Exploit the possiblities
Showing 1 - 25 of 673 RSS Feed

Files Date: 2005-11-01 to 2005-11-30

Gentoo Linux Security Advisory 200511-16
Posted Nov 22, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200511-16 - Ludwig Nussel from SUSE Linux has identified two vulnerabilities in GNUMP3d. GNUMP3d fails to properly check for the existence of /tmp/index.lok before writing to the file, allowing for local unauthorized access to files owned by the user running GNUMP3d. GNUMP3d also fails to properly validate the theme GET variable from CGI input, allowing for unauthorized file inclusion. Versions less than 2.9.7-r1 are affected.

tags | advisory, local, cgi, vulnerability, file inclusion
systems | linux, suse, gentoo
MD5 | 7e0b783c9d0c0c958924af55a15f57af
Secunia Security Advisory 17648
Posted Nov 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for the kernel. This fixes some vulnerabilities, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service) and to disclose certain sensitive information, or by malicious people to disclose certain sensitive information, bypass certain security restrictions, and to cause a DoS.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, ubuntu
MD5 | ed7459002859a93336e84feb98eaac84
Secunia Security Advisory 17666
Posted Nov 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Trustix has issued updates for multiple packages. These fix some vulnerabilities, where the most critical ones can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a user's system or vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | f1c2fb08c6b82d7822b38afae6c283cd
usn-218-1.txt
Posted Nov 22, 2005
Authored by Martin Pitt | Site security.ubuntu.com

Ubuntu Security Notice USN-218-1 - Two buffer overflows were discovered in the 'pnmtopng' tool, which were triggered by processing an image with exactly 256 colors when using the -alpha option (CVE-2005-3662) or by processing a text file with very long lines when using the -text option (CVE-2005-3632).

tags | advisory, overflow
systems | linux, ubuntu
MD5 | f10858d50e3c6d73a6a1d48bcc28d194
usn-217-1.txt
Posted Nov 22, 2005
Authored by Martin Pitt | Site security.ubuntu.com

Ubuntu Security Notice USN-217-1 - A buffer overflow has been discovered in the SVG importer of Inkscape. By tricking an user into opening a specially crafted SVG image this could be exploited to execute arbitrary code with the privileges of the Inkscape user.

tags | advisory, overflow, arbitrary
systems | linux, ubuntu
MD5 | ac4a73d7e0597b5518895be6aca7f1b3
usn-190-2.txt
Posted Nov 22, 2005
Authored by Martin Pitt | Site security.ubuntu.com

Ubuntu Security Notice USN-190-2 - USN-190-1 fixed a vulnerability in the net-snmp library. It was discovered that the same problem also affects the ucs-snmp implementation (which is used by the Cyrus email server).

tags | advisory
systems | linux, ubuntu
MD5 | 6c8f49e6f9d2ea174d6c5ff97fedff78
Debian Linux Security Advisory 906-1
Posted Nov 22, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 906-1 - Colin Leroy discovered several buffer overflows in a number of importer routines in sylpheed, a light-weight e-mail client with GTK+, that could lead to the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
MD5 | 84da5e7245c419d4e882e26bf63def3a
Debian Linux Security Advisory 904-1
Posted Nov 22, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 904-1 - Greg Roelofs discovered and fixed several buffer overflows in pnmtopng which is also included in netpbm, a collection of graphic conversion utilities, that can lead to the execution of arbitrary code via a specially crafted PNM file.

tags | advisory, overflow, arbitrary
systems | linux, debian
MD5 | a46ad2dd26e4f1c4974ef4031ee5619f
Debian Linux Security Advisory 905-1
Posted Nov 22, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 905-1 - Several security related problems have been discovered in Mantis, a web-based bug tracking system.

tags | advisory, web
systems | linux, debian
advisories | CVE-2005-3091, CVE-2005-3335, CVE-2005-3336, CVE-2005-3338
MD5 | 7d459a39163c92758fe4782ca47365ce
Debian Linux Security Advisory 903-1
Posted Nov 22, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 903-1 - Imran Ghory discovered a race condition in the permissions setting code in unzip. When decompressing a file in a directory an attacker has access to, unzip could be tricked to set the file permissions to a different file the user has permissions to.

tags | advisory
systems | linux, debian
MD5 | 71e9fcf51830739923a4b4340bc2b353
Debian Linux Security Advisory 900-2
Posted Nov 22, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 900-2 - Due to restrictive dependency definition the updated fetchmailconf package couldn't be installed on the old stable distribution (woody) together with fetchmail-ssl. Hence, this update loosens it, so that the update can be pulled in.

tags | advisory
systems | linux, debian
MD5 | fddda1ab09c9b30f68f444123d14b920
Debian Linux Security Advisory 902-1
Posted Nov 22, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 902-1 - A buffer overflow has been discovered in the sendmail program of xmail, an advanced, fast and reliable ESMTP/POP3 mail server that could lead to the execution of arbitrary code with group mail privileges.

tags | advisory, overflow, arbitrary
systems | linux, debian
MD5 | 37f29ca13dc650485052d19e0290ecdb
Debian Linux Security Advisory 811-2
Posted Nov 22, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 811-2 - The bugfix for the common-lisp-controller vulnerability contained an error that caused third party programs to fail.

tags | advisory
systems | linux, debian
MD5 | 906934a84f3cfd887944c18aeb4fa3af
Secunia Security Advisory 16907
Posted Nov 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Opera, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | ec2a172da60af6eabb27c9b668335e2e
Secunia Security Advisory 17597
Posted Nov 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - PSNC Security Team has reported some vulnerabilities and weaknesses in Gadu-Gadu, which can be exploited by malicious people to cause a DoS (Denial of Service), bypass certain security restrictions, and disclose sensitive information.

tags | advisory, denial of service, vulnerability
MD5 | 8d841997cd16c63d688eeb065b9db8b3
Secunia Security Advisory 17607
Posted Nov 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for phpmyadmin. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information.

tags | advisory, vulnerability, xss
systems | linux, suse
MD5 | a0aaa070c9eb18a72626a04c85b3cbfd
Secunia Security Advisory 17626
Posted Nov 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued updates for multiple packages. These fix various vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, cause a DoS (Denial of Service), and to compromise a user's or a vulnerable system.

tags | advisory, denial of service, vulnerability, xss
systems | linux, suse
MD5 | 6cf48360ce1afba5fc855827435ce2ca
Secunia Security Advisory 17636
Posted Nov 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for smb4k. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
systems | linux, gentoo
MD5 | 929ff4d1c02e112a2fca2d65d827c3f1
Secunia Security Advisory 17637
Posted Nov 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for xmail. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, debian
MD5 | 71db9ae6fc21293a9113eb08816cc18d
Secunia Security Advisory 17638
Posted Nov 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Lostmon has reported a vulnerability in Nuke ET, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 21ec12e294dccc53967e28f0b84680d7
Secunia Security Advisory 17644
Posted Nov 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - H D Moore has reported some vulnerabilities in Google Mini Search Appliance, which can be exploited by malicious people to conduct cross-site scripting attacks and potentially to compromise a vulnerable appliance.

tags | advisory, vulnerability, xss
MD5 | 1f5c0f74b9f92881fd365713818f1150
Secunia Security Advisory 17646
Posted Nov 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for gnump3d. This fixes two vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges, and by malicious people to disclose potentially sensitive information.

tags | advisory, local, vulnerability
systems | linux, gentoo
MD5 | f67581e6baf231632fd0f7fbff120ada
Secunia Security Advisory 17649
Posted Nov 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tobias Klein has reported some vulnerabilities in phpMyFAQ, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, vulnerability
MD5 | 7e5fda59ebe05167c95ca2f4eda7baab
Secunia Security Advisory 17651
Posted Nov 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Joxean Koret has reported a vulnerability in Inkspace, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 98ca6a6971d468a21bde130aa4358e16
Secunia Security Advisory 17652
Posted Nov 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - BiPi_HaCk has reported some vulnerabilities in e-Quick Cart, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
MD5 | 4a205f8734b0e79fb1cdd283b0d8318e
Page 1 of 27
Back12345Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    15 Files
  • 15
    Dec 15th
    28 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close