Quantcast
Channel: Files Date: 2010-12-14 to 2010-12-15 ≈ Packet Storm
Browsing latest articles
Browse All 25 View Live

FontForge .BDF Buffer Overflow

FontForge version 0.0.20100501-2 is vulnerable to a .bdf file font file stack-based buffer overflow vulnerability.

View Article



HP Security Bulletin HPSBUX02608 SSRT100333

HP Security Bulletin HPSBUX02608 SSRT100333 - Potential security vulnerabilities have been identified in Java Runtime Environment (JRE) and Java Developer Kit (JDK) running on HP-UX. These...

View Article

Zero Day Initiative Advisory 10-283

Zero Day Initiative Advisory 10-283 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell ZENWorks. Authentication is not required to exploit this...

View Article

Zero Day Initiative Advisory 10-284

Zero Day Initiative Advisory 10-284 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell ZENWorks. Authentication is not required to exploit this...

View Article

Zero Day Initiative Advisory 10-285

Zero Day Initiative Advisory 10-285 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Zenworks Desktop Management. Authentication is not...

View Article


Secunia Security Advisory 42569

Secunia Security Advisory - Fedora has issued an update for firefox and xulrunner. This fixes a weakness and multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site...

View Article

Secunia Security Advisory 42568

Secunia Security Advisory - Fedora has issued an update for thunderbird. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system.

View Article

Secunia Security Advisory 42573

Secunia Security Advisory - Debian has issued an update for xulrunner. This fixes a weakness and some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and...

View Article


Secunia Security Advisory 42346

Secunia Security Advisory - Two weaknesses and some vulnerabilities have been discovered in SilverStripe, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose...

View Article


Secunia Security Advisory 42492

Secunia Security Advisory - Some vulnerabilities with an unknown impact have been reported in Adobe Photoshop.

View Article

Secunia Security Advisory 42580

Secunia Security Advisory - R

View Article

Secunia Security Advisory 42626

Secunia Security Advisory - A vulnerability has been reported in Lotus Mobile Connect, which can be exploited by malicious people to conduct cross-site scripting attacks.

View Article

Secunia Security Advisory 42486

Secunia Security Advisory - Multiple vulnerabilities have been reported in Orion Network Performance Monitor, which can be exploited by malicious people to conduct cross-site scripting attacks.

View Article


ACROS Security Problem Report 2010-12-14.1

ACROS Security Problem Report #2010-12-14-1 - A binary planting vulnerability in Windows Address Book and Windows Contacts allows local or remote (even Internet-based) attackers to deploy and execute...

View Article

RealPlayer RealMedia Data Handling Heap Overflow

VUPEN Vulnerability Research Team discovered three critical vulnerabilities in RealPlayer. These vulnerabilities are caused by heap overflow errors when handling malformed RealMedia data, which could...

View Article


Honggfuzz CLI Fuzzer 0.1

Honggfuzz is a general-purpose, easy-to-use fuzzer with interesting analysis options. Given a starting corpus of test files, Honggfuzz supplies and modifies input to a test program and utilizes the...

View Article

iDEFENSE Security Advisory 2010-12-14.1

iDefense Security Advisory 12.14.10 - Remote exploitation of a memory corruption vulnerability in Microsoft Corp.'s Internet Explorer could allow an attacker to execute arbitrary code with the...

View Article


slickMsg 0.7-alpha Cross Site Scripting

slickMsg version 0.7-alpha suffers from a cross site scripting vulnerability.

View Article

Google Urchin 5.7.03 Local File Inclusion

Google Urchin version 5.7.03 suffers from a local file inclusion vulnerability.

View Article

BlogCFC Cross Site Scripting

BlogCFC suffers from multiple cross site scripting vulnerabilities.

View Article

RealPlayer RA5 Data Handling Heap Overflow Vulnerability

VUPEN Vulnerability Research Team discovered a critical vulnerability in RealPlayer. The vulnerability is caused by a heap overflow error when handling malformed RA5 files, which could be exploited by...

View Article


USBsploit 0.5

USBsploit is a proof of concept that will generate Reverse TCP backdoors (x86, x64, all ports) and malicious LNK files. USBsploit works through Meterpreter sessions with a light (27MB) modified version...

View Article


Internet Explorer CSS SetUserClip Memory Corruption

This Metasploit module exploits a memory corruption vulnerability within Microsoft's HTML engine (mshtml). When parsing an HTML page containing a specially crafted CSS tag, memory corruption occurs...

View Article

Botan C++ Crypto Algorithms Library 1.9.12

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate...

View Article

OpenBSD IPSEC Backdoored

Theo de Raadt has received a mail stating that the IPSEC stack in OpenBSD may have been backdoored since the year 2000 thanks to the FBI.

View Article

Browsing latest articles
Browse All 25 View Live




Latest Images