Computer Security
[EN] securityvulns.ru no-pyccku


OpenBSD DHCP server buffer overflow
updated since 12.10.2007
Published:05.11.2007
Source:
SecurityVulns ID:8244
Type:remote
Threat Level:
7/10
Description:Integer overflow with "maximum message size" option leads to buffer overflow.
Affected:OPENBSD : OpenBSD 4.0
 OPENBSD : OpenBSD 4.1
 OPENBSD : OpenBSD 4.2
CVE:CVE-2007-5365 (Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2 allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.)
 CVE-2007-0063
Original documentdocumentCORE SECURITY TECHNOLOGIES ADVISORIES, CORE-2007-0928: Stack-based buffer overflow vulnerability in OpenBSD’s DHCP server (12.10.2007)
Files:DoS Exploit for DHCPd bug

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:05.11.2007
Source:
SecurityVulns ID:8316
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc. WordPress Peter’s Custom Anti-Spam Image: CAPTCHA protection bypass.
Affected:PHPHELPDESK : phphelpdesk 0.6
 SKALINKS : Skalinks 1.5
 JBCEXPLORER : JBC Explorer 7.20
Original documentdocumentgmdarkfig_(at)_gmail.com, JBC Explorer <= V7.20 RC 1 Remote Code Execution Exploit (05.11.2007)
 documentdjvincy_(at)_hotmail.it, Skalinks <= 1_5 Cross Site Request Forgery Add Admin (05.11.2007)
 documentjoseph.giron13_(at)_gmail.com, phphelpdesk Multiple vulnerabilities (05.11.2007)
 documentMustLive, Vulnerability in Peter’s Custom Anti-Spam Image (05.11.2007)
Files:JBC Explorer <= V7.20 RC 1 Remote Code Execution Exploit

mono .Net runtime integer overflow
Published:05.11.2007
Source:
SecurityVulns ID:8317
Type:library
Threat Level:
5/10
Description:Integer overflow in BigInteger implementation.
Affected:MONO : mono 1.2
CVE:CVE-2007-5197
Original documentdocumentDEBIAN, [SECURITY] [DSA 1397-1] New mono packages fix integer overflow (05.11.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod