Computer Security
[EN] securityvulns.ru no-pyccku


The Bat! mail agent headers spoofing
Published:06.02.2006
Source:
SecurityVulns ID:5740
Type:client
Threat Level:
5/10
Description:message/partial format alows to spoof message headers completely, making it impossible to track sender by Received or Message-ID headers.
Affected:RITLABS : The Bat! 2.12
Original documentdocument3APA3A, SECURITY.NNOV: The Bat! 2.x message headers spoofing (06.02.2006)
Files:Exploits The Bat! message headers spoofing
 The Bat! 2.x message headers spoofing

Borland C BCB6 compiler / tiny c compiler Invalid sizeof() calculation
updated since 06.02.2006
Published:07.02.2006
Source:
SecurityVulns ID:5739
Type:library
Threat Level:
5/10
Description:Invalid sizeof() calculation for integer during 64-bit code compilation leads to different problems.
Affected:BORLAND : BCB6
 TCC : tcc 0.9
Original documentdocumentXFOCUS, Re: [xfocus-SD-060206]BCB compiler incorrect deal sizeof operator vulnerability (07.02.2006)
 documentXFOCUS, [Full-disclosure] [xfocus-SD-060206]BCB compiler incorrect deal sizeof operator vulnerability (06.02.2006)
Files:Check compiler whether correct deal with sizeof operator

Microsoft HTML Help Workshop buffer overflow
updated since 06.02.2006
Published:14.02.2006
Source:
SecurityVulns ID:5738
Type:client
Threat Level:
5/10
Description:Buffer overflow on .hhp files parsing.
Affected:MICROSOFT : Microsoft HTML Help Workshop 4.74
Original documentdocumentEagle Werros, Eagle Werros (14.02.2006)
 documentEagle Werros, vuln & p0c (10.02.2006)
 documentSECUNIA, [SA18740] Microsoft HTML Help Workshop ".hhp" Parsing Buffer Overflow (06.02.2006)
Files: Microsoft HTML Help Workshop ".hhp" File Handling Buffer Overflow Exploit
 Exploits HTML Help Workshop buffer overflow
 Windows HTML Help Workshop Index File Stack Overflow Exploit

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod