what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2006-02-03 to 2006-02-04

SoftMakerShop.txt
Posted Feb 3, 2006
Authored by Preben Nylokken

Inputs in the SoftMaker Shop are not properly sanitized, and XSS is possible in a lot of the systems input fields and url parameters.

tags | advisory
SHA-256 | 989d64ff92ec348cea175e02feb70987463780058b155ccd053fd704d7becb05
DaffodilCRM.txt
Posted Feb 3, 2006
Authored by Preben Nylokken

Daffodil CRM does not properly sanitize its login inputs leading to SQL injection and authentication bypass.

tags | exploit, sql injection
SHA-256 | 06980cbcaf09d4bab3e41a2def3cc78c1aa54a9a3b18efdb7c26c54d0ddb1eaa
Debian Linux Security Advisory 963-1
Posted Feb 3, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 963-1 - NISCC reported that MyDNS, a DNS server using an SQL database for data storage, can be tricked into an infinite loop by a remote attacker and hence cause a denial of service condition.

tags | advisory, remote, denial of service
systems | linux, debian
SHA-256 | e6ab1d91c028d73d11f8c7f0d5784999a330c46c46b1db06b30841c30df3ecf2
Mandriva Linux Security Advisory 2006.033
Posted Feb 3, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - OpenOffice.org 2.0 and earlier, when hyperlinks has been disabled, does not prevent the user from clicking the WWW-browser button in the Hyperlink dialog, which makes it easier for attackers to trick the user into bypassing intended security settings.

tags | advisory
systems | linux, mandriva
SHA-256 | cab961570f8d57ea307af96ad760c20214a37ddfa33fd7ceaa0f0f8d4232b8cd
Mandriva Linux Security Advisory 2006.032
Posted Feb 3, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - xpdf - Heap-based buffer overflow in Splash.cc in xpdf allows attackers to cause a denial of service and possibly execute arbitrary code via crafted splash images that produce certain values that exceed the width or height of the associated bitmap.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, mandriva
SHA-256 | 457d43153a758a07d1fdf5b1942ed06b64988c47291163e10a43aa4264defbab
Mandriva Linux Security Advisory 2006.031
Posted Feb 3, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - kdegraphics - Heap-based buffer overflow in Splash.cc in xpdf allows attackers to cause a denial of service and possibly execute arbitrary code via crafted splash images that produce certain values that exceed the width or height of the associated bitmap. Kdegraphics-kpdf uses a copy of the xpdf code and as such has the same issues.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, mandriva
SHA-256 | ca847350d4e9c78d595f3eb83ae129c87198bb763c89c946688a6e00d1578608
Mandriva Linux Security Advisory 2006.030
Posted Feb 3, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - poppler - Heap-based buffer overflow in Splash.cc in xpdf allows attackers to cause a denial of service and possibly execute arbitrary code via crafted splash images that produce certain values that exceed the width or height of the associated bitmap. Poppler uses a copy of the xpdf code and as such has the same issues.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, mandriva
SHA-256 | 300247e8e0078bcc551d8bb369cb9be8515f777b8876478a40e41a8eb90cf1bb
Mandriva Linux Security Advisory 2006.029
Posted Feb 3, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Buffer overflow in Library of Assorted Spiffy Things (LibAST) 0.6.1 and earlier, as used in Eterm and possibly other software, allows local users to execute arbitrary code as the utmp user via a long -X argument.

tags | advisory, overflow, arbitrary, local
systems | linux, mandriva
SHA-256 | 15b7408a8aa87c89d102d2c6ae4698e6b81c2333cc852dc17bf2eb4b0a43d337
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close