Computer Security
[EN] securityvulns.ru no-pyccku


Web applications security vulnerabilities (PHP, ASP, JSP, CGI, Perl)
Published:10.01.2006
Source:
SecurityVulns ID:5610
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:MANTIS : Mantis 0.19
 MEGABBS : MegaBBS 2.1
 CACTI : cacti 0.8
 MOODLE : Moodle 1.5
 MANTIS : Mantis 1.0
 JELSOFT : vBulletin 3.5
 JOOMLA : Joomla! 1.0
 FOURTWOSEVENBB : 427BB 2.2
 PLOGGER : Plogger Photo Gallery 2.1
 FOXRUM : foxrum 4.0
 VENOMBOARD : Venom Board 1.22
 WEBWIZ : WebWiz Forums 6.34
 ADODB : ADOdb 4.66
 POSTNUKE : PostNuke 0.761
 HUMMINGBIRD : Hummingbird Collaboration 5.2
Original documentdocumentSECUNIA, [SA18342] MegaBBS "replyid" Disclosure of Private Messages (10.01.2006)
 documentSECUNIA, [SA18360] phpChamber "needle" Cross-Site Scripting Vulnerability (10.01.2006)
 documentSECUNIA, [SA18361] Joomla! vCard Email Address Disclosure and TinyMCE Compressor Vulnerabilities (10.01.2006)
 documentSECUNIA, [Full-disclosure] Secunia Research: ADOdb Insecure Test Scripts Security Issues (10.01.2006)
 documentMustafa Can Bjorn IPEKCI, [Full-disclosure] Advisory:XSS vulnerability on WebWiz Forums <= 6.34 (search_form.asp) (10.01.2006)
 documentthe_bekir_(at)_savsak.com, Html_Injection in vBulletin 3.5.2 (10.01.2006)
 documentserxwebun_(at)_linuxmail.org, Orjinweb E-commerce (10.01.2006)
 documentnight_warrior771_(at)_hotmail.com, Php-Nuke Pool and News Module IMG Tag Cross Site (10.01.2006)
 documentnight_warrior771_(at)_hotmail.com, Xoops Pool Module IMG Tag Cross Site Scripting (10.01.2006)
 documentAliaksandr Hartsuyeu, [eVuln] 427BB Multiple Vulnerabilities (Cookie-based Authentication Bypass, SQL Injections, XSS) (10.01.2006)
 documentAliaksandr Hartsuyeu, [eVuln] Venom Board SQL Injection Vulnerability (10.01.2006)
 documentAliaksandr Hartsuyeu, [eVuln] Foxrum BBCode XSS Vulnerabilty (10.01.2006)
 documentdurito, Sql-инъекция и межсайтовый скриптинг в Plogger Photo Gallery (10.01.2006)

Apache auth_ldap authentication module format string vulnerabilities
Published:10.01.2006
Source:
SecurityVulns ID:5611
Type:remote
Threat Level:
6/10
Description:Format string vulnerability on error logging.
Affected:APACHE : auth_ldap 1.6
Original documentdocumentinfo_(at)_digitalarmaments.com, Digital Armaments Security Advisory 01.09.2006: Apache auth_ldap module Multiple Format Strings Vulnerability (10.01.2006)

pound reverse proxy / load balancer / HTTPS front-end buffer overflow
updated since 01.05.2005
Published:10.01.2006
Source:
SecurityVulns ID:4749
Type:remote
Threat Level:
6/10
Description:Buffer overflow on oversized hostname.
Affected:POUND : pound 1.8
 POUND : pound 1.9
Original documentdocumentDEBIAN, [SECURITY] [DSA 934-1] New pound packages fix multiple vulnerabilities (10.01.2006)
 documentGENTOO, [Full-disclosure] [ GLSA 200504-29 ] Pound: Buffer overflow vulnerability (01.05.2005)

BSD systems securelevel protection bypass
updated since 09.01.2006
Published:10.01.2006
Source:
SecurityVulns ID:5609
Type:local
Threat Level:
5/10
Description:By mounting different filesystem it's possible to mask file flagged 'immutable'. It's possible to rollback system tiime by setting it to maximum value.
Affected:NETBSD : NetBSD 1.6
 LINUX : kernel 2.6
 NETBSD : NetBSD 2.0
 FREEBSD : FreeBSD 6.0
 FREEBSD : FreeBSD 7.0
 DRAGONFLY : DragonFly 1.2
 NETBSD : NetBSD 2.1
Original documentdocumentNETBSD, NetBSD Security Advisory 2006-002: settimeofday() time wrap (10.01.2006)
 documentRedTeam Pentesting, [Full-disclosure] Time modification flaw in BSD securelevels on NetBSD and Linux (09.01.2006)
 documentRedTeam Pentesting, [Full-disclosure] BSD Securelevels: Circumventing protection of files flagged immutable (09.01.2006)

Apache mod-auth-pgsql authorization module format string vulnerabilities
updated since 09.01.2006
Published:10.01.2006
Source:
SecurityVulns ID:5606
Type:remote
Threat Level:
6/10
Description:Several format string bugs in error logging.
Affected:APACHE : mod_auth_pgsql 2.0
Original documentdocumentIDEFENSE, iDefense Security Advisory 01.09.06: Multiple Vendor mod_auth_pgsql Format String Vulnerability (10.01.2006)
 documentUBUNTU, [Full-disclosure] [USN-239-1] libapache2-mod-auth-pgsql vulnerability (09.01.2006)

Sun Solaris uustat buffer overflow
Published:10.01.2006
Source:
SecurityVulns ID:5613
Type:local
Threat Level:
5/10
Description:Buffer overflow in -S option parsing allows privilege escalation to euid uucp.
Original documentdocumentIDEFENSE, [Full-disclosure] iDefense Security Advisory 01.10.06: Sun Solaris uustat Buffer Overflow Vulnerability (10.01.2006)

Microsoft Windows embedded web fonts memory corruption
updated since 10.01.2006
Published:11.01.2006
Source:
SecurityVulns ID:5614
Type:client
Threat Level:
8/10
Description:Memory corruption on parsing web fonts embedded to HTML page. May be used to install trojans, backdoors or another malware to client computer.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
Original documentdocumentPiotr Bania, Microsoft Embedded OpenType Font Engine "t2embed" Remote Heap Overflow (11.01.2006)
 documentEEYE, [VulnWatch] [EEYEB-2000801] - Windows Embedded Open Type (EOT) Font Heap Overflow Vulnerability (11.01.2006)
 documentMICROSOFT, Microsoft Security Bulletin MS06-002 Vulnerability in Embedded Web Fonts Could Allow Remote Code Execution (908519) (10.01.2006)
Files:Microsoft Security Bulletin MS06-002 Vulnerability in Embedded Web Fonts Could Allow Remote Code Execution (908519)

NetBSD kernfs kernel memory information leak
updated since 10.01.2006
Published:03.02.2006
Source:
SecurityVulns ID:5612
Type:local
Threat Level:
5/10
Description:It's possible to lseek behind file boundary to read arbitrary memory.
Affected:NETBSD : 2.1
 NETBSD : 2.0
 NETBSD : 1.6
Original documentdocumentSecurityLab Research, [SLAB] NetBSD / OpenBSD kernfs_xread patch evasion (03.02.2006)
 documentNETBSD, NetBSD Security Advisory 2006-001: Kernfs kernel memory disclosure (10.01.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod