Computer Security
[EN] securityvulns.ru no-pyccku


IPSwitch WS_FTP format string vulnerability
Published:08.09.2009
Source:
SecurityVulns ID:10207
Type:client
Threat Level:
6/10
Description:Format string vulnerability on HTTP server response parsing.
Affected:IPSWITCH : WS_FTP 12
Original documentdocumentJeremy Brown, Ipswitch WS_FTP 12 Professional Remote Format String 0day PoC (08.09.2009)
Files:Ipswitch WS_FTP 12 Professional Remote Format String 0day PoC

Apple Safari / WebKit DoS
Published:08.09.2009
Source:
SecurityVulns ID:10209
Type:client
Threat Level:
5/10
Description:Stack overflow (stack memory exhaustion) on eval() expression parsing.
Affected:APPLE : Safari 3.2
Original documentdocumentJeremy Brown, Safari 3.2.3 (Win32) JavaScript 'eval' Remote Denial of Service Exploit (08.09.2009)
Files:Safari 3.2.3 (Win32) JavaScript 'eval' Remote Denial of Service Exploit

GemStone/S buffer overflow
Published:08.09.2009
Source:
SecurityVulns ID:10208
Type:local
Threat Level:
6/10
Description:Buffer overflow in /opt/gemstone/sys/stoned on -e and -l command line switches.
Affected:GEMSTONE : GemStone/S 6.3
Original documentdocumentJeremy Brown, GemStone/S 6.3.1 "stoned" Local Buffer Overflow Exploit (08.09.2009)
Files:GemStone/S 6.3.1 "stoned" Local Buffer Overflow Exploit

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod