what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 38 RSS Feed

Files Date: 2005-07-02 to 2005-07-03

ksb26-0.0.1.tar.gz
Posted Jul 2, 2005
Authored by Paolo Ardoino

ksb26 [Kernel SOCKS Bouncer] is a Linux Kernel 2.6.x Loadable Kernel Module that that redirects tcp connection (to user-defined target hosts) through socks 4/5 chains. This is obviously quite useful if you want to transparently tunnel certain things through a given proxy to remain anonymous, or if you want to be able to sniff certain network traffic transparently.

tags | tool, kernel, tcp
systems | linux, unix
SHA-256 | 7b0c7c9721ff3b547506a51fc009dec734716c84cb16c991ee9373228c98b5fb
GoldenTraverse.txt
Posted Jul 2, 2005
Authored by Lachlan. H

Golden Ftp Server Pro version 2.52 suffers from a directory traversal vulnerability.

tags | exploit
SHA-256 | fd19d17533a88ed38fa3c31bec9d660c6f4afadd17e6668d8a8e20c1c039de05
cca08.tgz
Posted Jul 2, 2005
Authored by drugphish | Site drugphish.ch

The C Code Analyzer (CCA) is a static analysis tool for detecting potential security problems in C source code. It's fully automatic; no code annotations or the like are required. It features an automatic user input tracer, potential buffer overflow detection, and more. An eclipse front-end plugin is included.

Changes: First release of the source code.
tags | overflow
systems | unix
SHA-256 | 5d74391e149b1f0f985f97eee613874bc72c6cb0570f533ca7438927fc5a3d77
raidenftpdTraverse.txt
Posted Jul 2, 2005
Authored by Lachlan. H

RaidenFTPD versions below 2.4.2241 allow for a directory traversal attack via urlget.

tags | exploit
SHA-256 | b157b789ba21b614aa3d84f4e229b30854ba58b5ca1aa2b90b36bcb7f08773c5
vcs100.txt
Posted Jul 2, 2005
Authored by Donato Ferrante | Site autistici.org

Video Cam Server version 1.0.0 is susceptible to a directory traversal attack.

tags | exploit
SHA-256 | ada3a5328ddaa14bdc136ad11e095dc6ab58a6c24f3b0f31394aa705cb84dc7d
CMSsimpleXSS.txt
Posted Jul 2, 2005
Authored by RB9

CMS Made Simple has a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 21cd8c5ae9fdd9b4369221dfae8b8053792af0ac1b701f001bc7b6db27b8c781
propsXSS.txt
Posted Jul 2, 2005
Authored by RB9

PROPS has a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5e8dfb2ca4883736a3217089e4d9665fcc154044472d541ebf1ee57b173ffe58
ovidentiaXSS.txt
Posted Jul 2, 2005
Authored by RB9

Ovidentia has a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | aab632b4f7ca95ef0f288b8147d3eb759ca0490964eb652b86d5472e360c91a8
wordpressXSS.txt
Posted Jul 2, 2005
Authored by RB9

Wordpress has a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ad8a89de323a90ed1a5c6de1d636b3c5555167a92cd2d163b6a3c15d45079f41
exponentXSS.txt
Posted Jul 2, 2005
Authored by RB9

Exponent suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 17391fe57e89c0f09aec93ab7a628fa3f9c6bcbc7581b85c7cf6198214ca4bfd
clevercopyXSS.txt
Posted Jul 2, 2005
Authored by RB9

Clevercopy suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0db8a163f89b6ef31bfb82f064aa53461ea16b6a8ecaf6cd100e4c29b3a2ddab
Gentoo Linux Security Advisory 200505-20
Posted Jul 2, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200505-20 - infamous41d discovered several vulnerabilities in GNU Mailutils. imap4d does not correctly implement formatted printing of command tags (CVE-2005-1523), fails to validate the range sequence of the FETCH command (CVE-2005-1522), and contains an integer overflow in the fetch_io routine (CVE-2005-1521). mail contains a buffer overflow in header_get_field_name() (CVE-2005-1520). Versions less than 0.6-r1 are affected.

tags | advisory, overflow, vulnerability
systems | linux, gentoo
advisories | CVE-2005-1520, CVE-2005-1521, CVE-2005-1522, CVE-2005-1523
SHA-256 | c2fb67e7ef5e9d7869519665523ab1b56b6a1f13618b8118efd53ef25ee92044
Gentoo Linux Security Advisory 200505-19
Posted Jul 2, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200505-19 - Exworm discovered that gxine insecurely implements formatted printing in the hostname decoding function. Versions less than 0.4.4 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2005-1692
SHA-256 | ff8bdf466cde935fabc1f41a965e7bcc0c76a699d5691dbb519735aab32494e5
Gentoo Linux Security Advisory 200505-18
Posted Jul 2, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200505-18 - The fixproc application of Net-SNMP creates temporary files with predictable filenames. Versions less than 5.2.1-r1 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 55ae58d4091c9513eec1db8f4df5e6697cdf1f1e7a159b4294f30dc6b5b91720
Gentoo Linux Security Advisory 200505-17
Posted Jul 2, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200505-17 - Jens Steube discovered that Qpopper doesn't drop privileges to process local files from normal users (CVE-2005-1151). The upstream developers discovered that Qpopper can be forced to create group or world writeable files (CVE-2005-1152). Versions less than 4.0.5-r3 are affected.

tags | advisory, local
systems | linux, gentoo
advisories | CVE-2005-1151, CVE-2005-1152
SHA-256 | 5f79ff0a88cc0ec2c54f6ceed5e00a22614019b40a6b651f22b9fb0d59a11434
Gentoo Linux Security Advisory 200505-16
Posted Jul 2, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200505-16 - Tavis Ormandy of the Gentoo Linux Security Audit Team discovered a Denial of Service vulnerability in the XWD decoder of ImageMagick and GraphicsMagick when setting a color mask to zero. Versions less than 6.2.2.3 are affected.

tags | advisory, denial of service
systems | linux, gentoo
SHA-256 | 7cd890831c972168a96e842608bd68f5ae3853773f99cba71d5868a21d6da6e4
Gentoo Linux Security Advisory 200505-15
Posted Jul 2, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200505-15 - Tavis Ormandy of the Gentoo Linux Security Audit Team discovered an integer overflow in the BFD library, resulting in a heap overflow. A review also showed that by default, gdb insecurely sources initialisation files from the working directory. Versions less than 6.3-r3 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | a438150f4f7635d000ccf3b00ec02b17b42aa4f822c4d5404b56c1e3ee3fa395
Gentoo Linux Security Advisory 200505-14
Posted Jul 2, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200505-14 - Brian Bird discovered that Cheetah searches for modules in the world-writable /tmp directory. Versions less than 0.9.17-rc1 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 853bd930b30b1dc75326033673188777ab4477db6183a979bd5d53e35f1ff993
Gentoo Linux Security Advisory 200505-13
Posted Jul 2, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200505-13 - Primoz Bratanic discovered that the sql_escape_func function of FreeRADIUS may be vulnerable to a buffer overflow (BID 13541). He also discovered that FreeRADIUS fails to sanitize user-input before using it in a SQL query, possibly allowing SQL command injection (BID 13540). Versions less than 1.0.2-r3 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | f0e8ee31b44589588be2f25ad27a3e4ee5e6a3d3ebf3acbeef7867a4d0644570
Gentoo Linux Security Advisory 200505-12
Posted Jul 2, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200505-12 - PostgreSQL gives public EXECUTE access to a number of character conversion routines, but doesn't validate the given arguments (CVE-2005-1409). It has also been reported that the contrib/tsearch2 module of PostgreSQL misdeclares the return value of some functions as internal (CVE-2005-1410). Versions less than 8.0.2-r1 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2005-1409, CVE-2005-1410
SHA-256 | f343524cabdc8563fd558ecf9418e6857706907df010ed93fb9711dc15817069
Gentoo Linux Security Advisory 200505-11
Posted Jul 2, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200505-11 - The Mozilla Suite and Firefox do not properly protect IFRAME JavaScript URLs from being executed in context of another URL in the history list (CVE-2005-1476). The Mozilla Suite and Firefox also fail to verify the IconURL parameter of the InstallTrigger.install() function (CVE-2005-1477). Michael Krax and Georgi Guninski discovered that it is possible to bypass JavaScript-injection security checks by wrapping the javascript: URL within the view-source: or jar: pseudo-protocols (MFSA2005-43). Versions less than 1.0.4 are affected.

tags | advisory, javascript, protocol
systems | linux, gentoo
advisories | CVE-2005-1476, CVE-2005-1477
SHA-256 | 6b81a217ce3f87b99e5aadf53821e66be801d2bc37dc498629b18c3918b3ad7c
Gentoo Linux Security Advisory 200505-10
Posted Jul 2, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200505-10 - phpBB is vulnerable to a cross-site scripting vulnerability due to improper sanitization of user supplied input. Coupled with poor validation of BBCode URLs which may be included in a forum post, an unsuspecting user may follow a posted link triggering the vulnerability. Versions less than 2.0.15 are affected.

tags | advisory, xss
systems | linux, gentoo
SHA-256 | 9d4330f075d84b5e3a57149a41002a7d4ac072e81cac2868e4e27c0b7a6f36d4
Gentoo Linux Security Advisory 200505-9
Posted Jul 2, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200505-09 - Stu Tomlinson discovered that Gaim is vulnerable to a remote stack based buffer overflow when receiving messages in certain protocols, like Jabber and SILC, with a very long URL (CVE-2005-1261). Siebe Tolsma discovered that Gaim is also vulnerable to a remote Denial of Service attack when receiving a specially crafted MSN message (CVE-2005-1262). Versions less than 1.3.0 are affected.

tags | advisory, remote, denial of service, overflow, protocol
systems | linux, gentoo
advisories | CVE-2005-1261, CVE-2005-1262
SHA-256 | 52d6d35d922abc92a5c62a156c06b0a964358c9c04b130bca8c8ab047e64a971
Gentoo Linux Security Advisory 200505-8
Posted Jul 2, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200505-08 - Tavis Ormandy of the Gentoo Linux Security Team discovered an integer overflow in the ELF parser, leading to a heap-based buffer overflow. The vendor has reported that an unrelated buffer overflow has been discovered in the PE parser. Versions less than 0.8.0-r2 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | bb50f3d10e9687ec9e2dcff2d81fd8f709c3bc9465d6ba8708274ced00dc0797
Gentoo Linux Security Advisory 200505-7
Posted Jul 2, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200505-07 - Tavis Ormandy of the Gentoo Linux Security Audit Team discovered a stack based buffer overflow in the libTIFF library when reading a TIFF image with a malformed BitsPerSample tag. Versions less than 3.7.2 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | 10f00fb5875050a3e524daa001dab1ae2df6cb0acba56164a9325e4481f90dbf
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close