what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 100 RSS Feed

Files

Linux Kernel _sctp_make_chunk() Denial Of Service
Posted Mar 1, 2018
Authored by Jakub Jirasek | Site secunia.com

Secunia Research has discovered a vulnerability in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). An error in the "_sctp_make_chunk()" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash. The vulnerability is confirmed in versions 4.15.0-r7 and 4.15.0. Other versions may also be affected.

tags | advisory, denial of service, kernel, local
systems | linux
advisories | CVE-2018-5803
SHA-256 | f0fc9c0b15f4d208f5ddbd8f5c527f7918efef3e0855ee3238bb91aeec7edb50

Related Files

Secunia Security Advisory 43739
Posted May 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in the MuPDF plugin for Firefox, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 20eea0542f76a32f41edc2edf564c1c9e659bc3887ddd18c5d727ab63f7da1ca
Secunia Security Advisory 43116
Posted Apr 28, 2011
Site secunia.com

Secunia Security Advisory - Secunia Research has discovered multiple vulnerabilities in InduSoft ISSymbol ActiveX control, which can be exploited by malicious people to compromise a user's system.

SHA-256 | 7970b7e093607d27d757175767c03080bd3d08df8b6851c188d2805d018cdcf9
Secunia Security Advisory 43116
Posted Apr 28, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered multiple vulnerabilities in InduSoft ISSymbol ActiveX control, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability, activex
SHA-256 | 7970b7e093607d27d757175767c03080bd3d08df8b6851c188d2805d018cdcf9
Secunia Security Advisory 42928
Posted Apr 28, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered multiple vulnerabilities in Advantech Studio ISSymbol ActiveX control, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability, activex
SHA-256 | 0922c1f183edaf0cebd923a4eefed01bf570b184f870700a384f86d073b53906
Secunia Security Advisory 43681
Posted Apr 23, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered two vulnerabilities in CA Output Management Web Viewer, which can be exploited by malicious people to compromise a user's system.

tags | advisory, web, vulnerability
SHA-256 | a53650f34fb396e3d1f5d6d6827378ee9b06d191224cedfc0bff96302c995c9e
Secunia Security Advisory 41387
Posted Apr 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered two vulnerabilities in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | windows
SHA-256 | f317e6c78931603a474c19e3ab146fc81cd3bcd2b3fddda6c3525f8fb832f6cc
Secunia Security Advisory 43542
Posted Mar 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered multiple vulnerabilities in RunCMS, which can be exploited by malicious users to conduct SQL injection attacks and compromise a vulnerable system and by malicious people to conduct cross-site scripting and request forgery attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | d07958d980219d5ab8990c96a177fed52a1661e29d3b96472c672e2be1310e83
Secunia Security Advisory 42254
Posted Mar 23, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered multiple vulnerabilities in Achievo, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and conduct SQL injection attacks and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 9f460aeefab97d7930b38d59c5debfb8bac65a09ff68de7e30839f4f02ac52f3
Secunia Security Advisory 43360
Posted Mar 22, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Honeywell ScanServer ActiveX Control, which can be exploited by malicious people to compromise a user's system.

tags | advisory, activex
SHA-256 | 491d12a386f21de84d9a103729e26268183f5e411a25fdde3caa61eee887b663
Secunia Security Advisory 43329
Posted Mar 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Foxit Reader, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | c1eb17d02428c235778c42a6967e0c1f9e09c830311af8ff28a03dfccfcb6b65
Secunia Security Advisory 43440
Posted Mar 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Foxit Phantom, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 4ca16d1365bac6be2717d266827332d454e81ef9e72823b7145182487b591f19
Secunia Security Advisory 42321
Posted Mar 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered two vulnerabilities in SumatraPDF, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | d0f2420b8961afee6f3ed592052f348eecfd70f1a66eadda37366dfdeb849fd1
Secunia Security Advisory 42320
Posted Mar 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered two vulnerabilities in MuPDF, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 8cda2e8042948208a916b95341c2de081e760200c3fc3859298b28b94206fd42
Secunia Security Advisory 42880
Posted Feb 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered two vulnerabilities in Dell DellSystemLite.Scanner ActiveX control, which can be exploited by malicious people to disclose various information.

tags | advisory, vulnerability, activex
SHA-256 | c693e09242d97444325bab20fc736e6e824dc58686cf355d101378dd2bd6ba57
Secunia Security Advisory 42800
Posted Feb 3, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered multiple vulnerabilities in SigPlus Pro ActiveX control, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability, activex
SHA-256 | e94ee9b0a8aa5ffaddb44fca537951393bc583ac47fd55111d5b0b7ce6d8b46a
Microsoft Word LFO Parsing Double-Free
Posted Dec 24, 2010
Authored by Alin Rad Pop | Site secunia.com

Secunia Research has discovered a vulnerability in Microsoft Word, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused by a double-free error when processing LFO (List Format Override) records and can be exploited to corrupt memory via a specially crafted Word document. Successful exploitation may allow execution of arbitrary code.

tags | advisory, arbitrary
advisories | CVE-2010-3217
SHA-256 | 09199796312d54b98c05e03a55568621a9059426818c08614687c60d34bcd71a
Microsoft Office Two FlashPix Tile Data Buffer Overflows
Posted Dec 21, 2010
Authored by Dyon Balding | Site secunia.com

Secunia Research has discovered two vulnerabilities in Microsoft Office, which can be exploited by malicious people to compromise a user's system. A boundary error in the FlashPix graphics filter when parsing certain tile data can be exploited to cause a data section buffer overflow via a specially crafted image. A boundary error in the FlashPix graphics filter when parsing certain tile data can be exploited to cause a stack-based buffer overflow via a specially crafted image. Successful exploitation of the vulnerabilities allows execution of arbitrary code.

tags | advisory, overflow, arbitrary, vulnerability
advisories | CVE-2010-3952
SHA-256 | b60f45ab7b6e2a2faa176e81b2106b9d5cd588df7175ba1241a68f372b354aac
Microsoft Office FlashPix Property Set Parsing Buffer Overflow
Posted Dec 21, 2010
Authored by Dyon Balding | Site secunia.com

Secunia Research has discovered a vulnerability in Microsoft Office, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by a boundary error in the FlashPix graphics filter when parsing certain property sets. This can be exploited to cause a stack-based buffer overflow via a specially crafted FlashPix image. Successful exploitation allows execution of arbitrary code.

tags | advisory, overflow, arbitrary
advisories | CVE-2010-3951
SHA-256 | da9db2c31643ad2ece4ad028a02978df527f30435b8d0a989495edb5b862b7cf
Secunia Security Advisory 42305
Posted Dec 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in SAP Crystal Reports, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 33f01f0ed1ca4d01117353e853a21e3301f28ebf71389e78366cf3a471775535
Microsoft Office TIFF Image Converter Two Buffer Overflows
Posted Dec 20, 2010
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered two vulnerabilities in Microsoft Office, which can be exploited by malicious people to compromise a user's system. An input validation error in the TIFF Import/Export Graphic Filter when copying certain data can be exploited to cause a heap-based buffer overflow via a specially crafted TIFF image. Another input validation error in the TIFF Import/Export Graphic Filter when copying certain data after having encountered a specific error can be exploited to cause a heap-based buffer overflow via a specially crafted TIFF image. Successful exploitation of the vulnerabilities may allow execution of arbitrary code when processing a TIFF image in an application using the graphics filter (e.g. opening the image in Microsoft Photo Editor or importing it into an Office document).

tags | advisory, overflow, arbitrary, vulnerability
advisories | CVE-2010-3947
SHA-256 | 9dba3d0d50ecb04d6b0e88ad279009be8dcf8e519a8e80f0bd5acd274e688272
Microsoft Office Document Imaging Endian Conversion
Posted Dec 20, 2010
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered a vulnerability in Microsoft Office, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused by missing input validation within a library used by the bundled Microsoft Office Document Imaging application when converting certain data during parsing of TIFF images. This can be exploited to corrupt memory via a TIFF image containing specially crafted IFD entries. Successful exploitation may allow execution of arbitrary code.

tags | advisory, arbitrary
advisories | CVE-2010-3950
SHA-256 | 623e21468d54f2db461001bc0b8983f1dc7a59785a4ad47663b3d0349af2f8ce
Microsoft Office TIFF Image Converter Endian Conversion
Posted Dec 20, 2010
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered a vulnerability in Microsoft Office, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused by an error in the TIFF Import/Export Graphic Filter (TIFFIM32.FLT) when converting the endianess of certain data. This can be exploited to corrupt memory via e.g. a specially crafted TIFF image. Successful exploitation may allow execution of arbitrary code when processing a TIFF image in an application using the graphics filter (e.g. opening the image in Microsoft Photo Editor or importing it into an Office document).

tags | advisory, arbitrary
advisories | CVE-2010-3949
SHA-256 | 28a0cbd4c91dc6908098a5bb540ee31c831d78a7df3e6e91cc796712c465d9fa
Microsoft Office PICT Filter Integer Truncation
Posted Dec 20, 2010
Authored by Alin Rad Pop | Site secunia.com

Secunia Research has discovered a vulnerability in Microsoft Office, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by an integer truncation error in the PICT import filter (PICTIM32.FLT). This can be exploited to cause a heap-based buffer overflow by e.g. tricking a user into importing a specially crafted PICT file. Successful exploitation may allow execution of arbitrary code.

tags | advisory, overflow, arbitrary
advisories | CVE-2010-3946
SHA-256 | 3d48dcf13f13e7c0894cc02b34b824a7414ad66514cf0dc9789b003d837a5be5
RealPlayer "cook" Arbitrary Free
Posted Dec 20, 2010
Authored by Alin Rad Pop | Site secunia.com

Secunia Research has discovered a vulnerability in RealPlayer, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to an error in the handling of errors encountered while decoding "cook" encoded audio content. This can be exploited to trigger the use of uninitialised memory and potentially free an arbitrary address. Successful exploitation may allow execution of arbitrary code.

tags | advisory, arbitrary
advisories | CVE-2010-2579
SHA-256 | 8ce3f987a47149f84b0f20dda276ecafb1deb4f3712048d4fa372fdc4fe9f31c
RealPlayer AAC Spectral Data Parsing
Posted Dec 20, 2010
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered a vulnerability in RealPlayer, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by an error in the parsing of AAC audio content and can be exploited to corrupt memory via specially crafted spectral data. Successful exploitation may allow execution of arbitrary code.

tags | advisory, arbitrary
advisories | CVE-2010-0125
SHA-256 | e1d707d2fdf5b309bfa5099effc7b3f06ec130515db11e823db3c81a62298aaf
Page 3 of 4
Back1234Next

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    10 Files
  • 6
    Dec 6th
    13 Files
  • 7
    Dec 7th
    23 Files
  • 8
    Dec 8th
    19 Files
  • 9
    Dec 9th
    1 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close