Computer Security
[EN] securityvulns.ru no-pyccku


DoS против HP ProCurve
updated since 01.03.2002
Published:01.03.2006
Source:
SecurityVulns ID:1826
Type:remote
Threat Level:
5/10
Описание:До полной установки TCP-соединения не принимаются другие TCP-соединения.
Affected:HP : Procurve 4000M
Original documentdocumentJon Snyder, DoS on HP ProCurve 4000M switch (possibly others) (01.03.2002)

Lighttpd web server source code disclosure
updated since 16.02.2006
Published:01.03.2006
Source:
SecurityVulns ID:5784
Type:remote
Threat Level:
5/10
Description:Source code leak on case-insensitive file systems.
Affected:LIGHTTPD : lighttpd 1.4
Original documentdocumentSECUNIA, Secunia Research: Lighttpd Script Source Disclosure Vulnerability (01.03.2006)
 documentSECUNIA, [SA18869] Lighttpd Case-Insensitive Filename Source Code Disclosure (16.02.2006)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
updated since 28.02.2006
Published:01.03.2006
Source:
SecurityVulns ID:5832
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:MYPHPNUKE : myPHPNuke 1.8
 SQUIRRELMAIL : squirrelmail 1.4
 PUNBB : PunBB 1.2
 PWSPHP : PwsPHP 1.2
 MYBB : MyBB 1.0
 EKINBOARD : EKINboard 1.0
 FANTASTICNEWS : Fantastic News 2.1
 WORDPRESS : WordPress 2.0
 TECASCRIPTS : Quirex 2.0
 PERLBLOG : PerlBlog 1.08
 PERLBLOG : PerlBlog 1.09
 ARCHANGELWEBLOG : Archangel Weblog 0.90
 PHPRPC : phpRPC 0.7
 TL4S : D3Jeeb Pro 3
 CGICALENDAR : CGI Calendar 2.7
 REYERO : DirectContact 3.0
 LANSUITE : LanParty Intranet System 2.1
 IGENUS : iGENUS Webmail 2.02
 4HOMEPAGES : 4images 1.7
 ISSUEDEALER : Issue Dealer 0.9
 JFACETS : JFacets 0.1
 PARODIA : Parodia 6.2
 N8CMS : n8cms 1.1
 N8CMS : n8cms 1.2
 FARSINEWS : Farsinews 2.5
 EJ3 : EJ3 TOPo 2.2
 SENDCARD : SendCard 3.3
 STOREBOT : StoreBot 2002
 STOREBOT : StoreBot 2005
Original documentdocumentSECUNIA, [SA19019] StoreBot 2005 Professional Edition "Pwd" SQL Injection (01.03.2006)
 documentSECUNIA, [SA19060] StoreBot 2002 Standard Edition "ShipMethod" Script Insertion (01.03.2006)
 documentSECUNIA, [SA19039] PunBB "header.php" Cross-Site Scripting Vulnerability (01.03.2006)
 documentSECUNIA, [SA19061] MyBB "comma" Parameter SQL Injection Vulnerability (01.03.2006)
 documentSECUNIA, [SA19061] MyBB "comma" Parameter SQL Injection Vulnerability (01.03.2006)
 documentmail_(at)_yunusemreyilmaz.com, EJ3 TOPo - Cross Site Scripting Vulnerability (28.02.2006)
 documentHessam Salehi, FarsiNews 2.5Pro Exploit (28.02.2006)
 document:) :), n8cms 1.1 & 1.2 version Sql Эnjection And XSS (28.02.2006)
 documentSECUNIA, [SA19031] JFacets "ProfileID" Profile Change Vulnerability (28.02.2006)
 documentSECUNIA, [SA19044] CrossFire "oldsocketmode" Denial of Service Vulnerability (28.02.2006)
 documentSECUNIA, [SA19045] EKINboard Multiple Vulnerabilities (28.02.2006)
 documentSECUNIA, [SA19018] Issue Dealer Unpublished Content Disclosure Weakness (28.02.2006)
 documentSECUNIA, [SA19052] MyPHPNuke Cross-Site Scripting Vulnerabilities (28.02.2006)
 documentSECUNIA, [SA19023] PwsPHP "sondage" Module SQL Injection Vulnerability (28.02.2006)
 documentSECUNIA, [SA19026] 4images "template" Parameter File Inclusion Vulnerability (28.02.2006)
 documentSECUNIA, [SA19036] iGENUS Webmail File Inclusion Vulnerability (28.02.2006)
 documentSECUNIA, [SA19048] LanSuite LanParty Intranet System "fid" SQL Injection (28.02.2006)
 documentk4p0k4p0_(at)_hotmail.com, WordPress 2.0.1 Multiple Vulnerabilities (28.02.2006)
 documentDonato Ferrante, directory traversal in DirectContact 0.3b (28.02.2006)
 documentbotan_(at)_linuxmail.org, PixelArtKingdom TopSites Remote Command Exucetion (28.02.2006)
 documentbotan_(at)_linuxmail.org, Knowledgebases Remote Command Exucetion (28.02.2006)
 documentISecAuditors Security Advisories, [ISecAuditors Advisories] IMAP/SMTP Injection in SquirrelMail (28.02.2006)
 documentAliaksandr Hartsuyeu, [eVuln] PerlBlog Multiple Vulnerabilities (28.02.2006)
 documentMANDRIVA, [ MDKSA-2006:049 ] - Updated squirrelmail packages fix vulnerabilities (28.02.2006)
 documentrevnic_(at)_gmail.com, CGI Calendar XSS Vulnerability (28.02.2006)
 documents3ude_(at)_hotmail.com, 2 SQL Injection in d3jeeb (28.02.2006)
 documents3ude_(at)_hotmail.com, 2 SQL Injection in Fantastic News (28.02.2006)
 documentJeiAr, phpRPC Library Remote Code Execution (28.02.2006)
 documentAliaksandr Hartsuyeu, [eVuln] Quirex Arbitrary File Disclosure Vulnerability (28.02.2006)
 documentkingofska_(at)_gmail.com, Archangel Weblog 0.90.02 Admin Authentication Bypass & Remote File Inclusion (28.02.2006)
Files:FarsiNews 2.5Pro Exploi
 phpRPC <= 0.7 commands execute exploit

FreeBSD bfsd DoS
updated since 28.02.2006
Published:01.03.2006
Source:
SecurityVulns ID:5834
Type:remote
Threat Level:
5/10
Description:Malcrafted NFS bind request to TCP/2049 causes kernel panic.
Affected:FREEBSD : FreeBSD 6.0
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-06:10.nfs (01.03.2006)
 documentSECUNIA, [SA19017] FreeBSD "nfsd" NFS Mount Request Denial of Service (28.02.2006)

mb_send_mail() PHP safe mode protection bypass
updated since 28.02.2006
Published:01.03.2006
Source:
SecurityVulns ID:5836
Type:local
Threat Level:
6/10
Description:mb_send_mail() and imap_* unfctions allow to access system files.
Affected:PHP : PHP 4.4
 PHP : PHP 5.1
Original documentdocumentced.clerget_(at)_free.fr, (PHP) mb_send_mail security bypass (01.03.2006)
 documentced.clerget_(at)_free.fr, (PHP) imap functions bypass safemode and open_basedir restrictions (01.03.2006)
 documentSECUNIA, [SA18694] PHP "mb_send_mail()" and IMAP Functions Security Bypass (28.02.2006)
Files:Exploits mb_send_mail security bypass
 Exploits imap functions bypass safemode and open_basedir restrictions

OpenSSH + OpenPAM configuration DoS
Published:01.03.2006
Source:
SecurityVulns ID:5838
Type:remote
Threat Level:
5/10
Description:PAM connection is not terminated if SSH connection is terminated before password validated.
Affected:OPENSSH : OpenSSH 3.8
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-06:09.openssh [REVISED] (01.03.2006)

McAfee Virex antivirus protection bypass
Published:01.03.2006
Source:
SecurityVulns ID:5840
Type:remote
Threat Level:
5/10
Description:On access scan doesn't function.
Affected:MCAFEE : Virex 7.7
Original documentdocumenthahn_(at)_math.hu-berlin.de, Virex on-access scanning unreliable (01.03.2006)

gettext symbolic links problem
Published:01.03.2006
Source:
SecurityVulns ID:5842
Type:local
Threat Level:
5/10
Description:autopoint and gettextize scripts insecure temporary files creation.
Affected:GETTEXT : gettext 0.13
Original documentdocumentMANDRIVA, [ MDKSA-2006:051 ] - Updated gettext packages fix temporary file vulnerabilities (01.03.2006)

NetworkActiv Web Server script source code leak
Published:01.03.2006
Source:
SecurityVulns ID:5843
Type:remote
Threat Level:
5/10
Description:Invalid processing of requests with forward slash character.
Affected:NETWORKACTIVE : NetworkActiv Web Server 3.5
Original documentdocumentSECUNIA, [Full-disclosure] Secunia Research: NetworkActiv Web Server Script Source Disclosure Vulnerability (01.03.2006)

SAP Web Application Server crossite scripting
Published:01.03.2006
Source:
SecurityVulns ID:5844
Type:remote
Threat Level:
5/10
Affected:SAP : SAP WebAS 7.00
Original documentdocumentarnold.grossmann_(at)_gmail.com, SAP Web Application Server http request url parsing vulnerability (01.03.2006)

M4 Project enigma-suite unauthorized access
Published:01.03.2006
Source:
SecurityVulns ID:5845
Type:remote
Threat Level:
5/10
Description:"enigma-client" / "nominal" system account is created dusring installation.
Affected:M4PROJECT : enigma-suite 0.73
Original documentdocumentSECUNIA, [SA19077] M4 Project enigma-suite Default Account Password Weakness (01.03.2006)

HP System Management Homepage unauthorized access
updated since 01.03.2006
Published:12.04.2006
Source:
SecurityVulns ID:5841
Type:remote
Threat Level:
6/10
Affected:HP : System Management Homepage 2.0
 HP : System Management Homepage 2.1
Original documentdocumentSRC Telindus, [SRC-Telindus advisory] - HP System Management Homepage Remote Unauthorized Access (12.04.2006)
 documentHP, [security bulletin] SSRT061118 rev.1 - HP System Management Homepage (SMH) Running on Windows: Remote Unauthorized Access (01.03.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod