219c279c09a1c4e4dcd1c6150aa618c75fe16bc7116bd17098f04ae
Roxio Creator Image Rendering Integer Overflow
Posted Dec 3, 2009
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered a vulnerability in Roxio Creator, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused by an integer overflow error when allocating memory for an image based on its dimensions and can be exploited to corrupt memory via a specially crafted image. Successful exploitation may allow execution of arbitrary code. The vulnerability is confirmed in version 9.0.136. Other versions may also be affected.

tags | advisory, overflow, arbitrary
advisories | CVE-2009-1566
SHA-256 | aa1d7d38b3ac656754502464027ad8686c281e6dfc986744e5ee5e409c0baf60
Lateral Arts Uploader ActiveX Control Buffer Overflow
Posted Dec 3, 2009
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered a vulnerability in Lateral Arts Photobox uploader ActiveX Control, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by a boundary error when parsing URLs. This can be exploited to cause a stack-based buffer overflow via an overly long string assigned to a number of properties (e.g. "LogURL", "ConnectURL", "SkinURL", "AlbumCreateURL", "ErrorURL", and "httpsinglehost"). Successful exploitation allows execution of arbitrary code when a user e.g. visits a malicious website. The vulnerability is confirmed in version 2.2.0.6. Other versions may also be affected.

tags | advisory, overflow, arbitrary, activex
advisories | CVE-2009-1567
SHA-256 | 9d8d86dda126c1b780b660c3791afd6754a9098c7af3833b073cd5be307b80be
phpMyFAQ 2.5.4 Cross Site Scripting
Posted Dec 3, 2009
Authored by Amol Naik

phpMyFAQ versions 2.5.4 and below suffer from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 295a8c687d620a3ce6e91c5619c7fe37d66845b84f36c8dcaa9295aa53062b3e
Simple Machines Forum XSS / XSRF / PHP Execution
Posted Dec 3, 2009
Site labs.elhacker.net

Simple Machines Forum versions 2.0 RC2 and 1.1.10 suffer from cross site scripting, cross site request forgery, denial of service and php code execution vulnerabilities.

tags | exploit, denial of service, php, vulnerability, code execution, xss, info disclosure, csrf
SHA-256 | dc399eba49f54dd6f2251d0c6f6a1b3af3253b558ce38b4dd2bf245a086d7853
TEKUVA Authentication Bypass
Posted Dec 3, 2009
Authored by iqlusion

TEKUVA suffers from an authentication bypass vulnerability in its password reminder functionality.

tags | exploit, bypass
SHA-256 | bcacfe67ee6ba96a076dd2ff0f4277747c97a41903556184d9c01870fc63de6f
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close