Computer Security
[EN] securityvulns.ru no-pyccku


HP-UX WBEM multiple security vulnerabilities
Published:01.05.2008
Source:
SecurityVulns ID:8960
Type:remote
Threat Level:
6/10
Description:Code execution, privilege escalation.
Affected:HP : HP-UX 11.11
 HP : HP-UX 11.23
 HP : HP-UX 11.31
CVE:CVE-2008-0003
 CVE-2007-5360
Original documentdocumentHP, [security bulletin] HPSBMA02331 SSRT080000 rev.1 - HP-UX running WBEM Services, Remote Execution of Arbitrary Code, Gain Extended Privileges (01.05.2008)

SNMPc buffer overflow
Published:01.05.2008
Source:
SecurityVulns ID:8961
Type:remote
Threat Level:
6/10
Description:Buffer overflow on oversized SNMP community string.
Affected:CATLEROCK : SNMPc Network Manager 7.1
Original documentdocumentNGSSoftware Insight Security Research Advisory (NISR), Critical Vulnerability in SNMPc (01.05.2008)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:01.05.2008
Source:
SecurityVulns ID:8958
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:SITEXS : sitexs 0.1
 ASTROCAM : AstroCam 2.7
Original documentdocumentSteffen Wendzel, XSS in AstroCam (01.05.2008)
 documenthadikiamarsi_(at)_hotmail.com, XSS Attack (01.05.2008)

libpng code execution
updated since 01.05.2008
Published:13.05.2008
Source:
SecurityVulns ID:8959
Type:library
Threat Level:
7/10
Affected:libpng : libpng 1.2
 PNGCRUSH : pngcrush 1.6
 libpng : libpng 1.4
 POVRAY : POV-Ray 3.6
CVE:CVE-2008-3964 (Multiple off-by-one errors in libpng before 1.2.32beta01, and 1.4 before 1.4.0beta34, allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a PNG image with crafted zTXt chunks, related to (1) the png_push_read_zTXt function in pngread.c, and possibly related to (2) pngtest.c.)
 CVE-2008-1382
Original documentdocumentGENTOO, [ GLSA 200805-10 ] Pngcrush: User-assisted execution of arbitrary code (13.05.2008)
 documentRPATH, rPSA-2008-0151-1 libpng (01.05.2008)

Akamai Download Manager ActiveX code execution
updated since 01.05.2008
Published:05.06.2008
Source:
SecurityVulns ID:8962
Type:client
Threat Level:
6/10
Description:Undocumented properties allow code download and execute.
Affected:AKAMAI : Akamai Download Manager 2.2
CVE:CVE-2008-1770 (CRLF injection vulnerability in Akamai Download Manager ActiveX control before 2.2.3.6 allows remote attackers to force the download and execution of arbitrary files via a URL parameter containing an encoded LF followed by a malicious target line.)
Original documentdocumentcocoruder, Akamai Download Manager File Downloaded To Arbitrary Location Vulnerability (05.06.2008)
 documentAKAMAI, Akamai Technologies Security Advisory 2008-0001 (Download Manager) (05.06.2008)
 documentIDEFENSE, iDefense Security Advisory 04.30.08: Akamai Download Manager Arbitrary Program Execution Vulnerability (01.05.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod