what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 32 of 32 RSS Feed

Files Date: 2011-02-17 to 2011-02-18

Secunia Security Advisory 43283
Posted Feb 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in SRWare Iron, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, vulnerability
SHA-256 | a74b542a683a1fb565a472128f4fe9b7ef872d97c87512ec093e2e7068f0528e
Safari On iPod Touch 4.2 Denial Of Service
Posted Feb 17, 2011
Authored by Xinapse

This javascript triggers a denial of service condition on Safari for iPod Touch version 4.2 that causes the application to crash.

tags | exploit, denial of service, javascript
SHA-256 | 45e8470be0c976e23409c9de4417dcd3aeebb92bda36d9480b4b3700f5b40794
Zero Day Initiative Advisory 11-088
Posted Feb 17, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-088 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco Security Agent Management Console. Authentication is not required to exploit this vulnerability. The flaw exists within the webagent.exe component which is handed requests by an Apache instance that listens by default on TCP port 443. When handling an st_upload request the process does not properly validate POST parameters used for a file creation. The contents of this newly created file are controllable via another POST variable. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.

tags | advisory, remote, arbitrary, tcp
systems | cisco
advisories | CVE-2011-0364
SHA-256 | afbe55b3e564da923681dad32e0726e55ac683aee2d12b50ef9cf2d3abb1b9a3
Zero Day Initiative Advisory 11-087
Posted Feb 17, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-087 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Server. Authentication is not required to exploit this vulnerability. The flaw exists within the '/opt/novell/iprint/bin/ipsmd' component this component communicates with 'ilprsrvd' which listens on TCP port 515. When handling multiple LPR opcodes the process blindly copies user supplied data into a fixed-length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the iprint user.

tags | advisory, remote, arbitrary, tcp
advisories | CVE-2010-4328
SHA-256 | d7e0117a956cd472bee18fe8352467a732e437b089cf3146bcd59c8a6c723556
Debian Security Advisory 2168-1
Posted Feb 17, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2168-1 - Two vulnerabilities were discovered the distributed filesystem AFS. Andrew Deason discovered that a double free in the Rx server process could lead to denial of service or the execution of arbitrary code. It was discovered that insufficient error handling in the kernel module could lead to denial of service.

tags | advisory, denial of service, arbitrary, kernel, vulnerability
systems | linux, debian
advisories | CVE-2011-0430, CVE-2011-0431
SHA-256 | 2851ebec291b8b1441546e98bdb9fc1d229c895084c4ab1c0adf2820fc3432cb
Debian Security Advisory 2167-1
Posted Feb 17, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2167-1 - It was discovered that phpMyAdmin, a tool to administer MySQL over the web, suffers from an arbitrary query execution vulnerability.

tags | advisory, web, arbitrary
systems | linux, debian
advisories | CVE-2011-0987
SHA-256 | 34e352b971430e15f0cf88ee127f8fa67f1806585d70f91210a7f2fb7bd221b2
Cisco Security Advisory 20110216-csa
Posted Feb 17, 2011
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device. Cisco has released free software updates that address this vulnerability. A workaround is available to mitigate this vulnerability.

tags | advisory, remote, code execution
systems | cisco
advisories | CVE-2011-0364
SHA-256 | 8a30271766ef9217b8676a1167d5ca59656931fa55e196a9c9e122a70d3f9355
Page 2 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close