exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 69 RSS Feed

Files Date: 2012-04-11 to 2012-04-12

Red Hat Security Advisory 2012-0466-01
Posted Apr 11, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0466-01 - Samba is an open-source implementation of the Server Message Block or Common Internet File System protocol, which allows PC-compatible machines to share files, printers, and other information. A flaw in the Samba suite's Perl-based DCE/RPC IDL compiler, used to generate code to handle RPC calls, resulted in multiple buffer overflows in Samba. A remote, unauthenticated attacker could send a specially-crafted RPC request that would cause the Samba daemon to crash or, possibly, execute arbitrary code with the privileges of the root user.

tags | advisory, remote, overflow, arbitrary, root, perl, protocol
systems | linux, redhat
advisories | CVE-2012-1182
SHA-256 | ac3d0a5cf4ad166161f6d299cf8b70631e442e80e31a75c43f97926eb4e060f3
Red Hat Security Advisory 2012-0468-01
Posted Apr 11, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0468-01 - The libtiff packages contain a library of functions for manipulating Tagged Image File Format files. Two integer overflow flaws, leading to heap-based buffer overflows, were found in the way libtiff attempted to allocate space for a tile in a TIFF image file. An attacker could use these flaws to create a specially-crafted TIFF file that, when opened, would cause an application linked against libtiff to crash or, possibly, execute arbitrary code. All libtiff users should upgrade to these updated packages, which contain a backported patch to resolve these issues. All running applications linked against libtiff must be restarted for this update to take effect.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2012-1173
SHA-256 | 1c154b2cc7b2764e4eb386316ad291c0776e267591f9cfe7e2c473ddf73fde81
Red Hat Security Advisory 2012-0465-01
Posted Apr 11, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0465-01 - Samba is an open-source implementation of the Server Message Block or Common Internet File System protocol, which allows PC-compatible machines to share files, printers, and other information. A flaw in the Samba suite's Perl-based DCE/RPC IDL compiler, used to generate code to handle RPC calls, resulted in multiple buffer overflows in Samba. A remote, unauthenticated attacker could send a specially-crafted RPC request that would cause the Samba daemon to crash or, possibly, execute arbitrary code with the privileges of the root user.

tags | advisory, remote, overflow, arbitrary, root, perl, protocol
systems | linux, redhat
advisories | CVE-2012-1182
SHA-256 | 5a04569b6919bd0a20fe7431a7493f6484a21e57dfa7115a5e0ef655365f0b8d
Red Hat Security Advisory 2012-0467-01
Posted Apr 11, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0467-01 - FreeType is a free, high-quality, portable font engine that can open and manage font files. It also loads, hints, and renders individual glyphs efficiently. Multiple flaws were found in the way FreeType handled TrueType Font, Glyph Bitmap Distribution Format, Windows .fnt and .fon, and PostScript Type 1 fonts. If a specially-crafted font file was loaded by an application linked against FreeType, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

tags | advisory, arbitrary
systems | linux, redhat, windows
advisories | CVE-2012-1126, CVE-2012-1127, CVE-2012-1130, CVE-2012-1131, CVE-2012-1132, CVE-2012-1134, CVE-2012-1136, CVE-2012-1137, CVE-2012-1139, CVE-2012-1140, CVE-2012-1141, CVE-2012-1142, CVE-2012-1143, CVE-2012-1144
SHA-256 | 3a13d9120cf34d5a658787c980c5020c879717bc89c85aea8328c9515717c900
Red Hat Security Advisory 2012-0469-01
Posted Apr 11, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0469-01 - Adobe Reader allows users to view and print documents in Portable Document Format. This update fixes multiple security flaws in Adobe Reader. These flaws are detailed on the Adobe security page APSB12-08, listed in the References section. A specially-crafted PDF file could cause Adobe Reader to crash or, potentially, execute arbitrary code as the user running Adobe Reader when opened. All Adobe Reader users should install these updated packages. They contain Adobe Reader version 9.5.1, which is not vulnerable to these issues. All running instances of Adobe Reader must be restarted for the update to take effect.

tags | advisory, arbitrary
systems | linux, redhat
advisories | CVE-2012-0774, CVE-2012-0775, CVE-2012-0777
SHA-256 | c341c5397d6898dd8e367ea7d2edae47c08423d0ec1dda6322251c22228ed4ee
Secunia Security Advisory 43012
Posted Apr 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sow Ching Shiong has discovered a vulnerability in HP System Management Homepage, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 3eb295df02aa2dea9ce9bb1e8539fa5e951c2cdf73b2cbcb014b731e80b84d25
Secunia Security Advisory 48760
Posted Apr 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Novell has acknowledged a vulnerability in Novell Sentinel, which can be exploited by malicious users to disclose sensitive information.

tags | advisory
SHA-256 | 2072fad44288fd6a211ba70af152027d390295a520c28e23369d0a4e057c5b6a
Secunia Security Advisory 48780
Posted Apr 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in FlightGear, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | a46d5381cb806b2bbe95c5a65e8d164203b4709d3106a5c29aece17fe633bee8
Secunia Security Advisory 48733
Posted Apr 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Adobe Reader and Adobe Acrobat, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, gain knowledge of potentially sensitive information, and compromise a user's system.

tags | advisory, vulnerability, xss
SHA-256 | 22304ba7c1a6e7b1206a3acc050aeb70179433422e80d9f9768a57ee6ea68584
Secunia Security Advisory 48738
Posted Apr 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in the HP ProCurve 5400 zl Switch, which can be exploited by malicious people to compromise a users's system.

tags | advisory
SHA-256 | 1441323731a789b9e9cd40e7d3e048efa0d7b2086bcb501ce8addd3a98bfe8d5
Secunia Security Advisory 48742
Posted Apr 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Samba, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 5d2ad0bc0aa63842329c0ce1690b26bfa06fde52a7ebb61d21169a5288eae898
Secunia Security Advisory 48743
Posted Apr 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple security issues and two vulnerabilities have been reported in Puppet, which can be exploited by malicious, local users to disclose potentially sensitive information and perform certain actions with escalated privileges and by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
SHA-256 | 23af1d95573e132c193e278164ff5e557a5da5093fdb7bbec335ce7fd99a47ad
Secunia Security Advisory 48778
Posted Apr 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Pluck SiteLife, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | d8baef04fa49a85a891d289171d9323b3045760b64941d25e87cc3cc5f144ebd
Secunia Security Advisory 48749
Posted Apr 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for chromium. This fixes multiple vulnerabilities, where some have unknown impacts while others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, vulnerability
systems | linux, gentoo
SHA-256 | 34e72e1cb1123862080b4ad587fc6b9601fc5baba753083268aeb4faec295944
Secunia Security Advisory 48754
Posted Apr 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for samba3x. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, redhat
SHA-256 | db367b04925e60c60dfe94ae18036c22fcae8d7d2ab94d680dd97a14e31a6b7f
Secunia Security Advisory 48758
Posted Apr 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for freetype. This fixes multiple vulnerabilities, which can be exploited by malicious people to potentially compromise an application using the library.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | 4172c2925d2218f7b104c4aa87f596e71448286e1e6a6c388c1a2eb72418ed41
Secunia Security Advisory 48751
Posted Apr 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, redhat
SHA-256 | 147421976ea6adf6fd130b22530f68412a1b26fd1cc80d80ab01201abf9fe665
Secunia Security Advisory 48764
Posted Apr 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - vekt0r has discovered a vulnerability in Horizon Quick CMS, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | a36728af10149f20afec7a49b8da4b0a9870339b54e03bffbc038f5f688c3140
Secunia Security Advisory 48756
Posted Apr 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for acroread. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | a87e3764512575974ea4492278dad9a98dae69f56f9bdc12ab2fe03ce0629c6a
Secunia Security Advisory 48737
Posted Apr 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - F5 has acknowledged multiple vulnerabilities in some F5 products, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 2dfb711072a4bdcc22fc6fae801937df4c16f80cb4734f977184f37a33f7394e
Secunia Security Advisory 48745
Posted Apr 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Interstage List Works, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | 1d138ac58bf0b9548e8d404732c39dba3d74b391c3d8beed4fd6329eb0938da4
Secunia Security Advisory 48750
Posted Apr 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SecureWorks has reported a vulnerability in Astaro Security Gateway, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
SHA-256 | 74ca9c7692223617e5d2cb4a83893ba78a3b19386dd614e9d68914b7795fb411
Secunia Security Advisory 48757
Posted Apr 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for libtiff. This fixes two vulnerabilities, which can be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | 04ede0e5d20f0d7731ab68d8fff762a459d3c7e51d325ebc78dfcd1341bbbbd2
Secunia Security Advisory 48748
Posted Apr 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for puppet. This fixes multiple security issues and two vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information and perform certain actions with escalated privileges and by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
systems | linux, ubuntu
SHA-256 | 65924cb0f3673eb40eb244f4fcbb530544a49570f5fe308bd9f86f28ba7242c2
Secunia Security Advisory 48747
Posted Apr 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities with an unknown impact have been reported in the Image News slider plugin for WordPress.

tags | advisory, vulnerability
SHA-256 | 448f77dcdb48b8ca1a9784ced0b2e9f3d587bf1a9ad0b02aaaf12c8b67321764
Page 2 of 3
Back123Next

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close