exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 46 RSS Feed

Files Date: 2011-10-13

Secunia Security Advisory 46054
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in Snort Report, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 6039290900e1769b667030a0930d989e2dfef024870c757fec1e9c7526d2ec9d
Secunia Security Advisory 46325
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in FluxBB, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | ea5f71e794aab1a76e1410b5903e60010aab6631878b805fce6dad82303f0f1f
Secunia Security Advisory 46363
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for dovecot. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges, by malicious users to bypass certain security restrictions, cause a DoS (Denial of Service), and potentially compromise a vulnerable system, and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
systems | linux, gentoo
SHA-256 | fc3bd0444c3f608ec2e5e85f1baa10bd0ccab1190697403d9026f93af1b91a0e
Secunia Security Advisory 46419
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Apple Numbers for iOS, which can be exploited by malicious people to compromise a user's device.

tags | advisory, vulnerability
systems | cisco, apple
SHA-256 | 518f0d76cee7aa85bd64bae052eecb13bcf99f40aaa35c786da2b17151d6e82c
Secunia Security Advisory 46386
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Simple Machines Forum, where some have unknown impact and others can be exploited by malicious people to conduct spoofing and cross-site request forgery attacks.

tags | advisory, spoof, vulnerability, csrf
SHA-256 | 8d73f42000a04b36daef3dd7f0e51ea7715232dc7de1a4e65cb2d8d648aa6759
Secunia Security Advisory 46412
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness and multiple vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, disclose potentially sensitive information, and compromise a user's system.

tags | advisory, vulnerability, xss
systems | apple
SHA-256 | 67c69e63aad4fce9c309098ba471952a4816c59f91001f4e8edd8433c8c6d64b
Secunia Security Advisory 46418
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Apple Pages for iOS, which can be exploited by malicious people to compromise a user's device.

tags | advisory
systems | cisco, apple
SHA-256 | 9127e140f1c9881e4d3d37f4beb7666520c0cc47a6890da684d042763ef78712
Secunia Security Advisory 46417
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.

tags | advisory, vulnerability
systems | apple, osx
SHA-256 | 1f0f5df5e2173d76d0bb94cd45ae7d65894edbf2a469719b236d8f5b687c5590
Secunia Security Advisory 46426
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for phpPgAdmin. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
systems | linux, fedora
SHA-256 | 3010d386442260c78af719dd92661211bcc098eae74fb206893c07bd1d042dca
Secunia Security Advisory 46429
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in Minitube, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
SHA-256 | 4e7e229fc708484fc8b921c42bc88e710658907d9eefa7e8c0d171f3f41ea6ad
Secunia Security Advisory 46393
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Certificate Login module for Drupal, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | db69c1a68b3df67214659ccb7c34b10f4af02536ca1f80d2c1fbc199cb2fcebe
Secunia Security Advisory 46428
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered multiple vulnerabilities in BugFree, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 762466db940b57e6278f99a1ff69e0db8f77c395ed00e3934d535e3e6620735e
Secunia Security Advisory 46377
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Apple iOS, which can be exploited by malicious people with physical access to disclose certain information and by malicious people to conduct script insertion, cross-site scripting, and spoofing attacks, disclose sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a user's device.

tags | advisory, denial of service, spoof, vulnerability, xss
systems | cisco, apple
SHA-256 | 9988e49869fae63b86783adbd73e8844b8f51e6f1dd9e4bb4108d87014ff4494
Secunia Security Advisory 46397
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - VMware has acknowledged multiple vulnerabilities in VMware ESX and ESXi Server, which can be exploited by malicious, local users to disclose system information, cause a DoS (Denial of Service), and gain escalated privileges and by malicious people with physical access to potentially compromise a vulnerable system and cause a DoS (Denial of Service), and by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security features, and cause a DoS (Denial of Service).

tags | advisory, denial of service, local, spoof, vulnerability
SHA-256 | 0f8cfb57788d369dbd26a951c2cb25d8fa523490d69cddf5dd2c92701c2272e5
Secunia Security Advisory 46416
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in DAEMON Tools, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
SHA-256 | b69951f605b77907d20ab0719be5567ddc28ba1c0c8b6cf1cff155ac384ad291
Secunia Security Advisory 46415
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Apple has acknowledged multiple vulnerabilities in Apple TV, which can be exploited by malicious people to disclose certain information, conduct spoofing attacks, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a user's device.

tags | advisory, denial of service, spoof, vulnerability
systems | apple
SHA-256 | a15a39c8a693b74393369cedad7fbbba1277382e81d47840b7683bdc4768dd77
Secunia Security Advisory 46436
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in the teachPress plugin for WordPress, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory, vulnerability
SHA-256 | c1095f6fd74175a79343ab6be69747cc8048d30aff138e03e3259e1c600582db
Secunia Security Advisory 46414
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged a weakness in OS/400, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | bca00cd45dad519f3032b48f662b9b3ae2c1da4d330c63be639773100c1080ec
Secunia Security Advisory 46432
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered multiple vulnerabilities in the Pretty Link plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 17271aa87f894af51af1632bf9e96e96f212cc5f198f46684b51e9e56555e93f
Secunia Security Advisory 46380
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in D-Link DIR-685 Xtreme N Storage Router, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | a920407873c1c1e7d849fd8bc2cfb27082b6d35362a83c794b93affb8f386900
Secunia Security Advisory 46337
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Phorum, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 7eeaa47af1d0ad01e44e979ab62a387136594d4efdace790b75eeaaf283960dc
Secunia Security Advisory 46348
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Geeklog, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, vulnerability
SHA-256 | b36b99ade9937e31d7ca82bc87cf34c7f67c945d2b2fac7f271d65332cecb121
Secunia Security Advisory 46340
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in AUTOMGEN, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 249cdff04b88753d1ea35f6463819a42e6639b9a8e381a229eb407569508ef03
Secunia Security Advisory 46364
Posted Oct 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for bugzilla. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to gain access to potentially sensitive information, by malicious users to disclose potentially sensitive information, bypass certain security restrictions, conduct script insertion and spoofing attacks, and by malicious people to conduct HTTP response splitting, cross-site scripting and forgery attacks, and bypass certain security restrictions.

tags | advisory, web, local, spoof, vulnerability, xss
systems | linux, gentoo
SHA-256 | 575f7005ce0df80bacc5ff57673a30318bff28b76dbc2c0340f69aa1d9e156cc
iDefense Security Advisory 10.11.11 - Internet Explorer
Posted Oct 13, 2011
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 10.11.11 - Remote exploitation of a memory corruption vulnerability in Microsoft Corp.'s Internet Explorer could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability occurs when a Javascript event handler such as "onload" is set to a Javascript object's attributes or childNodes collection. A event object is created and this object's memory is later freed; however, a reference to the object remains. When the reference is later used to access the event object, this now-invalid memory is treated as a valid object. The corrupt object's vtable is used to make an indirect function call. This may result in the execution of arbitrary code. Microsoft Internet Explorer 6 is vulnerable.

tags | advisory, remote, arbitrary, javascript
advisories | CVE-2011-1997
SHA-256 | a4cc81d5475470608b44363a528ccde05f1dbe3da1d6719cf0e9b5d63761b2d0
Page 1 of 2
Back12Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close