exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 54 RSS Feed

Files Date: 2011-07-21 to 2011-07-22

Secunia Security Advisory 45332
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in CA Gateway Security, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 7417c8c8a17cc2cc90bd36e3df78aee5be55370b120cac51523509eb2c6e773c
Secunia Security Advisory 45256
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has reported a vulnerability in Tiki Wiki CMS/Groupware, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 89be8043194bd4fb2d7d71e307dee7e74328ffa84410f0de52bccf6077f926c4
Secunia Security Advisory 45328
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes a weakness and some vulnerabilities, which can be exploited by malicious, local users and malicious, local users in a guest virtual machine to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, redhat
SHA-256 | ecfe6155db7d8a5ef98538e99ab8b15ec9ea671fde5f36be4d973af647c6aa77
Secunia Security Advisory 45325
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness and multiple vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to disclose sensitive information, manipulate certain data, conduct cross-site scripting and spoofing attacks, bypass certain security restrictions, and compromise a user's system.

tags | advisory, spoof, vulnerability, xss
systems | apple
SHA-256 | fa548c60e50529c793852ae4eb435040e9e1ba138ca8a6914a3173389492b3a3
Secunia Security Advisory 45355
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Cisco SA 500 Series Security Appliances, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
systems | cisco
SHA-256 | 8c8c5a093035d911fbbc1321d357f0e61a242a0bc55dcd4faf64da3c411c184e
Secunia Security Advisory 45351
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for libsndfile. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, redhat
SHA-256 | a6570dc152b88028210384d4d8b0d4682e9216406b9f84bcd13b7ae67e3d4a2b
Secunia Security Advisory 45341
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Devel module for Drupal, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 194533d34fae12a75cb0ff802afc653ee60b3252abc318680de54269f1a4e7d1
Secunia Security Advisory 45272
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged a vulnerability in Oracle Fusion Middleware, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 3068fc01a91ee4effa5cf6f682dfff838849dd5215f6be3dd6f37599e3529d5c
Secunia Security Advisory 45202
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sense of Security has reported multiple vulnerabilities in Sun GlassFish Enterprise Server, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks.

tags | advisory, vulnerability, xss
SHA-256 | 4fcdd46a0edb31d5f3c20f637956b935f156698e9f4e71bc404f913962c47320
Secunia Security Advisory 45322
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Oracle PeopleSoft Enterprise Supply Chain Management (SCM), which can be exploited by malicious users to disclose potentially sensitive information and manipulate certain data.

tags | advisory
SHA-256 | cfcaffcecca1f4e8f92c4a2dffcb0d702db1ad19e4144e0a1fda03fa08139b6a
Secunia Security Advisory 45270
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Oracle Application Server, which can be exploited by malicious users to manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 3cc11d439aa5656636cc110ae0ca86139642af43c7d6484e5867b7b7437c4d34
Secunia Security Advisory 45319
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Oracle PeopleSoft Enterprise Financial Management Solutions (FMS), which can be exploited by malicious users to disclose potentially sensitive information and manipulate certain data.

tags | advisory
SHA-256 | 7c4a9ffccb119f0ac32f763ce5d64f536cc57e6d77b1322b70e01b01f330fe36
Secunia Security Advisory 40183
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Abdul-Aziz Hariri has discovered a vulnerability in Oracle Business Intelligence, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 95e350b220f7ff3457526b7227fe52b817dbc71ddfc15d1e08eac299998717ef
Secunia Security Advisory 45329
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in the Flash Magazine Deluxe component for Joomla!, which can be exploited by malicious, local users to manipulate certain data and potentially gain escalated privileges.

tags | advisory, local
SHA-256 | d6706bdedc9b96d2f67523298505f062379522973850c1d9a66b3753d0a7d61b
Secunia Security Advisory 45333
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco 9000 Series Aggregation Services Routers (ASR), which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | cisco
SHA-256 | b4e886c8c9b7bdd89686cdf3000f00785602ae4ffe7a16cfbde8705006214941
Secunia Security Advisory 45283
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in Tiki Wiki CMS/Groupware, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 96304e853e2116ad69b321c3de3a3624b0ae878bc02090d896eeb64aa755f23c
Secunia Security Advisory 45338
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for rsync. This fixes a vulnerability, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
systems | linux, redhat
SHA-256 | 33589929c3c6d4e4f2ceecf24c5c25566f596bbf94cb93eb505642384f0b9a51
Secunia Security Advisory 45330
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Basic PHP Event Lister, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, php, csrf
SHA-256 | 053e60d51da80fb73e476bffb9c7454fbad7fdbbc9fd5b090feb6f75766d1c46
Secunia Security Advisory 45136
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for opie. This fixes some vulnerabilities, which can be exploited by malicious, local users to potentially gain escalated privileges and by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability
systems | linux, debian
SHA-256 | 0fa8b0d36f05c823bd2d8eb44de79ea08d91afab3ddcabd64f726bcaeb123ed4
Secunia Security Advisory 45335
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for sysstat. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, redhat
SHA-256 | 69be46da54e2c65b8ed1247ae62e28fac5bd67ca29550d95cfdc9c402241d4d5
Secunia Security Advisory 45340
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the SunMailer module for Drupal, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 80b438f64fc243967a0140bc75166ce5d7d15c51efbd5a53660660d2d56caea2
Secunia Security Advisory 44947
Posted Jul 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Foxit Reader, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | adc883d9f0e92ad0a6153ae86c894dbc215fca61f7c08d84bc4f820cc9c1d719
MIMEDefang Email Scanner 2.72
Posted Jul 21, 2011
Authored by Dianne Skoll | Site mimedefang.org

MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with the Sendmail 8.11 and newer "Milter" API, which makes it more flexible and efficient than procmail-based approaches.

Changes: This is purely a cleanup and bugfix release. Major fixes include better startup handling to avoid a race between startup of MIMEDefang and Sendmail, and better handling of long responses from scanners so the master/slave communication protocol does not become desynchronized.
systems | windows, unix
SHA-256 | 86a3a72fc46155da83ce9536c2d730ae23526d28c1b2beafd7c6f3d2b5c57345
Red Hat Security Advisory 2011-1084-01
Posted Jul 21, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1084-01 - The libsndfile packages provide a library for reading and writing sound files. An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way the libsndfile library processed certain Ensoniq PARIS Audio Format audio files. An attacker could create a specially-crafted PAF file that, when opened, could cause an application using libsndfile to crash or, potentially, execute arbitrary code with the privileges of the user running the application. Users of libsndfile are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications using libsndfile must be restarted for the update to take effect.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2011-2696
SHA-256 | 64418f665856a904afb78553df25f24bfa8c7c9e918895d3a71402bef34572bf
Red Hat Security Advisory 2011-1083-01
Posted Jul 21, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1083-01 - FUSE can implement a fully functional file system in a user-space program. These packages provide the mount utility, fusermount, the tool used to mount FUSE file systems. Multiple flaws were found in the way fusermount handled the mounting and unmounting of directories when symbolic links were present. A local user in the fuse group could use these flaws to unmount file systems, which they would otherwise not be able to unmount and that were not mounted using FUSE, via a symbolic link attack.

tags | advisory, local
systems | linux, redhat
advisories | CVE-2010-3879, CVE-2011-0541, CVE-2011-0542, CVE-2011-0543
SHA-256 | 570a3ac9c4d8ba47567744f3a2508ef5c64019b15a6120d40f7b53ce18ed1cd0
Page 2 of 3
Back123Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close