exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 31 RSS Feed

Files from Pardus

Email addressbilgi at pardus.org.tr
First Active2008-08-13
Last Active2008-12-02
Pardus Linux Security Advisory 2008.77
Posted Dec 2, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-77 - Two vulnerabilities have been fixed in ffmpeg which can cause to a DoS (Denial of Service).Versions below 0.4.9_20080909-48-16 are affected.

tags | advisory, denial of service, vulnerability
systems | linux
SHA-256 | 020d5a4726238fdff876dfab924ad97c0bab8cfbd235da8c0f446a73adaceb2b
Pardus Linux Security Advisory 2008.71
Posted Nov 14, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-71 -ClamAV contains an off-by-one heap overflow vulnerability in the code responsible for parsing VBA project files. Successful exploitation could allow an attacker to execute arbitrary code with the privileges of the 'clamd' process by sending an email with a prepared attachment.

tags | advisory, overflow, arbitrary
systems | linux
SHA-256 | 930f71b9add142ea985cb6e2db72995a5489fb4d104b8caa4ec7c49cf5342b5f
Pardus Linux Security Advisory 2008.70
Posted Nov 14, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-70 -A vulnerability has been reported in GnuTLS, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to an error when validating the X.509 certificate chain and can be exploited to spoof arbitrary names e.g. during a Man-in-the-Middle (MitM) attack.

tags | advisory, arbitrary, spoof
systems | linux
advisories | CVE-2008-4989
SHA-256 | 3c2662b7e460287e9cc145ea7d0b9487ff84e81276c0932011ff5059ef43322b
Pardus Linux Security Advisory 2008.69
Posted Nov 11, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-69 - A vulnerability has been reported in libpng, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to a memory leak error within the "png_handle_tEXt()" function in pngrutil.c. This can be exploited to potentially exhaust all available memory via a specially crafted PNG image. Versions below 1.2.33-16-6 are affected.

tags | advisory, denial of service, memory leak
systems | linux
SHA-256 | af59534916e47c11cc4641f00354e8aa4e7d2fa674f1633e8291fdd1ba245ae2
Pardus Linux Security Advisory 2008.67
Posted Nov 8, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-67 - A remotely exploitable heap-based buffer overflow exists in libcaudio versions prior to 0.99.12-2-2.

tags | advisory, overflow
systems | linux
SHA-256 | 6273274b35ca23a850c3df31e3310cf18e41dbdfa85a0db467c45b6b489785d3
Pardus Linux Security Advisory 2008.66
Posted Nov 8, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-66 - An untrusted search path vulnerability in BPY_interface in Blender 2.46 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to an erroneous setting of sys.path by the PySys_SetArgv function.Blender versions prior to 2.47-14-3 are affected.

tags | advisory, arbitrary, local, trojan, python
systems | linux
SHA-256 | f6c4f042b3d94489e7fc447f94e9dc1e3fc5a416d6e1396261743844b53235e9
Pardus Linux Security Advisory 2008.64
Posted Nov 8, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-64 - A denial of service condition from invalid message address parsing exists in Dovecot versions before 1.1.6-18-3.

tags | advisory, denial of service
systems | linux
SHA-256 | 23e2c4b0204b71072efe9f5aae407275eff23fa3c9e66fcd6c3f43ffc8bd5cc1
Pardus Linux Security Advisory 2008.63
Posted Nov 8, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-63 - Some vulnerabilities with unknown impact have been reported in imlib2. Versions before 1.4.2-10-3 are affected.

tags | advisory, vulnerability
systems | linux
SHA-256 | 81dd6a0ae6ea047bdfd8be08f9927daed8b7dcfb3edb692e59a5485356ae15cf
Pardus Linux Security Advisory 2008.65
Posted Nov 5, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-62 - The getbulk code in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via vectors related to the number of responses or repeats.

tags | advisory, remote, denial of service
systems | linux
SHA-256 | ba0220feac8ba2e8bd794b3246c5288dac98fbeee797e7d8a94eda1607ef948f
Pardus Linux Security Advisory 2008.62
Posted Nov 5, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-62 - A vulnerability has been reported in Smarty, which can be exploited by malicious people to bypass certain security restrictions. Versions below 2.6.20-6-3 are affected.

tags | advisory
systems | linux
SHA-256 | 654d926a65e9a1b631321427a9345b5eaecde41c425c884a5ff08596250ad412
Pardus Linux Security Advisory 2008.61
Posted Nov 5, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-61 - Some vulnerabilities have been discovered in KTorrent, which can be exploited by malicious users to compromise a vulnerable system and malicious people to bypass certain security restrictions. Versions below 2.2.7-30-4 are affected.

tags | advisory, vulnerability
systems | linux
SHA-256 | 9561f7dade50a79ef90383d23eb5333696780886fc96417a1f90bdc16dc81273
Pardus Linux Security Advisory 2008.41
Posted Sep 6, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - Romain Francoise has found a security risk in a feature of GNU Emacs related to how Emacs interacts with Python.

tags | advisory, python
systems | linux
SHA-256 | 48a13887b9e512f4baabfaf2c71af289e1947c6fe595ea6051cbd6d9f0bd19f5
Pardus Linux Security Advisory 2008.40
Posted Sep 6, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - A security issue has been reported in Postfix, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux
SHA-256 | 958c2becbf55d42c7936f60de3ecc7d90e1b2002e2058419d481531dd00703ed
Pardus Linux Security Advisory 2008.39
Posted Sep 6, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - Multiple vulnerabilities have been discovered in Clamav including a DoS (Denial of Service) vulnerability and memory leaks.

tags | advisory, denial of service, vulnerability, memory leak
systems | linux
SHA-256 | 2331c30928290a28bfd081bc7ad6f8d8dbfe7c81e96370e17f7a6bef9463794e
Pardus Linux Security Advisory 2008.38
Posted Sep 6, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - Some vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux
SHA-256 | 7a2756675c858fefab07fe032db2c66d614e3bf57731f0e65770eff5c2169b3f
Pardus Linux Security Advisory 2008.37
Posted Sep 6, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - A vulnerability has been reported in Django, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
systems | linux
SHA-256 | 0f3e2d8d2aa2a771508d97fb6450823f97cb7e84e3836afa0152e50cc3924c78
Pardus Linux Security Advisory 2008.36
Posted Sep 5, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - Multiple memory leaks and buffer overflows have been addressed in ffmpeg. Affected packages are mplayer versions below 0.0_20080825-92-11 and ffmpeg versions below 0.4.9_20080825-46-14.

tags | advisory, overflow, memory leak
systems | linux
SHA-256 | b4b27cac67b92d6e20c70530934418439a246afaab6d193ab1ef0f54f41e36ab
Pardus Linux Security Advisory 2008.35
Posted Sep 3, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - A vulnerability has been reported in Ruby, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, ruby
systems | linux
advisories | CVE-2008-3790
SHA-256 | c6e9d536c199df4973a3e06474000294ccc5a550605dc6539e629df16a27784f
Pardus Linux Security Advisory 2008.34
Posted Sep 3, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - A vulnerability was reported in GNU ed. A remote user can cause arbitrary code to be executed on the target user's system.

tags | advisory, remote, arbitrary
systems | linux
SHA-256 | 3187bcf64a1c2bcc2493093e213b416ee5994503d7ff1b5bc5c2c91db758be95
Pardus Linux Security Advisory 2008.33
Posted Aug 31, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - A security issue has been reported in OpenSC, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux
advisories | CVE-2008-2235
SHA-256 | 5f2a2b3d0283b838e15c5e12ba9ccab3134fb5e185e2e38e881cf0869f083b2e
Pardus Linux Security Advisory 2008.32
Posted Aug 31, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - Juraj Skripsky has reported a vulnerability in Mono, which can be exploited by malicious people to conduct HTTP header injection attacks.

tags | advisory, web
systems | linux
SHA-256 | a110dc1f502aff35301058c2b04af09d0ba26ed433987154ac42c5cb4f2b88fa
Pardus Linux Security Advisory 2008.31
Posted Aug 27, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - A vulnerability has been reported in LibTIFF, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a user's system.

tags | advisory, denial of service
systems | linux
advisories | CVE-2008-2327
SHA-256 | 4b1155a3c4fc7782e4b2a42dbe108c156dbc1b5e5f22ea2ec736bbd250b6459c
Pardus Linux Security Advisory 2008.30
Posted Aug 26, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - Insufficient sanitization can lead to Vim executing arbitrary commands when performing keyword or tag lookup.

tags | advisory, arbitrary
systems | linux
SHA-256 | 1af038f49dd7be46df684cca00b19f3590775e4fc513b99292bcdeb1e65d3219
Pardus Linux Security Advisory 2008.29
Posted Aug 26, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - Multiple vulnerabilities have discovered by g_ which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux
advisories | CVE-2008-3732
SHA-256 | 19543faebfa0c824149c043f1f5ca4914a2d200771201b1afa424f14923c36ef
Pardus Linux Security Advisory 2008.28
Posted Aug 26, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - A vulnerability has been reported in Libxml2, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux
advisories | CVE-2008-3281
SHA-256 | 64c355dcce91e0b0f828984ad3723412eb26fdf00f38a5667c4504d985959f28
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close