Computer Security
[EN] securityvulns.ru no-pyccku


DHCP daemon DoS
Published:04.08.2006
Source:
SecurityVulns ID:6448
Type:remote
Threat Level:
5/10
Affected:DHCP : dhcp 2.0
Original documentdocumentDEBIAN, [Full-disclosure] [SECURITY] [DSA 1143-1] New dhcp packages fix denial of service (04.08.2006)

Ruby Safe Level security bypass
updated since 12.07.2006
Published:04.08.2006
Source:
SecurityVulns ID:6371
Type:library
Threat Level:
5/10
Description:"alias" can be exploited to replace safe function, directory access protection bypass. Few potentially dangerous methods are not limited.
Affected:RUBY : Ruby 1.6
 RUBY : ruby 1.8
Original documentdocumentDEBIAN, [SECURITY] [DSA 1139-1] New ruby1.6 packages fix privilege escalation (04.08.2006)
 documentSECUNIA, [SA21009] Ruby Safe Level Security Bypass Vulnerabilities (12.07.2006)

Linksys WRT54g authentication bypass
updated since 04.08.2006
Published:24.03.2008
Source:
SecurityVulns ID:6449
Type:remote
Threat Level:
5/10
Description:Configuration changes are applied without authentication through Web interface.
Affected:CISCO : Linksys WRT54G
Original documentdocumentSECUNIA, [SA29344] Linksys WRT54G Security Bypass Vulnerability (24.03.2008)
 documentGinsu Rabbit, [Full-disclosure] linksys WRT54g authentication bypass (04.08.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod