Computer Security
[EN] securityvulns.ru no-pyccku


Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:05.03.2008
Source:
SecurityVulns ID:8749
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Original documentdocumentjose_(at)_eyeos.org, Minigal 2 critical XSS (05.03.2008)
 documentnyubicrew_(at)_irc.mildnet.cn, SolpotCrew Advisory #16 - Mitra Informatika Solusindo cart Remote Sql Injection Exploit (05.03.2008)

Dovecot symbolic links vulnerability
Published:05.03.2008
Source:
SecurityVulns ID:8750
Type:local
Threat Level:
5/10
Description:It's possible to access files readable by mail group via symlinks if mail_extra_groups=mail is set.
Affected:DOVECOT : Dovecot 1.0
Original documentdocumentTimo Sirainen, Dovecot mail_extra_groups setting is often used insecurely (05.03.2008)

Opera browser multiple security vulnerabilities
Published:05.03.2008
Source:
SecurityVulns ID:8751
Type:client
Threat Level:
6/10
Description:Information leakage on form file upload, images comments scrip execution , DOM sanitization filters bypass.
Affected:OPERA : Opera 9.25
CVE:CVE-2008-1082 (Opera before 9.26 allows remote attackers to "bypass sanitization filters" and conduct cross-site scripting (XSS) attacks via crafted attribute values in an XML document, which are not properly handled during DOM presentation.)
 CVE-2008-1081 (Opera before 9.26 allows user-assisted remote attackers to execute arbitrary script via images that contain custom comments, which are treated as script when the user displays the image properties.)
 CVE-2008-1080 (Opera before 9.26 allows user-assisted remote attackers to read arbitrary files by tricking a user into typing the characters of the target filename into a file input.)
Original documentdocumentGENTOO, [ GLSA 200803-09 ] Opera: Multiple vulnerabilities (05.03.2008)

Versant Object Database code execution
Published:05.03.2008
Source:
SecurityVulns ID:8752
Type:remote
Threat Level:
6/10
Description:TCP/5019 client-supplied application execution.
Affected:VERSANT : Object Database 7.0
Original documentdocumentLuigi Auriemma, Arbitrary commands execution in Versant Object Database 7.0.1.3 (05.03.2008)

Evolution format string vulnerability
Published:05.03.2008
Source:
SecurityVulns ID:8753
Type:remote
Threat Level:
6/10
Description:Format string vulnerability on encrypted mail parsing.
Affected:GNOME : Evolution 2.6
CVE:CVE-2008-0072
Original documentdocumentDEBIAN, [SECURITY] [DSA 1512-1] New evolution packages fix arbitrary code execution (05.03.2008)

Google Android SDK multiple security vulnerabilities
Published:05.03.2008
Source:
SecurityVulns ID:8754
Type:remote
Threat Level:
5/10
Description:Multiple vulnerabilities on graphics formats parsing.
CVE:CVE-2008-0986
 CVE-2008-098
 CVE-2007-5268 (pngrtran.c in libpng before 1.0.29 and 1.2.x before 1.2.21 use (1) logical instead of bitwise operations and (2) incorrect comparisons, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG image.)
 CVE-2007-52679
 CVE-2007-5267 (Off-by-one error in ICC profile chunk handling in the png_set_iCCP function in pngset.c in libpng before 1.2.22 beta1 allows remote attackers to cause a denial of service (crash) via a crafted PNG image, due to an incorrect fix for CVE-2007-5266.)
 CVE-2007-5266 (Off-by-one error in ICC profile chunk handling in the png_set_iCCP function in pngset.c in libpng before 1.0.29 beta1 and 1.2.x before 1.2.21 beta1 allows remote attackers to cause a denial of service (crash) via a crafted PNG image that prevents a name field from being NULL terminated.)
 CVE-2007-2445 (The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.17 allows remote attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk CRC value.)
 CVE-2006-5793 (The sPLT chunk handling code (png_set_sPLT function in pngset.c) in libpng 1.0.6 through 1.2.12 uses a sizeof operator on the wrong data type, which allows context-dependent attackers to cause a denial of service (crash) via malformed sPLT chunks that trigger an out-of-bounds read.)
Original documentdocumentCORE SECURITY TECHNOLOGIES ADVISORIES, CORE-2008-0124: Multiple vulnerabilities in Google's Android SDK (05.03.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod