Description
Visual truncation vulnerability in Gadu-Gadu allows remote attackers to spoof the file extension on transmitted files via a filename with a large number of spaces followed by the real extension, which is not displayed in the dialog box.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Bartosz Kwitkowski · textremotewindows
https://www.exploit-db.com/exploits/24404
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/17105
Exploit mailing-list
x_refsource_vuln-dev
http://seclists.org/lists/vuln-dev/2004/Aug/0007.html
Exploit vdb-entry
x_refsource_osvdb
http://www.osvdb.org/9162
Exploit vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1011037
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/11017
Scores
EPSS
0.0578
EPSS Percentile
90.5%
Details
Status
published
Published
Dec 31, 2004
Tracked Since
Feb 18, 2026