2 Debian Security Advisory 4621-1 By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 16:41:43 GMT Debian Linux Security Advisory 4621-1 - Several vulnerabilities have been discovered in the OpenJDK Java runtime, resulting in denial of service, incorrect implementation of Kerberos GSSAPI and TGS requests or incorrect TLS handshakes. Full Article
2 Debian Security Advisory 4624-1 By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 17:31:24 GMT Debian Linux Security Advisory 4624-1 - Several vulnerabilities were discovered in evince, a simple multi-page document viewer. Full Article
2 Debian Security Advisory 4625-1 By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 18:02:39 GMT Debian Linux Security Advisory 4625-1 - Multiple security issues have been found in Thunderbird, which may lead to the execution of arbitrary code or denial of service. Full Article
2 Debian Security Advisory 4627-1 By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 15:04:51 GMT Debian Linux Security Advisory 4627-1 - Cross site scripting, denial of service, and various other vulnerabilities have been discovered in the webkit2gtk web engine. Full Article
2 Debian Security Advisory 4629-1 By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 15:38:05 GMT Debian Linux Security Advisory 4629-1 - Simon Charette discovered that Django, a high-level Python web development framework, did not properly handle input in its PostgreSQL module. A remote attacker could leverage this to perform SQL injection attacks. Full Article
2 Debian Security Advisory 4626-1 By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 15:05:02 GMT Debian Linux Security Advisory 4626-1 - Multiple security issues were found in PHP, a widely-used open source general purpose scripting language which could result in information disclosure, denial of service or incorrect validation of path names. Full Article
2 SmartClient 120 Information Disclosure / XML Injection / LFI / Code Execution By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 15:12:28 GMT SmartClient version 120 suffers from information disclosure, local file inclusion, remote file upload, and XML external entity injection vulnerabilities. Full Article
2 Debian Security Advisory 4628-1 By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 15:28:10 GMT Debian Linux Security Advisory 4628-1 - Multiple security issues were found in PHP, a widely-used open source general purpose scripting language which could result in information disclosure, denial of service or incorrect validation of path names. Full Article
2 Citrix Gateway 11.1 / 12.0 / 12.1 Information Disclosure By packetstormsecurity.com Published On :: Mon, 09 Mar 2020 17:04:24 GMT Citrix Gateway versions 11.1, 12.0, and 12.1 suffer from an information disclosure vulnerability. Full Article
2 Netis E1+ 1.2.32533 Password Leak By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 14:41:23 GMT Netis E1+ version 1.2.32533 suffers from an unauthenticated wifi password disclosure vulnerability. Full Article
2 Cisco C690 Email Security Appliance 11.0.2-044 IronPort Header Injection By packetstormsecurity.com Published On :: Tue, 03 Sep 2019 16:39:48 GMT Cisco C690 Email Security Appliance version 11.0.2-044 IronPort remote host header injection exploit. Full Article
2 Cisco WLC 2504 8.9 Denial Of Service By packetstormsecurity.com Published On :: Wed, 04 Dec 2019 20:22:22 GMT Cisco WLC 2504 version 8.9 suffers from a denial of service vulnerability. Full Article
2 Cisco Data Center Network Manager 11.2 Remote Code Execution By packetstormsecurity.com Published On :: Thu, 06 Feb 2020 17:45:40 GMT Cisco Data Center Network Manager version 11.2 remote code execution exploit. Full Article
2 Cisco Data Center Network Manager 11.2.1 SQL Injection By packetstormsecurity.com Published On :: Thu, 06 Feb 2020 17:48:08 GMT Cisco Data Center Network Manager version 11.2.1 suffers from a remote SQL injection vulnerability. Full Article
2 Cisco Data Center Network Manager 11.2.1 Command Injection By packetstormsecurity.com Published On :: Thu, 06 Feb 2020 17:51:21 GMT Cisco Data Center Network Manager version 11.2.1 remote command injection exploit. Full Article
2 Red Hat Security Advisory 2017-1262-01 By packetstormsecurity.com Published On :: Mon, 22 May 2017 20:15:52 GMT Red Hat Security Advisory 2017-1262-01 - The rpcbind utility is a server that converts Remote Procedure Call program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine. Security Fix: It was found that due to the way rpcbind uses libtirpc, a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. Full Article
2 Red Hat Security Advisory 2017-1267-01 By packetstormsecurity.com Published On :: Tue, 23 May 2017 20:20:00 GMT Red Hat Security Advisory 2017-1267-01 - The rpcbind utility is a server that converts Remote Procedure Call program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine. Security Fix: It was found that due to the way rpcbind uses libtirpc, a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. Full Article
2 Red Hat Security Advisory 2017-1268-01 By packetstormsecurity.com Published On :: Wed, 24 May 2017 02:04:57 GMT Red Hat Security Advisory 2017-1268-01 - The libtirpc packages contain SunLib's implementation of transport-independent remote procedure call documentation, which includes a library required by programs in the nfs-utils and rpcbind packages. Security Fix: It was found that due to the way rpcbind uses libtirpc, a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. Full Article
2 Red Hat Security Advisory 2017-1395-01 By packetstormsecurity.com Published On :: Tue, 06 Jun 2017 14:06:02 GMT Red Hat Security Advisory 2017-1395-01 - This package contains a new implementation of the original libtirpc, transport-independent RPC library for NFS-Ganesha. Security Fix: It was found that due to the way rpcbind uses libtirpc, a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. Full Article
2 Asterisk Project Security Advisory - AST-2017-011 By packetstormsecurity.com Published On :: Wed, 08 Nov 2017 23:44:44 GMT Asterisk Project Security Advisory - A memory leak occurs when an Asterisk pjsip session object is created and that call gets rejected before the session itself is fully established. When this happens the session object never gets destroyed. Full Article
2 Ubuntu Security Notice USN-3678-2 By packetstormsecurity.com Published On :: Tue, 12 Jun 2018 15:58:06 GMT Ubuntu Security Notice 3678-2 - Wen Xu discovered that the ext4 filesystem implementation in the Linux kernel did not properly handle corrupted meta data in some situations. An attacker could use this to specially craft an ext4 file system that caused a denial of service when mounted. It was discovered that the 802.11 software simulator implementation in the Linux kernel contained a memory leak when handling certain error conditions. A local attacker could possibly use this to cause a denial of service. Various other issues were also addressed. Full Article
2 Debian Security Advisory 4367-2 By packetstormsecurity.com Published On :: Thu, 17 Jan 2019 16:01:16 GMT Debian Linux Security Advisory 4367-2 - The Qualys Research Labs reported that the backported security fixes shipped in DSA 4367-1 contained a memory leak in systemd-journald. This and an unrelated bug in systemd-coredump are corrected in this update. Full Article
2 Red Hat Security Advisory 2019-0201-01 By packetstormsecurity.com Published On :: Tue, 29 Jan 2019 19:32:47 GMT Red Hat Security Advisory 2019-0201-01 - The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. Issues addressed include a memory leak vulnerability. Full Article
2 Red Hat Security Advisory 2019-2196-01 By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 20:59:31 GMT Red Hat Security Advisory 2019-2196-01 - The zziplib is a lightweight library to easily extract data from zip files. A memory leak has been addressed. Full Article
2 Nanometrics Centaur 4.3.23 Memory Leak By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 15:17:55 GMT Nanometrics Centaur version 4.3.23 suffers from an unauthenticated remote memory leak vulnerability. Full Article
2 Red Hat Security Advisory 2020-1715-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:37:35 GMT Red Hat Security Advisory 2020-1715-01 - The dnsmasq packages contain Dnsmasq, a lightweight DNS forwarder and DHCP server. Issues addressed include a memory leak vulnerability. Full Article
2 Red Hat Security Advisory 2020-1735-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:37:52 GMT Red Hat Security Advisory 2020-1735-01 - The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space. Issues addressed include denial of service and memory leak vulnerabilities. Full Article
2 Red Hat Security Advisory 2020-1984-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 22:55:55 GMT Red Hat Security Advisory 2020-1984-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a memory leak vulnerability. Full Article
2 HexView Security Advisory 2004-05-03.01 By packetstormsecurity.com Published On :: Tue, 18 May 2004 23:46:47 GMT SGI Security Advisory 20040503-01-P - Under certain conditions, rpc.mountd goes into an infinite loop while processing some RPC requests, causing a denial of service. Affected releases: SGI IRIX 6.5.x. Full Article
2 HexView Security Advisory 2004-05-07.01 By packetstormsecurity.com Published On :: Wed, 26 May 2004 21:33:25 GMT SGI Security Advisory 20040507-01-P - Adam Gowdiak from the Poznan Supercomputing and Networking Center has reported that under certain conditions the /usr/sbin/cpr binary can be forced to load a user provided library while restarting the checkpointed process which can then be used to obtain root user privileges. All versions of IRIX prior to 6.5.25 are affected. Full Article
2 HexView Security Advisory 2004-06-01.01 By packetstormsecurity.com Published On :: Fri, 18 Jun 2004 00:25:00 GMT SGI Security Advisory 20040601-01-P - Adam Gowdiak from the Poznan Supercomputing and Networking Center has reported that under certain conditions non privileged users can use the syssgi system call SGI_IOPROBE to read and write kernel memory which can be used to obtain root user privileges. Patches have been released for this and other issues. At this time, IRIX versions 6.5.20 to 6.5.24 are considered susceptible. Full Article
2 NetBSD Security Advisory 2004.10 By packetstormsecurity.com Published On :: Thu, 30 Dec 2004 09:10:46 GMT NetBSD Security Advisory 2004-010 - Some of the functions in /usr/src/sys/compat/ which implement execution of foreign binaries (such as Linux, FreeBSD, IRIX, OSF1, SVR4, HPUX, and ULTRIX) use argument data in unsafe ways prior to calling the kernel syscall. Full Article
2 iDEFENSE Security Advisory 2005-01-13.3 By packetstormsecurity.com Published On :: Sun, 16 Jan 2005 05:55:12 GMT iDEFENSE Security Advisory 01.13.05-3 - Local exploitation of a design error vulnerability in the inpview command included in multiple versions of Silicon Graphics Inc.'s IRIX could allow for arbitrary code execution as the root user. iDEFENSE has confirmed the existence of this vulnerability in SGI IRIX version 6.5.9 (feature) and 6.5.22 (maintenance). Full Article
2 iDEFENSE Security Advisory 2005-04-07.1 By packetstormsecurity.com Published On :: Sun, 17 Apr 2005 19:35:49 GMT iDEFENSE Security Advisory 04.07.05 - Local exploitation of an information disclosure vulnerability in the gr_osview command included in multiple versions of Silicon Graphics Inc.'s IRIX Operating System could allow for the disclosure of sensitive information such as the root user's password hash. The vulnerability specifically exists in the way that gr_osview opens user-specified description files without dropping privileges. When this is combined with the debug option, it is possible to dump a line from an arbitrary file, regardless of its protection. Full Article
2 iDEFENSE Security Advisory 2005-04-07.2 By packetstormsecurity.com Published On :: Sun, 17 Apr 2005 19:37:10 GMT iDEFENSE Security Advisory 04.07.05 - Local exploitation of a file overwrite vulnerability in the gr_osview command included in multiple versions of Silicon Graphics Inc.'s IRIX operating system could allow for the overwriting of arbitrary files, regardless of permissions. The vulnerability specifically exists in the way that gr_osview opens user specified files without dropping privileges. When a file is specified using the -s option, it will be opened regardless of permissions, and operating system usage information will be written into it. Full Article
2 snaresquid-1.2.tar.gz By packetstormsecurity.com Published On :: Tue, 19 Jul 2005 15:24:54 GMT Snare for Squid provides a remote distribution facility for Squid proxy server logs, and is known to run on most Unix variations, including Linux, Solaris, AIX, Tru64, and Irix. Snare for Squid can be used to send data to either a remote or local SYSLOG server, or the Snare Server for centralized collection, analysis, and archival. Full Article
2 iDEFENSE Security Advisory 2005-10-10.t By packetstormsecurity.com Published On :: Tue, 11 Oct 2005 04:50:55 GMT iDEFENSE Security Advisory 10.10.05-1 - Local exploitation of a design error vulnerability in the runpriv command included in multiple versions of Silicon Graphics Inc.'s IRIX could allow for arbitrary code execution as the root user. iDEFENSE has confirmed the existence of this vulnerability in SGI IRIX version 6.5.22 (maintenance). It is suspected that previous and later versions of both the feature and maintenance revisions of IRIX 6.5 are also vulnerable. Full Article
2 Firewall Log Watch 1.2 By packetstormsecurity.com Published On :: Mon, 11 Oct 2010 05:29:32 GMT fwlogwatch is a packet filter and firewall log analyzer with support for Linux ipchains, Linux netfilter/iptables, Solaris/BSD/HP-UX/IRIX ipfilter, Cisco IOS, Cisco PIX/ASA, Netscreen, Elsa Lancom router, and Snort IDS log files. It can output its summaries in text and HTML and has a lot of options. fwlogwatch also features a realtime anomaly response capability with a Web interface. Full Article
2 Secunia Security Advisory 42874 By packetstormsecurity.com Published On :: Mon, 10 Jan 2011 05:18:17 GMT Secunia Security Advisory - A vulnerability has been reported in SGI IRIX, which can be exploited by malicious, local users to disclose potentially sensitive information and cause a DoS (Denial of Service). Full Article
2 GitLab Awards Researcher $20,000 For Remote Code Execution Bug By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:28:19 GMT Full Article headline hacker flaw patch
2 Amiga Launches A $2,500 Quad-Core Lunchbox PC By packetstormsecurity.com Published On :: Fri, 23 Mar 2012 06:34:35 GMT Full Article headline commodore
2 A092600-1 By packetstormsecurity.com Published On :: Thu, 28 Sep 2000 21:37:22 GMT Atstake Security Advisory - PalmOS Password Retrieval and Decoding. Severity: Moderate. PalmOS offers a built-in Security application which is used for the legitimate user to protect and hide records from unauthorized users by means of a password. Passwords can easily be obtained and decoded allowing an attacker to access all private records on a Palm device. Full Article
2 Samhain File Integrity Checker 4.1.2 By packetstormsecurity.com Published On :: Mon, 21 Dec 2015 17:57:30 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
2 Samhain File Integrity Checker 4.2.0 By packetstormsecurity.com Published On :: Tue, 01 Nov 2016 00:33:33 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
2 AIX 6.1 / 7.1 / 7.2.0.2 lsmcode Local Root By packetstormsecurity.com Published On :: Fri, 04 Nov 2016 13:33:33 GMT AIX versions 6.1, 7.1, and 7.2.0.2 lsmcode local root exploit. Full Article
2 AIX 5.3 / 6.1 / 7.1 / 7.2 lquerylv Local Root By packetstormsecurity.com Published On :: Fri, 04 Nov 2016 14:44:44 GMT This exploit takes advantage of known issues with debugging functions within the AIX linker library. It takes advantage of known functionality, and focuses on badly coded SUID binaries which do not adhere to proper security checks prior to seteuid/open/writes. Full Article
2 IBM AIX 6.1 / 7.1 / 7.2 Bellmail Privilege Escalation By packetstormsecurity.com Published On :: Thu, 22 Dec 2016 07:02:22 GMT IBM AIX versions 6.1, 7.1, and 7.2 suffer from a Bellmail privilege escalation vulnerability. Full Article
2 Samhain File Integrity Checker 4.2.1 By packetstormsecurity.com Published On :: Thu, 06 Apr 2017 19:40:07 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
2 Samhain File Integrity Checker 4.2.2 By packetstormsecurity.com Published On :: Mon, 03 Jul 2017 04:59:31 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article
2 Samhain File Integrity Checker 4.2.3 By packetstormsecurity.com Published On :: Wed, 01 Nov 2017 16:25:45 GMT Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Full Article