what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2005-01-26

57727.html
Posted Jan 26, 2005
Site sunsolve.sun.com

Sun Security Advisory - A security vulnerability in the DHCP administration utilities dhcpconfig(1M), pntadm(1M), and dhcpmgr(1M) may allow an unprivileged local user the ability to execute arbitrary code with the privileges of root.

tags | advisory, arbitrary, local, root
SHA-256 | 28d9fe4db2eec10195999416b29730e9a7757b54eb86793f5cefd1b241f69e4f
dsa-658.txt
Posted Jan 26, 2005
Site debian.org

Debian Security Advisory 658-1 - The Debian Security Audit Project discovered that the DBI library, the Perl5 database interface, creates a temporary PID file in an insecure manner. This can be exploited by a malicious user to overwrite arbitrary files owned by the person executing the parts of the library.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2005-0077
SHA-256 | 33c649bdecf8390f19cc8ac37b7fe39371b11a83ce1bcdbec402e17800600144
Secunia Security Advisory 13976
Posted Jan 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in BRIBBLE, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 49eed3024e0d77fd91982e0b5803f06cbf50a7556e65b4c8a7455ba4ea6deafb
dsa-657.txt
Posted Jan 26, 2005
Site debian.org

Debian Security Advisory 657-1 - A heap overflow has been discovered in the DVD subpicture decoder of xine-lib. An attacker could cause arbitrary code to be executed on the victims host by supplying a malicious MPEG. By tricking users to view a malicious network stream, this is remotely exploitable.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2004-1379
SHA-256 | 498b369f0d2a898c3a04161eb4c4a99551dffdf5ad433f3d72826e8074c9aee1
dsa-656.txt
Posted Jan 26, 2005
Site debian.org

Debian Security Advisory 656-1 - The Debian Security Audit Team has discovered that the vdr daemon which is used for video disk recorders for DVB cards can overwrite arbitrary files.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2005-0071
SHA-256 | 12a94e185f0315de627dd903f9482a3c97a473fe34f836fa4025467494c764bc
dsa-655.txt
Posted Jan 26, 2005
Site debian.org

Debian Security Advisory 655-1 - zhcon accesses a user-controlled configuration file with elevated privileges. Thus, it is possible to read arbitrary files.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2005-0072
SHA-256 | 522851362d262be05d4670766589389ed2043f1bfa8c3e992e3f7b9a58503231
Echo Security Advisory 2005.10
Posted Jan 26, 2005
Authored by y3dips, Echo Security | Site y3dips.echo.or.id

Exponent CMS version 0.95 is susceptible to full path disclosure and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | cba48bf52bb176ac8e8bda738703049a1c0e2915e1885ece04e0b5b76e7fb5a5
AWStatsVulnAnalysis.pdf
Posted Jan 26, 2005
Authored by newbug | Site chroot.org

Detailed analysis of three different vulnerabilities that reside in AWStats which all allow for remote command execution.

tags | exploit, remote, vulnerability
SHA-256 | 74511a1c2d8b5d0dd45ea1e139574de5434d44c4a7e1207c7f78f2ac9324e365
0501038.pdf
Posted Jan 26, 2005
Authored by D.J. Capelis

White paper discussing the new ASH family of hashing algorithms. They are based off of modifications to the existing SHA-2 family and were designed with two main goals in mind: Providing increased collision resistance and increasing mitigation of security risks post-collision.

tags | paper
SHA-256 | 150fa7a85ac85ec3d91ca4a2ddc89e7acfe8f22d268b5d91541cd64b1165ebcc
Gentoo Linux Security Advisory 200501-31
Posted Jan 26, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200501-31 - teTeX, pTeX and CSTeX make use of vulnerable Xpdf code which may allow the remote execution of arbitrary code. Furthermore, the xdvizilla script is vulnerable to temporary file handling issues.

tags | advisory, remote, arbitrary
systems | linux, gentoo
SHA-256 | ed0dba4c77a665b500b135c1364a2634203b2a6511a369e8f746a7ebccd40c7a
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close