exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2005-01-26

57727.html
Posted Jan 26, 2005
Site sunsolve.sun.com

Sun Security Advisory - A security vulnerability in the DHCP administration utilities dhcpconfig(1M), pntadm(1M), and dhcpmgr(1M) may allow an unprivileged local user the ability to execute arbitrary code with the privileges of root.

tags | advisory, arbitrary, local, root
SHA-256 | 28d9fe4db2eec10195999416b29730e9a7757b54eb86793f5cefd1b241f69e4f
dsa-658.txt
Posted Jan 26, 2005
Site debian.org

Debian Security Advisory 658-1 - The Debian Security Audit Project discovered that the DBI library, the Perl5 database interface, creates a temporary PID file in an insecure manner. This can be exploited by a malicious user to overwrite arbitrary files owned by the person executing the parts of the library.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2005-0077
SHA-256 | 33c649bdecf8390f19cc8ac37b7fe39371b11a83ce1bcdbec402e17800600144
Secunia Security Advisory 13976
Posted Jan 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in BRIBBLE, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 49eed3024e0d77fd91982e0b5803f06cbf50a7556e65b4c8a7455ba4ea6deafb
dsa-657.txt
Posted Jan 26, 2005
Site debian.org

Debian Security Advisory 657-1 - A heap overflow has been discovered in the DVD subpicture decoder of xine-lib. An attacker could cause arbitrary code to be executed on the victims host by supplying a malicious MPEG. By tricking users to view a malicious network stream, this is remotely exploitable.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2004-1379
SHA-256 | 498b369f0d2a898c3a04161eb4c4a99551dffdf5ad433f3d72826e8074c9aee1
dsa-656.txt
Posted Jan 26, 2005
Site debian.org

Debian Security Advisory 656-1 - The Debian Security Audit Team has discovered that the vdr daemon which is used for video disk recorders for DVB cards can overwrite arbitrary files.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2005-0071
SHA-256 | 12a94e185f0315de627dd903f9482a3c97a473fe34f836fa4025467494c764bc
dsa-655.txt
Posted Jan 26, 2005
Site debian.org

Debian Security Advisory 655-1 - zhcon accesses a user-controlled configuration file with elevated privileges. Thus, it is possible to read arbitrary files.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2005-0072
SHA-256 | 522851362d262be05d4670766589389ed2043f1bfa8c3e992e3f7b9a58503231
Echo Security Advisory 2005.10
Posted Jan 26, 2005
Authored by y3dips, Echo Security | Site y3dips.echo.or.id

Exponent CMS version 0.95 is susceptible to full path disclosure and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | cba48bf52bb176ac8e8bda738703049a1c0e2915e1885ece04e0b5b76e7fb5a5
AWStatsVulnAnalysis.pdf
Posted Jan 26, 2005
Authored by newbug | Site chroot.org

Detailed analysis of three different vulnerabilities that reside in AWStats which all allow for remote command execution.

tags | exploit, remote, vulnerability
SHA-256 | 74511a1c2d8b5d0dd45ea1e139574de5434d44c4a7e1207c7f78f2ac9324e365
0501038.pdf
Posted Jan 26, 2005
Authored by D.J. Capelis

White paper discussing the new ASH family of hashing algorithms. They are based off of modifications to the existing SHA-2 family and were designed with two main goals in mind: Providing increased collision resistance and increasing mitigation of security risks post-collision.

tags | paper
SHA-256 | 150fa7a85ac85ec3d91ca4a2ddc89e7acfe8f22d268b5d91541cd64b1165ebcc
Gentoo Linux Security Advisory 200501-31
Posted Jan 26, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200501-31 - teTeX, pTeX and CSTeX make use of vulnerable Xpdf code which may allow the remote execution of arbitrary code. Furthermore, the xdvizilla script is vulnerable to temporary file handling issues.

tags | advisory, remote, arbitrary
systems | linux, gentoo
SHA-256 | ed0dba4c77a665b500b135c1364a2634203b2a6511a369e8f746a7ebccd40c7a
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close