Quantcast
Channel: Files Date: 2004-12-30 to 2004-12-31 ≈ Packet Storm
Browsing latest articles
Browse All 25 View Live

iglooftp.txt

A weakness when uploading directories recursively can potentially be exploited by malicious, local users to substitute the uploaded files in IglooFTP version 0.6.1.

View Article


iglooftp2.txt

IglooFTP version 0.6.1 suffers from an input validation error that allows for arbitrary file overwrite.

View Article


greed.txt

An input validation error that allows for arbitrary command execution and a buffer overflow exist in Greed 0.81p.

View Article

junkie.txt

Multiple input validation errors exist in Junkie version 0.3.1 that allow for command execution and directory traversal attacks.

View Article

elm-bolthole-filter.txt

Bolthole Filter 2.6.1 is susceptible to a buffer overflow in the save_embedded_address() function.

View Article


jpegtoavi.txt

jpegtoavi version 1.5 is susceptible to a buffer overflow in the get_file_list_stdin() function.

View Article

o3read.txt

o3read version 0.0.3 suffers from a buffer overflow condition in the parse_html() function used when parsing HTML content.

View Article

linpopup.txt

LinPopUp version 1.2.0 has a buffer overflow in the strexpand() function.

View Article


ringtonetools.txt

Ringtone Tools version 2.22 is susceptible to a buffer overflow in the parse_emelody() function.

View Article


napshare.txt

NapShare version 1.2 is susceptible to a buffer overflow in the auto_filter_extern() function.

View Article

meshviewer.txt

MeshViewer 0.2.2 is susceptible to a buffer overflow vulnerability in the Mesh::type() function.

View Article

pcal.txt

Buffer overflow vulnerabilities in the getline() and get_holiday() functions of Pcal version 4.7.1 may allow for system compromise.

View Article

uml-utilites.txt

uml-utilities version 20030903 is susceptible to a denial of service vulnerability via the uml-net utility running setuid root and being able to take down the system's ethernet connection.

View Article


vb2c.txt

A buffer overflow in the vb2c 0.02 parse() function allows for system compromise.

View Article

xlreader.txt

xlreader version 0.9.0 is susceptible to a buffer overflow condition in the book_format_sql() function.

View Article


vilistextum.txt

Vilistextum version 2.6.6 is susceptible to a buffer overflow in the get_attr() function.

View Article

yamt.txt

A buffer overflow vulnerability in the YAMT 0.5 id3tag_sort() function can lead to a system compromise.

View Article


unrtf.txt

A buffer overflow in UnRTF version 0.19.3 may allow for system compromise.

View Article

dsa-611.txt

Debian Security Advisory 611-1 - infamous41md discovered a buffer overflow in htget, a file grabber that will get files from HTTP servers. It is possible to overflow a buffer and execute arbitrary code...

View Article

SSRT4687.txt

HP Security Bulletin - A potential vulnerability has been identified with the HP-UX newgrp(1) command that may allow authorized users to elevate privileges. Affected versions are HP-UX B.11.00,...

View Article

paginit.c

Local stack overflow exploit for /usr/bin/paginit on AIX versions 5.3/5.2/5.1.

View Article


lsmcode.txt

Local root command execution exploit for lsmcode on AIX 5.1 to 5.3.

View Article


dsa-612.txt

Debian Security Advisory 612-1 - Rudolf Polzer discovered a vulnerability in a2ps, a converter and pretty-printer for many formats to PostScript. The program did not escape shell meta characters...

View Article

tlen.txt

Tlen.pl versions 5.23.4.1 and below suffer from a remote script execution vulnerability.

View Article

KDE Security Advisory 2004-12-20.1

KDE Security Advisory: Two flaws in the Konqueror webbrowser make it possible to by pass the sandbox environment which is used to run Java-applets. One flaw allows access to restricted Java classes via...

View Article

Browsing latest articles
Browse All 25 View Live