Computer Security
[EN] securityvulns.ru no-pyccku


Microsoft Windows spoolss DoS
Published:02.12.2006
Source:
SecurityVulns ID:6881
Type:remote
Threat Level:
5/10
Description:Memory exhaustion in GetPrinterData() function.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
Files:MS Windows spoolss GetPrinterData() 0day Memory Allocation Remote DoS Exploit

BlzeVideo HDTV Player buffer overflow
Published:02.12.2006
Source:
SecurityVulns ID:6885
Type:client
Threat Level:
5/10
Description:Buffer overflow on .PLF files parsing.
Affected:BLAZEVIDEO : BlazeVideo HDTV Player 2.1
Files:0-day BlazeVideo HDTV Player <= v2.1 Malformed PLF Buffer Overflow PoC

Novell ZENworks multiple security vulnerabilities
Published:02.12.2006
Source:
SecurityVulns ID:6882
Type:remote
Threat Level:
5/10
Description:Heap buffer overflows in Novell ZENworks Asset Management and Novell ZENworks Asset Management Collection client.
Affected:NOVELL : ZENworks Asset Management 7.0
Original documentdocumentIDEFENSE, iDefense Security Advisory 12.01.06: Novell ZENworks Asset Management Msg.dll Heap Overflow Vulnerability (02.12.2006)
 documentIDEFENSE, iDefense Security Advisory 12.01.06: Novell ZENworks Asset Management Collection Client Heap Overflow Vulnerability (02.12.2006)

VUPlayer buffer overflow
Published:02.12.2006
Source:
SecurityVulns ID:6884
Type:client
Threat Level:
5/10
Description:Buffer overflow on .M3U files parsing.
Affected:VUPLAYER : VUPlayer 2.44
Files:VUPlayer <= 2.44 m3u parsing remote buffer overflow

WinRAR buffer overflow
Published:02.12.2006
Source:
SecurityVulns ID:6880
Type:client
Threat Level:
6/10
Description:Buffer overflow on oversized filename in 7ZIP archive.
Affected:RARSOFT : WinRAR 3.40
 RARSOFT : WinRAR 3.41
 RARSOFT : WinRAR 3.50
 RARSOFT : WinRAR 3.61
 RARSOFT : WinRAR 3.60
 RARSOFT : WinRAR 3.51
Files:Exploit buffer overflow for WinRar 3.40-3.60 ( 7-zip module )
 Exploit buffer overflow for WinRar 3.40-3.60 ( 7-zip module ) - RAR

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:02.12.2006
Source:
SecurityVulns ID:6883
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:PHPGRAPHY : phpGraphy 0.9
 CPANEL : cPanel 11
 FREEQBOARD : freeqboard 1.1
CVE:CVE-2006-6966 (phpGraphy before 0.9.13a does not properly unset variables when the input data includes a numeric parameter with a value matching an alphanumeric parameter's hash value, which allows remote attackers to execute arbitrary PHP code by uploading a config.php file via the pictures[] parameter to index.php. NOTE: it could be argued that this vulnerability is due to a bug in the unset PHP command (CVE-2006-3017) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in phpGraphy.)
Original documentdocumentAdvisory_(at)_Aria-Security.net, [Aria-Security Team] DuWare DuClassMate SQL Injection Vuln (02.12.2006)
 documentAdvisory_(at)_Aria-Security.net, [Aria-Security Team] DuWare DuNews SQL Injection Vuln (02.12.2006)
 documentajannhwt_(at)_hotmail.com, Ultimate HelpDesk All Version (Source/XSS) Vulnerabilities (02.12.2006)
 document-= SHELL =- -= SHELL =-, freeqboard <= 1.1 (qb_path) Remote File Include Vulnerability (02.12.2006)
 documentShaFuq31_(at)_HoTMaiL.CoM, Aspee Ziyareti Defteri (tr) Sql injection Vuln. (02.12.2006)
 documentAdvisory_(at)_Aria-Security.net, [Aria-Security.Net] Web Hosting Control Panel - cPanel 11 Multiple Cross-Site Scripting Vulnerabilites (02.12.2006)
Files:WikyBlog Local File Inclusion Exploit
 PHPGraphy 0.9.12 Zend_Hash_Del_Key_Or_Index privilege escalation

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod