what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 69 RSS Feed

Files Date: 2010-06-25

Secunia Security Advisory 40363
Posted Jun 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for firefox and xulrunner. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or to compromise a user's system.

tags | advisory, vulnerability
systems | linux, fedora
SHA-256 | 6d07e443189fc67c0e2aa4ed4d9d09e90bbf56d1755a9bb3f312f13a460523b2
Secunia Security Advisory 40364
Posted Jun 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for seamonkey. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or to compromise a user's system.

tags | advisory, vulnerability
systems | linux, fedora
SHA-256 | d454adf74392ec7440304f7c14df6d63fa4a0ebdf23754da79c8e43ad8cbff76
Secunia Security Advisory 40350
Posted Jun 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in IBM WebSphere Application Server, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 5d8f1f697771ef5a6768890cde1abe3e947ba51cc12af1f3010153112f31bd87
Secunia Security Advisory 40366
Posted Jun 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for libtiff. This fixes some vulnerabilities, which can be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
systems | linux, fedora
SHA-256 | a8ecc34b9cc0cf8f61738d579e9f0532b8005c79f9a644a0e0200f13bda60e82
Secunia Security Advisory 40353
Posted Jun 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM WebSphere Application Server, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 439dc625db40c376fbe0035f711036dae32e73c8eec174d2482c7c4cc4b709f0
Secunia Security Advisory 40329
Posted Jun 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Bigforum, which can be exploited by malicious people to conduct SQL injection attacks and compromise a vulnerable system.

tags | advisory, vulnerability, sql injection
SHA-256 | 6c3d04dfdec6b9adeb4703c021dc682259f358ba19b4cb9d6cd40c25710add84
Secunia Security Advisory 40368
Posted Jun 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - VMware has issued an update for the Console OS (COS) kernel. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions, disclose potentially sensitive information, potentially gain escalated privileges, or to cause a DoS (Denial of Service) and by malicious people to cause a DoS.

tags | advisory, denial of service, kernel, local, vulnerability
SHA-256 | cdedbf21f942dc843c0040f4238f56336ec59fd9e082db0e7137c3bc6f098286
Secunia Security Advisory 40296
Posted Jun 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in the JomSocial component for Joomla, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | b654983f497fdd69ce4acb4d19958aad85c48cf0d32d9c3c930c4d16be1e8117
Secunia Security Advisory 40272
Posted Jun 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Allomani Audio & Video Library, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 765a360e83b19753d59653e7a8a1225cda10e903e7a1f56e1429b5ae599e4c03
Secunia Security Advisory 40371
Posted Jun 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in Limny, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | ca0e94c859a8be88032ea32e404b26a972fa4d4799cd035c80cc9dcf1fd173e5
Secunia Security Advisory 40358
Posted Jun 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in 2daybiz B2B Portal Script, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 15f85a35f8d7d2c8c6bdd519ab16d9a90f7c2bb595d22bfb1a2047451810a39d
Secunia Security Advisory 40374
Posted Jun 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Linear eMerge, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | d2b710140f2cd086dcaedd0166a3af8a82bbb12483446791562e93ff49349491
Secunia Security Advisory 40357
Posted Jun 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in EJBCA, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | c6e8294817db0811e1029e36f78d992f0159f9ef77af041f0cbbe61bb1734394
Secunia Security Advisory 40342
Posted Jun 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in S2 NetBox, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | d68dbad773ed44ec1274ce26dc89cbf28b4a2d2a4f7fcbc387a85b9f43e268d7
Secunia Security Advisory 40196
Posted Jun 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Apple iTunes. Some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, or compromise a user's system.

tags | advisory, vulnerability
systems | apple
SHA-256 | 679484df8cef8d3554e947d6cc1344d5150a6cdca18512722a6e3980c72c71b5
MIMEDefang Email Scanner 2.70
Posted Jun 25, 2010
Authored by Dianne Skoll | Site mimedefang.org

MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with the Sendmail 8.11 and newer "Milter" API, which makes it more flexible and efficient than procmail-based approaches.

Changes: This fixes just one bug in 2.69 and earlier versions - The embedded Perl code did not call PERL_SET_CONTEXT after forking, which resulted in strange behavior in the scanning code.
systems | windows, unix
SHA-256 | ff6187cd22150c65d31625ecf27823f043092af430b6ecc0d31b73fd15545b82
Suricata IDPE 0.9.2
Posted Jun 25, 2010
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: Support was added for DAG cards, reassembled stream scanning, the http_uri keyword, dce keywords, and ratefilter. Support was improved for uricontent, asn1, and threshold. Memory leaks were fixed. Performance was improved.
tags | tool, intrusion detection
systems | unix
SHA-256 | c9ba465cbb5fa29ae52700694ea0bfaa04d728c4c3c3120171e759822102661e
Secunia Security Advisory 40267
Posted Jun 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in activeCollab, which can be exploited by malicious users to disclose sensitive information and conduct script insertion attacks.

tags | advisory, vulnerability
SHA-256 | 58c1205c52f9578ec3417bffaeebe07b622d1e12d62e71bd0264fbb29ce786e2
Secunia Security Advisory 40300
Posted Jun 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Bugzilla, which can be exploited by malicious, local users and malicious people to disclose sensitive information.

tags | advisory, local, vulnerability
SHA-256 | e4bb57fe7dbf309f38f90e39444697e4d6deb392bf552edb6f05d85d33e5a7c7
Secunia Security Advisory 40365
Posted Jun 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for firefox and xulrunner. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or to compromise a user's system.

tags | advisory, vulnerability
systems | linux, fedora
SHA-256 | de50f4ab06b479607d93f3a5bcb30bc7731567606f2bbe4916ac8d71f4452c29
Mandriva Linux Security Advisory 2010-126
Posted Jun 25, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-126 - Multiple vulnerabilities has been found and corrected in mozilla-thunderbird.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2010-1121, CVE-2010-1196, CVE-2010-1199, CVE-2010-1200, CVE-2010-1202
SHA-256 | 577535c1f4fc4adabec4af9da3d89d9a8dc0f93328ba93d9d6fe46095d25bff7
Lois Software 2.0a SQL Injection
Posted Jun 25, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

Lois Software version 2.0a suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 75f53b87e3e7cd2b81d2404998f2c9cc542bb53eec94739bf0a08d7cc2ddedc4
ForumCMS 08.06.2010 Cross Site Scripting
Posted Jun 25, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

ForumCMS version 08.06.2010 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 770611e390682639407bc94786d285a43c2f24c0b328fe9c1a018bacac6d3cfa
AdaptCMS 2.0.0 Beta Remote File Inclusion
Posted Jun 25, 2010
Authored by v3n0m

AdaptCMS version 2.0.0 Beta suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | d7ca9fd72e39cbf28c2f177b2081b762f4b52ccc52d30baab9b2bbcd7e82bc96
2daybiz Real Estate Portal SQL Injection
Posted Jun 25, 2010
Authored by Sangteamtham

2daybiz Real Estate Portal suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 958c28734582cb1b237814b4c55875d35a948afb726f23464d0f3be9c7b83e15
Page 1 of 3
Back123Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close