Computer Security
[EN] securityvulns.ru no-pyccku


MySQL COM_CREATE_DB format string vulnerability
Published:09.07.2009
Source:
SecurityVulns ID:10055
Type:local
Threat Level:
5/10
Description:Format string vulnerability via databse name.
Affected:ORACLE : MySQL 5.0
Original documentdocumentKingcope Kingcope, MySQL <= 5.0.45 post auth format string vulnerability (09.07.2009)
Files:Exploits MySQL <= 5.0.45 post auth format string vulnerability

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:09.07.2009
Source:
SecurityVulns ID:10056
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:WORDPRESS : WordPress 2.8
CVE:CVE-2009-2336 (The forgotten mail interface in WordPress and WordPress MU before 2.8.1 exhibits different behavior for a password request depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for "user convenience.")
 CVE-2009-2335 (WordPress and WordPress MU before 2.8.1 exhibit different behavior for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for "user convenience.")
 CVE-2009-2334 (wp-admin/admin.php in WordPress and WordPress MU before 2.8.1 does not require administrative authentication to access the configuration of a plugin, which allows remote attackers to specify a configuration file in the page parameter to obtain sensitive information or modify this file, as demonstrated by the (1) collapsing-archives/options.txt, (2) akismet/readme.txt, (3) related-ways-to-take-action/options.php, (4) wp-security-scan/securityscan.php, and (5) wp-ids/ids-admin.php files. NOTE: this can be leveraged for cross-site scripting (XSS) and denial of service.)
Original documentdocumentCORE SECURITY TECHNOLOGIES ADVISORIES, CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information (09.07.2009)

Awingsoft Awakening Winds3D Viewer unauthorized access
Published:09.07.2009
Source:
SecurityVulns ID:10057
Type:client
Threat Level:
5/10
Description:Code execution, file system access.
Affected:AWINGSOFT : Winds3D Viewer 3.5
CVE:CVE-2009-2386 (Insecure method vulnerability in Awingsoft Awakening Winds3D Viewer plugin 3.5.0.0, 3.0.0.5, and possibly other versions allows remote attackers to force the download and execution of arbitrary files via the GetURL method.)
Original documentdocumentCORE SECURITY TECHNOLOGIES ADVISORIES, [Full-disclosure] CORE-2009-0519 - Awingsoft Awakening Winds3D Viewer remote command execution vulnerability (09.07.2009)

IBM Lotus Sametime Instant Messaging and Web Conferencing
Published:09.07.2009
Source:
SecurityVulns ID:10058
Type:remote
Threat Level:
3/10
Description:Different reply timeings in case for invalid username and password.
Affected:IBM : Lotus Instant Messaging and Web Conferencing 6.5
Original documentdocumentSense of Security, [Full-disclosure] Lotus Sametime User Enumeration Vulnerability - Security Advisory - SOS-09-004 (09.07.2009)

Apache DoS
Published:09.07.2009
Source:
SecurityVulns ID:10059
Type:remote
Threat Level:
5/10
Description:Data exceeding Content-length value causes CPU exhaustion. mod_deflate doesn't break file compress operation if client disconnects.
Affected:APACHE : Apache 2.2
 APACHE : Apache 2.3
CVE:CVE-2009-1891 (The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).)
 CVE-2009-1890 (The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.)
Original documentdocumentMANDRIVA, [ MDVSA-2009:149 ] apache (09.07.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod