what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 100 RSS Feed

Files

Debian Security Advisory 5639-1
Posted Mar 14, 2024
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5639-1 - Security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.

tags | advisory, denial of service, arbitrary, info disclosure
systems | linux, debian
advisories | CVE-2024-2400
SHA-256 | 4cbadb48dda00be85d46d8fcccadc0b92923c8219c7569b6d2df731ece4d0271

Related Files

Debian Security Advisory 2463-1
Posted May 2, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2463-1 - Ivano Cristofolini discovered that insufficient security checks in Samba's handling of LSA RPC calls could lead to privilege escalation by gaining the "take ownership" privilege.

tags | advisory
systems | linux, debian
advisories | CVE-2012-2111
SHA-256 | 65c8de9a46a2e00007a474ced85b5cba1598c033fe88ece3b0f770eacd08ccf7
Debian Security Advisory 2462-1
Posted Apr 29, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2462-1 - Several integer overflows and missing input validations were discovered in the ImageMagick image manipulation suite, resulting in the execution of arbitrary code or denial of service.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, debian
advisories | CVE-2012-0259, CVE-2012-0260, CVE-2012-1185, CVE-2012-1186, CVE-2012-1610, CVE-2012-1798
SHA-256 | 132c0a8aab05698e43ed93ac17041bec1f40bc314bb4d4da66317818ef77adc3
Debian Security Advisory 2461-1
Posted Apr 26, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2461-1 - Several vulnerabilities have been found in SPIP, a website engine for publishing, resulting in cross-site scripting, script code injection and bypass of restrictions.

tags | advisory, vulnerability, xss
systems | linux, debian
SHA-256 | 941b8db73cd0a3d9a9f385427725bfc3917123f727aded12a6b4fbeeda06ba25
Debian Security Advisory 2459-1
Posted Apr 26, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2459-1 - Several vulnerabilities have been discovered in Quagga, a routing daemon.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2012-0249, CVE-2012-0250, CVE-2012-0255
SHA-256 | c4367fc9a6c58c5c50a49bebc2fb4c7a2ab096bdd87ada9269d127b16eeae4ba
Debian Security Advisory 2454-2
Posted Apr 25, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2454-2 - Tomas Hoger, Red Hat, discovered that the fix for CVE-2012-2110 for the 0.9.8 series of OpenSSL was incomplete. It has been assigned the CVE-2012-2131 identifier.

tags | advisory
systems | linux, redhat, debian
advisories | CVE-2012-2131
SHA-256 | 7e348a26b106449f52510f57388768abb0d395544cec547906f51111b437e856
Debian Security Advisory 2460-1
Posted Apr 25, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2460-1 - Several vulnerabilities were discovered in the Asterisk PBX and telephony toolkit.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2012-1183, CVE-2012-2414, CVE-2012-2415
SHA-256 | 90ac813962f844ca8939a8b64ac607c95c83938e1adac515d296dc2a4e24ef63
Debian Security Advisory 2458-1
Posted Apr 25, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2458-1 - Several vulnerabilities have been found in the Iceape internet suite, an unbranded version of Seamonkey.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2012-0455, CVE-2012-0456, CVE-2012-0458, CVE-2012-0461, CVE-2012-0467, CVE-2012-0470, CVE-2012-0471, CVE-2012-0477, CVE-2012-0479
SHA-256 | 63ce617ad4207fc9f6f56c8d68d84d9f42707e256fcf4c53016b892111eca303
Debian Security Advisory 2457-1
Posted Apr 25, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2457-1 - Several vulnerabilities have been discovered in Iceweasel, a web browser based on Firefox. The included XULRunner library provides rendering services for several other applications included in Debian.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2012-0467, CVE-2012-0470, CVE-2012-0471, CVE-2012-0477, CVE-2012-0479
SHA-256 | 72062d31000e1dd318e5baed8da99783e883be58715d1af2aaba2ac43f06817d
Debian Security Advisory 2456-1
Posted Apr 25, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2456-1 - Danny Fullerton discovered a use-after-free in the Dropbear SSH daemon, resulting in potential execution of arbitrary code. Exploitation is limited to users, who have been authenticated through public key authentication and for which command restrictions are in place.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2012-0920
SHA-256 | 74e30aac727f551c38ff58b3cc7ff8cd5d28075b68721fe8d01264232d3782b2
Debian Security Advisory 2455-1
Posted Apr 20, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2455-1 - Helmut Hummel of the typo3 security team discovered that typo3, a web content management system, is not properly sanitizing output of the exception handler. This allows an attacker to conduct cross-site scripting attacks if either third-party extensions are installed that do not sanitize this output on their own or in the presence of extensions using the extbase MVC framework which accept objects to controller actions.

tags | advisory, web, xss
systems | linux, debian
advisories | CVE-2012-2112
SHA-256 | 47c42962916e4199be3819f88b30e724d5de0dc112811ab11be528a7445fd133
Debian Security Advisory 2454-1
Posted Apr 20, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2454-1 - Multiple vulnerabilities have been found in OpenSSL. Ivan Nestlerode discovered a weakness in the CMS and PKCS #7 implementations that could allow an attacker to decrypt data via a Million Message Attack (MMA). It was discovered that a NULL pointer could be dereferenced when parsing certain S/MIME messages, leading to denial of service. Tavis Ormandy, Google Security Team, discovered a vulnerability in the way DER-encoded ASN.1 data is parsed that can result in a heap overflow.

tags | advisory, denial of service, overflow, vulnerability
systems | linux, debian
advisories | CVE-2012-0884, CVE-2012-1165, CVE-2012-2110
SHA-256 | 825c0a8ae8ea8fbf2a20faf45cd58f27b84d9a4a1fa4c787cb05063d8a84342e
Debian Security Advisory 2453-2
Posted Apr 20, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2453-2 - It was discovered that the last security update for gajim, DSA-2453-1, introduced a regression in certain environments.

tags | advisory
systems | linux, debian
advisories | CVE-2012-2093, CVE-2012-2086, CVE-2012-2085
SHA-256 | b1fb80c3fdbcf71fd6eb1389efd82d09a8a8af11eee74efd97d96c872aecc243
Debian Security Advisory 2453-1
Posted Apr 16, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2453-1 - Several vulnerabilities have been discovered in gajim, a feature-rich jabber client.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2012-2093, CVE-2012-2086, CVE-2012-2085
SHA-256 | bd105df7fba5991e582b3c8ae56d9c2086f0b1c465a2185562b29411c942cbb9
Debian Security Advisory 2452-1
Posted Apr 16, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2452-1 - Niels Heinen noticed a security issue with the default Apache configuration on Debian if certain scripting modules like mod_php or mod_rivet are installed. The problem arises because the directory /usr/share/doc, which is mapped to the URL /doc, may contain example scripts that can be executed by requests to this URL. Although access to the URL /doc is restricted to connections from localhost, this still creates security issues in two specific configurations.

tags | advisory
systems | linux, debian
advisories | CVE-2012-0216
SHA-256 | d52b84f07d62410b49a8dd5b85aec7aeebf6d89cf4e9d3b364e93c771843b179
Debian Security Advisory 2451-1
Posted Apr 13, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2451-1 - Several vulnerabilities have been discovered in puppet, a centralized configuration management system.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2012-1906, CVE-2012-1986, CVE-2012-1987, CVE-2012-1988
SHA-256 | 35b59b4216bedd63d45392644a9587d40ba5845a85bf2717988463a587882a20
Debian Security Advisory 2450-1
Posted Apr 12, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2450-1 - It was discovered that Samba, the SMB/CIFS file, print, and login server, contained a flaw in the remote procedure call (RPC) code which allowed remote code execution as the super user from an unauthenticated connection.

tags | advisory, remote, code execution
systems | linux, debian
advisories | CVE-2012-1182
SHA-256 | e046a9837a078cecc89818dd89c20058b986e8358ee2ed27ad3347a2b66377bc
Debian Security Advisory 2449-1
Posted Apr 12, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2449-1 - It was discovered that sqlalchemy, an SQL toolkit and object relational mapper for python, is not sanitizing input passed to the limit/offset keywords to select() as well as the value passed to select.limit()/offset(). This allows an attacker to perform SQL injection attacks against applications using sqlalchemy that do not implement their own filtering.

tags | advisory, sql injection, python
systems | linux, debian
advisories | CVE-2012-0805
SHA-256 | 3b634c4e6348ffb1a9b2e90c970e4768f1315994bf78cea4adf5af707077012b
Debian Security Advisory 2448-1
Posted Apr 11, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2448-1 - It was discovered that a heap-based buffer overflow in InspIRCd could allow remote attackers to execute arbitrary code via a crafted DNS query.

tags | advisory, remote, overflow, arbitrary
systems | linux, debian
advisories | CVE-2012-1836
SHA-256 | 531a6ada2ab9abfb6de202bbd399f431ac06f31ee6befe118b5ce7ceb9a5fdfa
Debian Security Advisory 2447-1
Posted Apr 5, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2447-1 - Alexander Gavrun discovered an integer overflow in the TIFF library in the parsing of the TileSize entry, which could result in the execution of arbitrary code if a malformed image is opened.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2012-1173
SHA-256 | 6ce335ccbe6295d66a62055d9901e728323be55bdabae78fa343cfb3420c7849
Debian Security Advisory 2446-1
Posted Apr 5, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2446-1 - It was discovered that incorrect memory handling in the png_set_text2() function of the PNG library could lead to the execution of arbitrary code.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2011-3048
SHA-256 | 3e50b7906f853d07a3ae32dc87113500c570284a57f8a8477e9ba1fa562828ab
Debian Security Advisory 2398-2
Posted Apr 1, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2398-2 - cURL is a command-line tool and library for transferring data with URL syntax. It was discovered that the countermeasures against the Dai/Rogaway chosen-plaintext attack on SSL/TLS (CVE-2011-3389, "BEAST") cause interoperability issues with some server implementations. This update ads the the CURLOPT_SSL_OPTIONS and CURLSSLOPT_ALLOW_BEAST options to the library, and the - --ssl-allow-beast option to the "curl" program.

tags | advisory
systems | linux, debian
SHA-256 | 33bcc7e0fabacf99511b85726223d256c398e0114a35ca5e88d81f02413ac358
Debian Security Advisory 2442-2
Posted Apr 1, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2442-2 - The openarena update DSA-2442-1 introduced a regression in which servers would cease to respond to status requests after an uptime of several weeks.

tags | advisory
systems | linux, debian
advisories | CVE-2010-5077
SHA-256 | c2390db85f6c63b28976206746212e8088846ece4e3c07420ac23ed5f2c04a40
Debian Security Advisory 2445-1
Posted Apr 1, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2445-1 - Several remote vulnerabilities have been discovered in the TYPO3 web content management framework.

tags | advisory, remote, web, vulnerability
systems | linux, debian
advisories | CVE-2012-1606, CVE-2012-1607, CVE-2012-1608
SHA-256 | a9853f6d26abdcd01ac84fcb057e959dad29c7c0d2acfe13d89f2069f8eebcb4
Debian Security Advisory 2444-1
Posted Mar 29, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2444-1 - It was discovered that the Tryton application framework for Python allows authenticated users to escalate their privileges by editing the Many2Many field.

tags | advisory, python
systems | linux, debian
advisories | CVE-2012-0215
SHA-256 | 1bf8166f452ce37b8119e22989896e1361e2b04b9065dbab3659079991b8e62c
Debian Security Advisory 2443-1
Posted Mar 28, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2443-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation.

tags | advisory, denial of service, kernel, vulnerability
systems | linux, debian
advisories | CVE-2009-4307, CVE-2011-1833, CVE-2011-4347, CVE-2012-0045, CVE-2012-1090, CVE-2012-1097
SHA-256 | d50bf6dbe234272263b4d756659d95d7bab63dffdef93404c1f40535771db5b3
Page 4 of 4
Back1234Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close