Computer Security
[EN] securityvulns.ru no-pyccku


HP ProCurve switches DoS
Published:03.08.2006
Source:
SecurityVulns ID:6441
Type:remote
Threat Level:
5/10
Affected:HP : ProCurve 3500yl
 HP : ProCurve 6200yl
 HP : ProCurve 5400zl
CVE:CVE-2006-4015 (Hewlett-Packard (HP) ProCurve 3500yl, 6200yl, and 5400zl switches with software before K.11.33 allow remote attackers to cause a denial of service (possibly memory leak or system crash) via unknown vectors.)
Original documentdocumentHP, [security bulletin] HPSBGN02136 SSRT061173 rev.1 - ProCurve Series 3500yl, 6200yl, and 5400zl Switches Running Software Prior to K.11.33 Remote Denial of Service (DoS) (03.08.2006)

CFS cryptographic file system DoS
Published:03.08.2006
Source:
SecurityVulns ID:6442
Type:local
Threat Level:
5/10
Description:Integer overflow causes daemon to crash.
Affected:CFS : cfs 1.4
Original documentdocumentDEBIAN, [SECURITY] [DSA 1138-1] New cfs packages fix denial of service (03.08.2006)

Weak PC Tools antivirus permissions
Published:03.08.2006
Source:
SecurityVulns ID:6443
Type:local
Threat Level:
5/10
Description:Permissions for "PC Tools AntiVirus" folder are set to Everyone:Full Control during installation.
Affected:PCTOOLS : PC Tools AntiVirus 2.1
Original documentdocumentSECUNIA, [Full-disclosure] Secunia Research: PC Tools AntiVirus Insecure Default Directory Permissions (03.08.2006)

Simpliciti Locked Browser protection bypass
Published:03.08.2006
Source:
SecurityVulns ID:6444
Type:local
Threat Level:
5/10
Description:It's possible to escape from jail environment to Windows by using javascript methods.
Original documentdocumentAdam Baldwin, Simpliciti Locked Browser Jail Breakout Vulnerability (03.08.2006)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:03.08.2006
Source:
SecurityVulns ID:6445
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:KAYAKO : Kayako eSupport 2.3
 DRUPAL : Drupal 4.6
 VWAR : VWar 1.5
 MYBB : MyBB 1.1
 DRUPAL : Drupal 4.7
 SAVEWEB : SaveWeb Portal 3.4
 OZJOURNALS : OZJournals 1.5
Original documentdocumentoutlaw_(at)_aria-security.net, CMSimple Cross Site Scripting (03.08.2006)
 documentbeford, Kayako eSupport <= 2.3.1 (subd) Remote File Inclusion Vulnerability: (03.08.2006)
 documentmfoxhacker_(at)_gmail.com, Vwar v1.5.0 <= Sql Injection and XSS vuln. (03.08.2006)
 documentDRUPAL, [Full-disclosure] [DRUPAL-SA-2006-011] Drupal 4.7.3 / 4.6.9 fixes XSS issue (03.08.2006)
 documentluny_(at)_youfucktard.com, OZJournal v1.5 - XSS (03.08.2006)
 documentAliaksandr Hartsuyeu, [eVuln] MyBB 'Avatar URL' XSS Vulnerability (03.08.2006)
 documentdaaan_(at)_gmail.com, Simple CMS (03.08.2006)
 documentx0r0n_(at)_hotmail.com, SaveWeb Portal 3.4 <- (SITE_Path) Remote File Inclusion Vulnerability (03.08.2006)

Hobbit Monitor directory traversal
Published:03.08.2006
Source:
SecurityVulns ID:6446
Type:remote
Threat Level:
5/10
Description:TCP/1984 Hobbit network daemon directory traversal.
Affected:HOBBITMONITOR : HObbit Monitor 4.1
Original documentdocumentHenrik Stoerner, Hobbit monitor security bugfix release - 4.1.2p2 (03.08.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod