exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 63 RSS Feed

Files Date: 2005-07-28 to 2005-07-29

Gentoo Linux Security Advisory 200507-26
Posted Jul 28, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200507-26 - GNU Gadu, CenterICQ, Kadu, EKG and libgadu are vulnerable to an integer overflow. Versions less than 2.2.6-r1 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2005-1852
SHA-256 | 8c3aaaaccf0fac192625a06806e0153319ef322a65cd4a6f3a2eae163005d614
Debian Linux Security Advisory 766-1
Posted Jul 28, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 766-1 - A vulnerability has been discovered in webcalendar, a PHP based multi-user calendar, that can lead to the disclosure of sensitive information to unauthorised parties.

tags | advisory, php
systems | linux, debian
advisories | CVE-2005-2320
SHA-256 | a27b79d26374c35fbcc5b2e450f99e4b707fffe22b122a16083190fc49a2eef2
Debian Linux Security Advisory 765-1
Posted Jul 28, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 765-1 - A buffer overflow was discovered in the handling of the LINEMODE suboptions in telnet clients. Heimdal, a free implementation of Kerberos 5, also contains such a client. This can lead to the execution of arbitrary code when connected to a malicious server.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2005-0469
SHA-256 | b7baf9fd1de6d686f58aaba35950d80f6e018eae34e768acc7cda018e5fabe46
novellBO653.txt
Posted Jul 28, 2005
Authored by Francisco Amato | Site infobyte.com.ar

The Novell GroupWise 6.5.3 client suffers from a remote buffer overflow vulnerability.

tags | advisory, remote, overflow
SHA-256 | 416b19430a2eb949354f800a7e077717fb0241942ea239754df3b2782f4eea1e
NILESA-20050701.txt
Posted Jul 28, 2005
Authored by Yun Jonglim | Site nilesoft.co.kr

When the UnixWare 7.x version of the RPC portmapper (rpcbind) receives an invalid portmap request, it falls into a denial of service state and cannot respond.

tags | advisory, denial of service
systems | unixware
advisories | CVE-2005-2132
SHA-256 | 8807b2907f72caa93595e16a3af544c8a1a1d674b4ca5df6487e048bed5f118b
Gentoo Linux Security Advisory 200507-25
Posted Jul 28, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200507-25 - Neel Mehta and Alex Wheeler discovered that Clam AntiVirus is vulnerable to integer overflows when handling the TNEF, CHM and FSG file formats. Versions less than 0.86.2 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | b3a7fcc88493feb480f9f4e78586c1d835b6e405e85b522567433aff52bda8b7
Gentoo Linux Security Advisory 200507-24
Posted Jul 28, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200507-24 - Several vulnerabilities in the Mozilla Suite allow attacks ranging from the execution of javascript code with elevated privileges to information leakage. Versions less than 1.7.10 are affected.

tags | advisory, javascript, vulnerability
systems | linux, gentoo
SHA-256 | e3bb5316095871b4e09851a2d7a878477943503d8b8037205c99f6a2bbc07840
lotus-disclose.txt
Posted Jul 28, 2005
Authored by Leandro Meiners | Site cybsec.com

Lotus Domino R5 WebMail versions R5, R6, and possibly R4 are susceptible to a default configuration information disclosure vulnerability.

tags | advisory, info disclosure
SHA-256 | 34234d1ec904e4f9c078ad43fec5b2b46d2b151e92f5f498cdf8453683179a04
fetchmail-SA-2005-01.txt
Posted Jul 28, 2005
Authored by Matthias Andree | Site fetchmail.berlios.de

Fetchmail version 1.02 suffers from a remote code injection vulnerability.

tags | advisory, remote
advisories | CVE-2005-2335
SHA-256 | fc3f1ce80d30fc5169baa1476c5710f9cd636aec98c35ccdc729e1c419f34d2c
cartWIZxss.txt
Posted Jul 28, 2005
Authored by Zinho | Site hackerscenter.com

CartWIZ suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 55b39a11e65c04e115b346660460d185b1c7b5902fce31c6167047ef8a26773e
simplicityRemote.txt
Posted Jul 28, 2005
Authored by rgod | Site retrogod.altervista.org

Simplicity OF Upload 1.3 allows for remote code execution and cross site scripting attacks.

tags | exploit, remote, code execution, xss
SHA-256 | 5aed3185aef2e54a81a96802e0d2aa259d7c0541c1281310f0132032e012c832
IBMaccess.txt
Posted Jul 28, 2005
Authored by Sylvain ROGER | Site solucom.fr

The QCWLICON.exe and QCTRAY.exe binaries in IBM Access software allow anyone read access to the configuration of all connections.

tags | advisory
SHA-256 | ca1f1e403e44c575ce47a2a8135a8da6e1b491a26a2754749af7ace99003c1ad
SPIbad.txt
Posted Jul 28, 2005
Authored by 3APA3A

SPIDynamics WebInspect is susceptible to cross-application scripting attacks.

tags | advisory
SHA-256 | 1015978531e7b0bc37dd7eef03b9bb70913a12479637df33e68b9197fcf36a51
FTPshellDoS.txt
Posted Jul 28, 2005
Authored by Reed Arvin | Site reedarvin.thearvins.com

Logging into FTPshell server version 3.38 will cause the ftpshelld.exe process to die, resulting in a denial of service.

tags | exploit, denial of service
SHA-256 | e23a09711cefeb6f0b7eec5f4e9503bbd0e0015aa9b837345d02aeb9944f7ddf
aresFileshare11.txt
Posted Jul 28, 2005
Authored by ATmaCA, Kozan | Site spyinstructors.com

Remote exploitation of a buffer overflow vulnerability in Ares FileShare 1.1 could allow execution of arbitrary code.

tags | advisory, remote, overflow, arbitrary
SHA-256 | 69900714ad4b60f7881d9946c2804a1e724d0a2b64a5262a37935655d22d926d
Gentoo Linux Security Advisory 200507-23
Posted Jul 28, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200507-23 - Kopete contains an internal copy of libgadu and is therefore subject to several input validation vulnerabilities in libgadu. Versions less than 3.4.1-r1 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
advisories | CVE-2005-1852
SHA-256 | 8495487de7b3b61aac52bcedb9567407792fc59429d76c1586ee27556500b41c
Gentoo Linux Security Advisory 200507-22
Posted Jul 28, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200507-22 - The Gentoo Linux Security Audit Team discovered that the sandbox utility was vulnerable to multiple TOCTOU (Time of Check, Time of Use) file creation race conditions. Versions less than 1.2.11 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 8a44b3fd3621a574a9efbe950cc71ea1299e0cb5ab061553b8fa3a8862eb6987
Gentoo Linux Security Advisory 200507-21
Posted Jul 28, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200507-21 - fetchmail does not properly validate UIDs coming from a POP3 mail server. The UID is placed in a fixed length buffer on the stack, which can be overflown. Versions less than 6.2.5.2 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2005-2335
SHA-256 | e183ba8135f58ed6750b8c55799fddc77fe41b5730a1d87bec474be7a913c8cf
SiemensSANTIS50.txt
Posted Jul 28, 2005
Authored by Luca Carettoni

By sending trigger packets to the management port (280/http-mgmt) of a Siemens Santis 50 wireless router, the device freezes the web interface and allows unauthenticated access to the telnet CLI.

tags | exploit, web
SHA-256 | 55fd63fc68a9ff21180c20280c664708b42386f538608ed1c889437dee91b9b0
clamav.pdf
Posted Jul 28, 2005
Authored by Neel Mehta, Alex Wheeler

Clam AntiVirus (ClamAV) versions 0.86.1 and below suffer from remote heap overflows.

tags | advisory, remote, overflow
SHA-256 | d1fb6fbca8fea0d2ff3d187e619c601048b6ef729562695ccc5fe2f00936a6d1
Corsaire Security Advisory 2005-05-03.1
Posted Jul 28, 2005
Authored by Martin O'Neal, Corsaire | Site corsaire.com

Corsaire Security Advisory - The SAP Internet Graphics Server versions below 6.40 Patch 11 are susceptible to a directory traversal attack.

tags | exploit
advisories | CVE-2005-1691
SHA-256 | bc1bf9061a5b291ddad02fbb0d9b84f70b54b11e4937e46f27f17ae2e47c5288
beehiveVulns.txt
Posted Jul 28, 2005
Authored by tgo

Beehive Forum is susceptible to cross site scripting, SQL injection, and path disclosure vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | 7f3929899fa6fa2c9f781611cd61144f5570e8c2ce489c88613dad141af19a06
flsearch.pl.txt
Posted Jul 28, 2005
Authored by newbug

FtpLocate versions 2.02 and below remote code execution exploit that makes use of unsanitized user input.

tags | exploit, remote, code execution
SHA-256 | fa9e7b29c5fd8639d1c710ca941a37e5849ae8474c833cc8940a2c6c1eef8849
ECIrouter.txt
Posted Jul 28, 2005
Authored by D

The ECI B-FOCuS router 312+ allows a remote, unauthenticated attacker the ability to download the configuration file containing the system passwords in clear text.

tags | exploit, remote
SHA-256 | 9f358cc045a943b64c3955ed564a3050e84f66b75c52ef9d76adf4d364432a55
phpFirstPost.txt
Posted Jul 28, 2005
Authored by GB

PHP FirstPost suffers from a remote command execution vulnerability due to a lack of sanitized input in block.php.

tags | exploit, remote, php
SHA-256 | 23f788bad7e03443852131b6ac6fe3e5bc8f884de20b561d3964e4f7376c8bad
Page 2 of 3
Back123Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close