exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 63 of 63 RSS Feed

Files Date: 2006-06-11 to 2006-06-12

Gentoo Linux Security Advisory 200606-1
Posted Jun 11, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200606-01 - SEC Consult has discovered a buffer overflow in the code processing style sheet attributes. It is caused by an integer signedness error in a length check followed by a call to a string function. It seems to be hard to exploit this buffer overflow to execute arbitrary code because of the very large amount memory that has to be copied. Versions less than 8.54 are affected.

tags | advisory, overflow, arbitrary
systems | linux, gentoo
SHA-256 | 64302d11bd4e4c3d1c80d7083cdceb788f3b773d686433443bbe2bb8296ad21a
Gentoo Linux Security Advisory 200606-8
Posted Jun 11, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200606-08 - rgod discovered that WordPress insufficiently checks the format of cached username data. Versions less than 2.0.3 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 41d2e410a1dd1a79f44f9970d33cfdf5c3f27fe00dd35698221d6da902fd8963
Gentoo Linux Security Advisory 200606-7
Posted Jun 11, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200606-07 - Roman Veretelnikov discovered that Vixie Cron fails to properly check whether it can drop privileges accordingly if setuid() in do_command.c fails due to a user exceeding assigned resource limits. Versions less than 4.1-r9 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 08f1ab55b1098347b15f0fac06486462d349b590b805b7aafbf82763035ec0e7
Mandriva Linux Security Advisory 2006.098
Posted Jun 11, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-098: PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x before 7.3.15, and earlier versions allows context-dependent attackers to bypass SQL injection protection methods in applications via invalid encodings of multibyte characters, aka one variant of "Encoding-Based SQL Injection."

tags | advisory, sql injection
systems | linux, mandriva
SHA-256 | 72e10c81a5cd123278fd9215d83709106a3e9428320c85218c591158b0992092
Mandriva Linux Security Advisory 2006.097
Posted Jun 11, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-097: SQL injection vulnerability in MySQL 4.1.x before 4.1.20 and 5.0.x before 5.0.22 allows context-dependent attackers to execute arbitrary SQL commands via crafted multibyte encodings in character sets such as SJIS, BIG5, and GBK, which are not properly handled when the mysql_real_escape function is used to escape the input.

tags | advisory, arbitrary, sql injection
systems | linux, mandriva
SHA-256 | f086c8f04e1ca9777203babe1b5b2fff630064bdf27c35a097720601ad7cbb99
Mandriva Linux Security Advisory 2006.096
Posted Jun 11, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-096: A stack-based buffer overflow in st.c in slurpd for OpenLDAP might allow attackers to execute arbitrary code via a long hostname.

tags | advisory, overflow, arbitrary
systems | linux, mandriva
SHA-256 | 4cfece0cdbbde6d543e012f5bb8e8d20d5a311057d6d9dd3e01111358aa7b5a0
Mandriva Linux Security Advisory 2006.095
Posted Jun 11, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-095: A stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and earlier might might allow attackers to execute arbitrary code via a long filename.

tags | advisory, overflow, arbitrary
systems | linux, mandriva
SHA-256 | 0343f3b420c0ec45d47b8a592d88bec30011c8dbd89cdcaf0bf916d2d7846250
Debian Linux Security Advisory 1090-1
Posted Jun 11, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1090-1: A vulnerability has been discovered in SpamAssassin, a Perl-based spam filter using text analysis, that can allow remote attackers to execute arbitrary commands.

tags | advisory, remote, arbitrary, perl
systems | linux, debian
SHA-256 | 02af200793b7e244c4a6b4fe5d2841488b69e1beab1bc69d7f7aa68a87ab8331
Debian Linux Security Advisory 1095-1
Posted Jun 11, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1095-1: Several problems have been discovered in the FreeType 2 font engine.

tags | advisory
systems | linux, debian
SHA-256 | 0787142dcd4868da1f2fb0a20d0559fadb319bc2d91ff63c1056d908be2d4bc6
Debian Linux Security Advisory 1094-1
Posted Jun 11, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1094-1: Joxean Koret discovered several cross-site scripting vulnerabilities in Gforge, an online collaboration suite for software development, which allow injection of web script code.

tags | advisory, web, vulnerability, xss
systems | linux, debian
SHA-256 | ea4e76e50df20b3ad10c37936618719ec062d9555422fae80ceae4f0aa4ee712
Debian Linux Security Advisory 1093-1
Posted Jun 11, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1093-1: Several format string vulnerabilities have been discovered in xine-ui, the user interface of the xine video player, which may cause a denial of service.

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | d97cc69d069992890e9c1cc5156f98d9b24201b09e3467a673ed66b8ad2d67b9
Debian Linux Security Advisory 1092-1
Posted Jun 11, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1092-1: Josh Berkus and Tom Lane discovered that MySQL 4.1, a popular SQL database, incorrectly parses strings escaped with mysql_real_escape() which could lead to SQL injection. This problem does only exist in versions 4.1 and 5.0.

tags | advisory, sql injection
systems | linux, debian
SHA-256 | 9cd677d7cab0d5299bde3ef5872d558a13d09edfdb77e41de4b88733ee229e5c
Debian Linux Security Advisory 1091-1
Posted Jun 11, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1091-1: Several problems have been discovered in the TIFF library.

tags | advisory
systems | linux, debian
SHA-256 | 66343940af8c0223f2a8631a194f7e7297a14918d31e5d5732112e6f4543f34d
Page 3 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close