what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 119 RSS Feed

Files Date: 2006-05-17

SCOSA-2006.23.txt
Posted May 17, 2006
Authored by SCO | Site sco.com

SCO Security Advisory SCOSA-2006.23 - UnixWare 7.1.4 : GhostScript Insecure Temporary File Creation Vulnerability.

tags | advisory
systems | unixware
SHA-256 | 186509323f9b90527c1c74b30aaadd04b978ad623d7a6e08f6aa49aaf54833c9
DuGalleryV2.x.txt
Posted May 17, 2006
Site milli-harekat.org

DUGallery v2.x suffers from a login bypass vulnerability.

tags | advisory, bypass
SHA-256 | 0ff16a405aef77db1af7f8a80371f0fb25208dfe596e31915efd8f8266351d65
IBMWebsphere.txt
Posted May 17, 2006
Site www-1.ibm.com

Some vulnerabilities have been reported in IBM WebSphere Application Server, where some have unknown impacts and others may disclose sensitive information or bypass certain security restrictions.

tags | advisory, vulnerability
SHA-256 | a2485359983660b69a1b5e23d5c2fabe5313cf55d7351be5bfdbf43c4171c5f1
OzzyWorkGallery.txt
Posted May 17, 2006
Site milli-harekat.org

OzzyWork Gallery suffers from a file upload vulnerability.

tags | advisory, file upload
SHA-256 | 17a2426879c3c3035162fb50cc502ea21acea7b661d88aa3d29a5f64fe3a0295
OzzyWorkGaleri.txt
Posted May 17, 2006
Site milli-harekat.org

OzzyWork Gallery suffers from an administrative login bypass vulnerability.

tags | advisory, bypass
SHA-256 | c29763013b435928dfe18fe523ca657bbbc5030de416c9d3bf8520fc348b338e
secunia-unacev2.dll.txt
Posted May 17, 2006
Site secunia.com

Secunia Research 09/05/2006 - Where Is It unacev2.dll Buffer Overflow Vulnerability.

tags | advisory, overflow
SHA-256 | 5cb0e38828075ccea4dfedbc776063922fb588de9953918708a8a6c6b8b4df4b
ICQ-xas.txt
Posted May 17, 2006
Authored by 3APA3A | Site security.nnov.ru

Under some conditions, the ICQ client is vulnerable to remote script injection into the My Computer Security Zone of the Internet Explorer component used to display advertisement banners.

tags | advisory, remote
SHA-256 | c1b734689902bb448560a2eb96f4343e17e937067a337cfa835e1a669561f972
mybbv1.1.1.txt
Posted May 17, 2006
Authored by Breeeeh | Site alshmokh.com

mybb v1.1.1 suffers from SQL injection in showthread.php

tags | advisory, php, sql injection
SHA-256 | bedb5319cc52825b7730f0cea7db322a713a655e3b020356c1f9a429cb998c4a
quake3-vuln.txt
Posted May 17, 2006
Authored by Thilo Schulz

Two independent vulnerabilities (client and server side) have been discovered in the Quake3 engine and many derived games.

tags | advisory, vulnerability
SHA-256 | 181082848ea3b91dc03460e31df56e8d29d10bc560a2e191e24cd2ce742d02a6
DMitry-1.3a.tar.gz
Posted May 17, 2006
Authored by James Greig | Site mor-pah.net

DMitry (Deepmagic Information Gathering Tool) is a UNIX/(GNU)Linux Command Line Application coded in C. DMitry has the ability to gather as much information as possible about a host. Base functionality is able to gather possible subdomains, email addresses, uptime information, tcp port scan, whois lookups, and more.

Changes: two malloc issues addressed, fixed the netcraft function output, dmitrybot removed.
tags | tcp
systems | linux, unix
SHA-256 | f335321a092cdc708f3222ce732299289b799602076f22e1942ed152b0f17e43
Mandriva Linux Security Advisory 2006.083
Posted May 17, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-083: A race condition in daemon/slave.c in gdm before 2.14.1 allows local users to gain privileges via a symlink attack when gdm performs chown and chgrp operations on the .ICEauthority file.

tags | advisory, local
systems | linux, mandriva
SHA-256 | c90214e085a14ed4de53d0d36a90b73a0a7d631d365ebd0781eb92e21a618290
Mandriva Linux Security Advisory 2006.085
Posted May 17, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-085: Multiple format string vulnerabilities in xiTK (xitk/main.c) in xine allow remote attackers to execute arbitrary code via format string specifiers in a long filename on an EXTINFO line in a playlist file.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, mandriva
SHA-256 | fb0183cfe198c29fd672128b008bc1b5517571e9f342856b7ae45e9f08669f23
Mandriva Linux Security Advisory 2006.084
Posted May 17, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-084: The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.

tags | advisory, remote
systems | linux, mandriva
SHA-256 | e8758531751ff25fcbd4487940f9f6d238d3e79bba67f69b2fa7c0662a6ef6e5
Ubuntu Security Notice 284-1
Posted May 17, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 284-1: Paul Jakma discovered that Quagga's ripd daemon did not properly handle authentication of RIPv1 requests. If the RIPv1 protocol had been disabled, or authentication for RIPv2 had been enabled, ripd still replied to RIPv1 requests, which could lead to information disclosure.

tags | advisory, protocol, info disclosure
systems | linux, ubuntu
SHA-256 | 9da0f7a08dc8c1a3b2763b8b2b7fada9339dc2eb0b84cebe6bb1055b049f9181
Ubuntu Security Notice 274-2
Posted May 17, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 274-2: USN-274-1 fixed a logging bypass in the MySQL server. Unfortunately it was determined that the original update was not sufficient to completely fix the vulnerability, thus another update is necessary. We apologize for the inconvenience.

tags | advisory
systems | linux, ubuntu
SHA-256 | fcc8459857be031bf163c995c9aed5eef9f1a6c1c4a29e92ef61fd80b4d8976f
FLSA-2006-185355.txt
Posted May 17, 2006
Site fedoralegacy.org

Fedora Legacy Update Advisory FLSA:185355 - Tavis Ormandy discovered a bug in the way GnuPG verifies cryptographically signed data with detached signatures. It is possible for an attacker to construct a cryptographically signed message which could appear to come from a third party. When a victim processes a GnuPG message with a malformed detached signature, GnuPG ignores the malformed signature, processes and outputs the signed data, and exits with status 0, just as it would if the signature had been valid. In this case, GnuPG's exit status would not indicate that no signature verification had taken place. This issue would primarily be of concern when processing GnuPG results via an automated script.

tags | advisory
systems | linux, fedora
SHA-256 | 3c58bb7f5c5f3e5fa0a7131c5c69f209f930bbb7c790e8d832b7f14fba242f3d
FLSA-2006-152923.txt
Posted May 17, 2006
Site fedoralegacy.org

Fedora Legacy Update Advisory FLSA:152923 - A flaw was discovered in xloadimage where filenames were not properly quoted when calling the gunzip command. An attacker could create a file with a carefully crafted filename so that it would execute arbitrary commands if opened by a victim.

tags | advisory, arbitrary
systems | linux, fedora
SHA-256 | abea417f287c24356b72a663f3fbe686293514d4c2bfecac09a87b09614de4d5
FLSA-2006-152904.txt
Posted May 17, 2006
Site fedoralegacy.org

Fedora Legacy Update Advisory FLSA:152904 - Buffer overflows were found in the nwclient program. An attacker, using a long -T option, could possibly execute arbitrary code and gain privileges.

tags | advisory, overflow, arbitrary
systems | linux, fedora
SHA-256 | 0b3ea20f14eb25f6e4f7be9c3515414220e49112e0eeaccdef69b7a09e017d1a
FLSA-2006-152898.txt
Posted May 17, 2006
Site fedoralegacy.org

Fedora Legacy Update Advisory FLSA:152898 - Max Vozeler discovered several format string vulnerabilities in the movemail utility of Emacs. If a user connects to a malicious POP server, an attacker can execute arbitrary code as the user running emacs.

tags | advisory, arbitrary, vulnerability
systems | linux, fedora
SHA-256 | 1cdde94e1d01de56fce8c36236798a1984f989dbb28e9d36d2d930192a5bcfa8
FLSA-2006-164512.txt
Posted May 17, 2006
Site fedoralegacy.org

Fedora Legacy Update Advisory FLSA:164512 - A bug was found in the way fetchmail allocates memory for long lines. A remote attacker could cause a denial of service by sending a specially- crafted email.

tags | advisory, remote, denial of service
systems | linux, fedora
SHA-256 | 663ce73125d1c59b76ff31ddeb25d98e2ea2d447182edcabe8d8344cadb013b3
FLSA-2006-152868.txt
Posted May 17, 2006
Site fedoralegacy.org

Fedora Legacy Update Advisory FLSA:152868 - Updated tetex packages that fix several security issues are now available.

tags | advisory
systems | linux, fedora
SHA-256 | e79f006e1c45861bd0eb22d142d8595fd9af1c54911bbb02e12d6316336f3bf2
Gentoo Linux Security Advisory 200605-13
Posted May 17, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200605-13 - The processing of the COM_TABLE_DUMP command by a MySQL server fails to properly validate packets that arrive from the client via a network socket. Versions less than 4.1.19 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 2a4cefe7e20d1cee4c375b3aaf74a47fca879317df8a7a2b33d853c567c21bed
Gentoo Linux Security Advisory 200605-12
Posted May 17, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200605-12 - landser discovered a vulnerability within the remapShader command. Due to a boundary handling error in remapShader, there is a possibility of a buffer overflow. Versions less than 1.32c are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | ddf1877d8d424736c0d1ae38e47da4a5141f914e61ff625b593c403628efdb2b
Gentoo Linux Security Advisory 200605-11
Posted May 17, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200605-11 - Ruby uses blocking sockets for WEBrick and XMLRPC servers. Versions less than 1.8.4-r1 are affected.

tags | advisory, ruby
systems | linux, gentoo
SHA-256 | ed4efa54025ad2b7f866c88b5cd771f848a6bfe13faf1c89d05ab7fb50813767
Gentoo Linux Security Advisory 200605-10
Posted May 17, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200605-10 - The pdnsd team has discovered an unspecified buffer overflow vulnerability. The PROTOS DNS Test Suite, by the Oulu University Secure Programming Group (OUSPG), has also revealed a memory leak error within the handling of the QTYPE and QCLASS DNS queries, leading to consumption of large amounts of memory. Versions less than 1.2.4 are affected.

tags | advisory, overflow, memory leak
systems | linux, gentoo
SHA-256 | 5eff045d709814fedc7d6368e17407073112f9b86caa3be0d2448e2cdc4c4f39
Page 1 of 5
Back12345Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close