what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 42 of 42 RSS Feed

Files Date: 2008-02-15 to 2008-02-16

Secunia Security Advisory 28926
Posted Feb 15, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in OpenLDAP, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | d1e6643ad5860a1ed9ca82caf1cfd592ac11ce82f287f5c9d997a0d624ec45b8
Secunia Security Advisory 28929
Posted Feb 15, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in iTheora, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 2031863167eb7c46a1008c9ebbb17db82126ef2cee42f1858c5e4c579df796c2
Secunia Security Advisory 28943
Posted Feb 15, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for boost. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
SHA-256 | 80e134d9e1566d2720be08170734079d347ed1164152718f6cd099996ccfd7da
Secunia Security Advisory 28964
Posted Feb 15, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Michael Brooks has discovered a vulnerability in Etomite, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 4126a7814b1dcfe9692967d1f51140118d61b49ef58ae660258c8bae6d470f81
Secunia Security Advisory 28965
Posted Feb 15, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HP-UX has issued an update for Apache. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
systems | hpux
SHA-256 | 34895f216c18312a783d289c89a933a64110d8c0856d240555b1b3e8a35cc235
Secunia Security Advisory 28971
Posted Feb 15, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for the kernel. This fixes a security issue and some vulnerabilities, where one has an unknown impact and others can be exploited by malicious, local users to disclose potentially sensitive information, cause a DoS (Denial of Service), bypass certain security restrictions, and corrupt a file system, and by malicious people to cause a DoS.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, ubuntu
SHA-256 | 602616f95c6bda226f762daba95980ad4a5d1a7e87a20e34eb30a139ec725a0d
Secunia Security Advisory 28847
Posted Feb 15, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in PHParanoid, which can be exploited by malicious people to conduct cross-site request forgery attacks and to bypass certain security restrictions.

tags | advisory, vulnerability, csrf
SHA-256 | ff346fbc92fbbbf163e3ff6001d4bc9aac571c23e226b33be19252537c7f35bb
Secunia Security Advisory 28935
Posted Feb 15, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Cisco Unified IP Phone models, which can be exploited by malicious users to compromise a vulnerable device or by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable device.

tags | advisory, denial of service, vulnerability
systems | cisco
SHA-256 | adf2a625239a7c2303a7eb34ce43703a642bc450f5a72a6f7987ef98131fe819
Secunia Security Advisory 28952
Posted Feb 15, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for pulseaudio. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, gentoo
SHA-256 | dc65797c65c08405865359f0955c2460450523941ffc8e7378ab4abf61579afd
Secunia Security Advisory 28960
Posted Feb 15, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has released an update for glib2. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | ced3849879bbd4cfb7fbdb326e71aae9f8bad4f03c8f05e76d9725a6b563e974
Mandriva Linux Security Advisory 2008-045
Posted Feb 15, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Multiple heap-based buffer overflow vulnerabilities along with various array index flaws allow for arbitrary code execution in mplayer.

tags | advisory, overflow, arbitrary, vulnerability, code execution
systems | linux, mandriva
advisories | CVE-2008-0225, CVE-2008-0238, CVE-2008-0485, CVE-2008-0486, CVE-2008-0629, CVE-2008-0630
SHA-256 | f1bcf0cf473fccd78e6b2308c1d9435a3aa262e40d0aead2dc19974921211ce7
Gentoo Linux Security Advisory 200802-8
Posted Feb 15, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200802-08 - Tavis Ormandy and Will Drewry from the Google Security Team reported a failed assertion in file regex/v4/perl_matcher_non_recursive.hpp (CVE-2008-0171) and a NULL pointer dereference in function get_repeat_type() file basic_regex_creator.hpp (CVE-2008-0172) when processing regular expressions. Versions less than 1.34.1-r2 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2008-0171, CVE-2008-0172
SHA-256 | 79f9d54b81900fb2c8b6e3e1425944c10054423b74336270a45969fe88fb9caf
plutostatus-lfi.txt
Posted Feb 15, 2008
Authored by muuratsalo

PlutoStatus Location version 1.0pre alpha suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | fd9edb236cf8ef8363120b004da55760982b20e99984c8cb03adcdd92cd61ca6
scribe02-lfi.txt
Posted Feb 15, 2008
Authored by muuratsalo

Scribe version 0.2 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | d8f45be1fbc6424c444a8b17628fbece166c6951bc6c6b575daae8a138728e69
DOINGSOFT-ipdivaxss.txt
Posted Feb 15, 2008
Authored by eagle

The IPDiva VPNSSL versions 2.2.8.84 and below and 2.3.2.14 and below suffer from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 930d75d65b2255088fc74b6733c9e647cfeca9900ba3059f0d6a6593e1490cea
DOINGSOFT-ipdiva.txt
Posted Feb 15, 2008
Authored by eagle

The IPDiva VPNSSL versions 2.2.8.84 and below and 2.3.2.14 and below suffer from a brute force attack vulnerability where the retry limit is based on a value provided in the cookie.

tags | advisory
SHA-256 | 7657598b26ae538a1ef575501b7e2787599032711da9e53a976000aeb046a078
rosoft-overflow.txt
Posted Feb 15, 2008
Authored by securfrog

Rosoft Media Player version 4.1.8 suffers from a buffer overflow vulnerability when parsing .M3U files.

tags | exploit, overflow
SHA-256 | 929ecc927e49e856d1f9bf77a36c25ab3f7dd9d2985dd103ce50a9d332bc52c0
Page 2 of 2
Back12Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close