what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 32 of 32 RSS Feed

Files Date: 2011-04-09 to 2011-04-10

Secunia Security Advisory 44069
Posted Apr 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for libvirt. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, suse
SHA-256 | 29c9bf4ae51c72535bad46cf4a5c28e069013ebabe1bdfb1df93592683dc2976
Secunia Security Advisory 44088
Posted Apr 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for rsync. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | ea65157e5ff7111e46019ae0a1c18a876d1cc53b372e65f5a4e8530a9521c346
Secunia Security Advisory 44060
Posted Apr 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for spice-xpi. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
systems | linux, redhat
SHA-256 | f8f680ce20c6cd3a2122b7ec2ca5b48113ab27ecb8e6a6539f8d5001be62b315
Secunia Security Advisory 44076
Posted Apr 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for moonlight. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security features, and potentially compromise a user's system.

tags | advisory, vulnerability
systems | linux, suse
SHA-256 | eb48a3c77d2e2a10bb6050b5042967724d50aa2ae975d6971cb1027b6e6643dd
Secunia Security Advisory 44041
Posted Apr 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hanno Boeck has discovered a vulnerability in phplist, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | cdbe5066d8419beb3f5f4f36997042d0d3e8bc5a0b67afbad40528b7be72d43e
Secunia Security Advisory 44080
Posted Apr 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | windows
SHA-256 | 0c65eb8a8766e3457234a3862c04e873436e890b400d9534506e8af0853a175b
ManageEngine Applications Manager Authenticated Code Execution
Posted Apr 9, 2011
Authored by Jacob Giannantonio | Site metasploit.com

This Metasploit module logs into the Manage Engine Applications Manager to upload a payload to the file system and a batch script that executes the payload.

tags | exploit
SHA-256 | d0de2338e225568fa87b48799b6a4687b89eae9e5646617a2dfba1a017b0dffd
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close