what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 86 RSS Feed

Files Date: 2005-06-18

Gentoo Linux Security Advisory 200506-4
Posted Jun 18, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200506-04 - Due to a lack of input validation, WordPress is vulnerable to SQL injection and XSS attacks. Versions less than 1.5.1.2 are affected.

tags | advisory, sql injection
systems | linux, gentoo
SHA-256 | f61dbef032c5de4d5067c727b8afd50ce72afc17eea903818ac81b5ab69e3936
Gentoo Linux Security Advisory 200506-3
Posted Jun 18, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200506-03 - Dzip is vulnerable to a directory traversal attack when extracting archives. Versions less than 2.9-r1 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 2a247cf29c4e54401ad4c729e24d498c4420f757128f578b66f2be70e3b848b0
Gentoo Linux Security Advisory 200506-2
Posted Jun 18, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200506-02 - When GNU Mailutils is built with the mysql or postgres USE flag, the sql_escape_string function of the authentication module fails to properly escape the \ character, rendering it vulnerable to a SQL command injection. Versions less than 0.6-r1 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2005-1824
SHA-256 | f143e45c52e133f525f50540e69f3125288b44eaaa9550dcbd43b1eb08643661
LSS-2005-06-06.txt
Posted Jun 18, 2005
Authored by Leon Juranic | Site security.lss.hr

LSS Security Advisory #LSS-2005-06-06 - Crob FTP server versions 3.6.1 and below suffer from various remote buffer overflows.

tags | advisory, remote, overflow
SHA-256 | c87f455adf3a1de29ab1bbd59e257815a8b6261cf9e1c2be3b87a1d648f5b816
LSS-2005-06-07.txt
Posted Jun 18, 2005
Authored by Leon Juranic | Site security.lss.hr

LSS Security Advisory #LSS-2005-06-07 - Popper webmail is susceptible to a remote code inclusion bug in childwindow.inc.php that allows for remote command execution.

tags | advisory, remote, php
SHA-256 | df5832afc053b6a437f0df4c9905733d31fb35594d529c89550ba0a5fb3cc1c2
everybuddy-06062005.txt
Posted Jun 18, 2005
Authored by Eric Romang | Site zataz.net

everybuddy versions 0.4.3 and below suffer from an insecure file creation vulnerability that allows for symlink attacks.

tags | advisory
SHA-256 | 46adc67a1df5282b44714898566130942229e761b77d09b090172e0d9eb8a519
lutelwall-05222005.txt
Posted Jun 18, 2005
Authored by Eric Romang | Site zataz.net

LutelWall versions 0.97 and below suffer from an insecure file creation vulnerability that allows for symlink attacks.

tags | advisory
SHA-256 | 419e4a6a72caaab54526ba5f7a714b611c277c831e9ef0d7195ebfcf33fc155b
giptables-05222005.txt
Posted Jun 18, 2005
Authored by Eric Romang | Site zataz.net

GIPTables Firewall versions 1.1 and below suffer from an insecure file creation vulnerability that allows for symlink attacks.

tags | advisory
SHA-256 | 916ac1b2eb458387fa4004ef64b4ae9968c40a51fdd18dd87f5c944c4e66394a
memfs.c
Posted Jun 18, 2005
Authored by Sven Tantau | Site sven-tantau.de

Proof of concept exploit for a memory disclosure vulnerability that exists in FUSE versions below 2.3.0.

tags | exploit, proof of concept
SHA-256 | 27cf06b929a25397727de580abced4cfcb5c502cb14f5b370aa41eedcc0983c8
fuseDisclose.txt
Posted Jun 18, 2005
Authored by Sven Tantau | Site sven-tantau.de

A memory disclosure vulnerability exists in FUSE versions below 2.3.0.

tags | advisory
SHA-256 | 1617e02791e8e6f8f643c263484eb5e3ba6de5bf570af2a803a1c4ed05c3e96a
lpanelClient.txt
Posted Jun 18, 2005

Lpanel versions 1.59 and below allows any logged in user to view any client invoice information.

tags | exploit
SHA-256 | ba72abecae267d0da639b879a342303d8add8096a27471231fc9f1eed84b92d1
lpanelPlain.txt
Posted Jun 18, 2005

Lpanel versions 1.59 and below suffer from a cross site scripting flaw in viewticket.php.

tags | exploit, php, xss
SHA-256 | 5e4c07390eccf0934d7ca80e4ea095e742a6c852bdce2142063703df9a77a602
rakzero.zip
Posted Jun 18, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit for the denial of service flaws discovered in Raknet network library versions 2.33 and below.

tags | exploit, denial of service, proof of concept
SHA-256 | a793421ef9f819fbc81c31a54f6e79b4e215a1e8a246bddccaa9b325b54e133a
rakzero.txt
Posted Jun 18, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Raknet network library versions 2.33 and below suffer from a server termination and endless loop denial of service vulnerability.

tags | advisory, denial of service
SHA-256 | ab1b55c29cc8be2d8e9de8e4afc7515cbea37aa1837a30299faceb2c13727839
dsa-731.txt
Posted Jun 18, 2005
Site security.debian.org

Debian Security Advisory DSA 732-1 - infamous41md discovered several vulnerabilities in the GNU mailutils package which contains utilities for handling mail. These problems can lead to a denial of service or the execution of arbitrary code.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2005-1520, CVE-2005-1521, CVE-2005-1522, CVE-2005-1523
SHA-256 | 1005b0538ef9725d5772e9e17747592bfda51d019fd5077e00a9b28c52168511
DRUPAL-SA-2005-001.txt
Posted Jun 18, 2005
Authored by Uwe Hermann | Site drupal.org

The Drupal Security Team has found that the privilege system of Drupal can be circumvented in a very special case because an input check is not implemented properly.

tags | advisory
SHA-256 | f0dbedb768968931ebac535ca37bc4a6e5fc685740db2480bbd31599b8709b22
phpBBcastle.txt
Posted Jun 18, 2005
Authored by Paul Laudanski, Papados | Site castlecops.com

phpBB 2.0.14 and below suffers from a lack of input filtering on the bbcode url.

tags | advisory
SHA-256 | c9646fa66fee2116417472c1e236a11c202a287351764d1e185085496bda775a
ISR-form-v1.0.tar.gz
Posted Jun 18, 2005
Authored by Francisco Amato | Site infobyte.com.ar

Simple html parsing tool that extracts all form related information and generates reports of the data. Allows for quick analyzing of data.

systems | unix
SHA-256 | 775fd1d04e6784cb43827f6833c3d84a21025eb24ec1d5d74d99f835e403ad60
ExhibitSQL.txt
Posted Jun 18, 2005
Authored by sk0L | Site sec-consult.com

Exhibit Engine versions 1.22 and 1.54 RC4 are susceptible to SQL injection attacks.

tags | exploit, sql injection
SHA-256 | 0b665515ebf1a6d3f4ff65d163f00b8fc85eee73097a27635ba3efec9a549be8
phpCMS12x.txt
Posted Jun 18, 2005
Authored by sk0L | Site sec-consult.com

phpCMS 1.2.x suffers from an arbitrary file inclusion vulnerability.

tags | exploit, arbitrary, file inclusion
SHA-256 | 04dd406024d58d3359604a12f1527b764eefa5071d43fc216473bbf1a65ecd0a
Echo Security Advisory 2005.14
Posted Jun 18, 2005
Authored by Echo Security, Dedi Dwianto | Site theday.echo.or.id

Liberum Help Desk versions greater than 0.97.3 suffer from various cross site scripting and SQL injection flaws.

tags | exploit, xss, sql injection
SHA-256 | ae3bd0ffd9766b0ca2785b8a44477de717a158204014b0c3bca4a54a2df68d73
cuteNewsExec.txt
Posted Jun 18, 2005
Authored by John Cantu

Providing an attacker already has administrative access to CuteNews, they can further execute commands on the underlying filesystem due to a failure in sanitizing user input.

tags | exploit
SHA-256 | 6a5ed6ba76c3e63a7ea028579605a3aee91cac0e914caae19f6608597b9a0f0c
fortinetBackdoor.txt
Posted Jun 18, 2005
Authored by Johan Andersson

A backdoor exists in Fortinet's Fortigate firewall that allows for maintainer access.

tags | exploit
SHA-256 | 7fbdd9343d15ed0177efb0134d8a05943dd2017b9ff8e661245d341fda81301b
olly_heap_vis.zip
Posted Jun 18, 2005
Site labs.idefense.com

OllyDbg Heap Vis plugin that adds the Heap option under the View menu for Windows variants that do not have this functionality.

systems | windows
SHA-256 | 5454bf969a30b0d8be00ffc046fc55cb6e55002d02e964ec486f55dcdc3eeaac
radexecd.txt
Posted Jun 18, 2005
Authored by John Cartwright

Multiple buffer overflow vulnerabilities exist in the HP Radia Notify daemon. Versions tested were 3.1.2.0 and 3.1.0.0. Detailed exploitation provided.

tags | advisory, overflow, vulnerability
SHA-256 | c57710ce4ce013e2bdbf66952de94185cf52b770928514767314d2bc8ad42192
Page 1 of 4
Back1234Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close