Computer Security
[EN] securityvulns.ru no-pyccku


Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
updated since 08.08.2006
Published:10.08.2006
Source:
SecurityVulns ID:6462
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:VWAR : VWar 1.5
 BLUR6EX : blur6ex 0.3
 SIMPLOG : simplog 0.9
 PHPSIMPLESHOP : PHP Simple Shop 2.0
 SAPID : SAPID CMS 123
 PHPCC : phpCC 4.2
 USOLVED : NEWSolved Lite 1.9
 DELUXEBB : DeluxeBB 1.08
 VISUALEVENTSCALE : isual Events Calendar 1.1
 PHPPRINTANALYZER : phpPrintAnalyzer 1.1
 TAGGER : Tagger 3
Original documentdocumentMORGAN, Tagger v3 <= BBCodeFile Remote file inclusion (10.08.2006)
 documentsh3ll_(at)_sh3ll.ir, phpPrintAnalyzer <= 1.1 (rep_par_rapport_racine) Remote File Inclusion Vulnerability (08.08.2006)
 documentx0r0n_(at)_hotmail.com, Visual Events Calendar v1.1 (cfg_dir) Remote Inclusion Vulnerability (08.08.2006)
 documentdarkz.gsa_(at)_gmail.com, DeluxeBB Multiple Vulnerabilities (08.08.2006)
 documentpiiiiiii pppiiiiiiii, simplog 0.9.3 and prior XSS (08.08.2006)
 documentAG Spider, Virtual War v1.5.0 Remote File Include (vwar_root) (08.08.2006)
 documentpiiiiiii pppiiiiiiii, blur6ex 0.3 Comment title HTML inyection vuln. (08.08.2006)
 documentphilipp.niedziela_(at)_gmx.de, NEWSolved Lite v1.9.2 (abs_path) Remote File Inclusion (08.08.2006)
 documentsimo64_(at)_morx.org, SAPID CMS remote File Inclusion vulnerabilities (08.08.2006)
 documentchris_hasibuan_(at)_yahoo.com, SolpotCrew Advisory #6 - phpCC - Beta 4.2 (base_dir) Remote File Inclusion (08.08.2006)
 documenterdc_(at)_echo.or.id, SolpotCrew Advisory #6 - phpCC - Beta 4.2 (base_dir) Remote File Inclusion (08.08.2006)
 documenterdc_(at)_echo.or.id, [ECHO_ADV_44$2006] PHP Simple Shop <= 2.0 (abs_path) Remote File Inclusion (08.08.2006)
 documentc.boulton_(at)_mybboard.com, XennoBB <= 2.1.0 "birthday" SQL injection (08.08.2006)
Files:Exploits SAPID CMS remote File Inclusion Vulnerabilities

MIT Kerberos / Heimdal privilege escalation
updated since 09.08.2006
Published:10.08.2006
Source:
SecurityVulns ID:6471
Type:local
Threat Level:
6/10
Description:setuid()/seteuid() return code is not checked, allowing user to bypass protection by exhausting user limits.
Affected:HEIMDAL : Heimdal 0.5
 MIT : krb5 1.4
 HEIMDAL : Heimdal 0.6
 HEIMDAL : Heimdal 0.7
 MIT : krb5 1.5
Original documentdocumentSECUNIA, [SA21436] Heimdal setuid Security Issue (10.08.2006)
 documentMIT, MITKRB-SA-2006-001: multiple local privilege escalation vulnerabilities (09.08.2006)

ncompress buffer overflow
Published:10.08.2006
Source:
SecurityVulns ID:6474
Type:client
Threat Level:
5/10
Description:Buffer overflow on data extraction.
Affected:NCOMPRESS : ncompress 4.2
Original documentdocumentMANDRIVA, [ MDKSA-2006:140 ] - Updated ncompress packages fix vulnerability (10.08.2006)

Multiple AlsaPlayer security vulnerabilities
Published:10.08.2006
Source:
SecurityVulns ID:6476
Type:remote
Threat Level:
5/10
Description:Multiple buffer overflows.
Affected:ALSA : AlsaPlayer 0.99
Original documentdocumentLuigi Auriemma, Multiple buffer-overflows in AlsaPlayer 0.99.76 (10.08.2006)
Files:Exploits Multiple buffer-overflows in AlsaPlayer 0.99.76

Multiple MODPlug Tracker/OpenMPT security vulnerabilities
Published:10.08.2006
Source:
SecurityVulns ID:6477
Type:library
Threat Level:
5/10
Description:Few heap and stack based buffer overflows.
Affected:MODPLUG : OpenMPT 1.17
 LIBMODPLUG : libmodplug 0.8
Original documentdocumentLuigi Auriemma, Stack and heap overflows in MODPlug Tracker/OpenMPT 1.17.02.43 and libmodplug 0.8 (10.08.2006)
Files:Exploits OpenMPT <= 1.17.02.43 and SVN <= 157 stack and heap overflows

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:10.08.2006
Source:
SecurityVulns ID:6478
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:THATWARE : Thatware 0.4
 SAVEWEBPORTAL : SaveWebPortal 3.4
 PHPWCMS : phpwcms 1.2
 PGMARKET : PgMarket 2.2
 CIVICSPACE : CivicSpace 0.8
 BLOGHOSTER : BlogHoster 2.2
 CWFM : Cwfm 0.9
 SPAMINATOR : Spaminator 1.7
 DRUPAL : Bibliography 4.5
 RUBYONRAILS : Ruby on Rails 1.1
 HITWEB : hitweb 4.2
Original documentdocumentSECUNIA, [SA21430] hitweb "REP_INC" File Inclusion Vulnerability (10.08.2006)
 documentSECUNIA, [SA21424] Ruby on Rails Unspecified Vulnerability (10.08.2006)
 documentSECUNIA, [SA21435] Drupal Bibliography Module Cross-Site Scripting and SQL Injection (10.08.2006)
 documentSECUNIA, [SA21438] MojoGallery "admin.cgi" Cross-Site Scripting Vulnerabilities (10.08.2006)
 documentx0rax, SaveWebPortal <= 3.4(page) Remote File Inclusion Vulnerability (10.08.2006)
 documentMILW0RM, Thatware 0.4.6 (root_path) Remote File Inclusion (10.08.2006)
 documentMILW0RM, Spaminator 1.7. ($page) Remote File Include (10.08.2006)
 documentMORGAN, PhpwCMS 1.2.6 <= Multiple Remote file inclusion vulnerabilities (10.08.2006)
 documentVicente Perez, [Full-disclosure] Latinchat Denial Of Service (10.08.2006)
 documentphilipp.niedziela_(at)_gmx.de, Cwfm <= 0.9.1 (Language) Remote File Inclusion Vulnerability (10.08.2006)
 documentpiiiiiii pppiiiiiiii, BlogHoster v2.2 Post Comment Html Injection (10.08.2006)
 documentpiiiiiii pppiiiiiiii, CivicSpace Version 0.8.5 HTML injection (10.08.2006)
 documentx0r0n_(at)_hotmail.com, PgMarket 2.2.3 (CFG[libdir]) Remote File Inclusion Vulnerabilities (10.08.2006)

Multiple ArcSoft MMS Composer for PocketPC security vulnerabilities
Published:10.08.2006
Source:
SecurityVulns ID:6479
Type:remote
Threat Level:
6/10
Description:Multiple vulnerabilities with DoS and code execution impacts on MMS receiving.
Affected:ARCSOFT : MMS Composer 1.5
 ARCSOFT : MMS Composer 2.0
Original documentdocumentCollin R. Mulliner, [Full-disclosure] PocketPC MMS - Remote Code Injection/Execution Vulnerability and Denial-of-Service (10.08.2006)
Files:NotfiFlood - a Proof-of-Concept PocketPC MMS Composer flooder

Macromedia ColdFusion authentication bypass
Published:10.08.2006
Source:
SecurityVulns ID:6480
Type:remote
Threat Level:
5/10
Description:Some AdminAPI API functionality is available without authentication.
Affected:ADOBE : Macromedia ColdFusion MX 7.02
Original documentdocumentSECUNIA, [SA21421] ColdFusion AdminAPI Authentication Bypass (10.08.2006)

Sun Ray Server Software utxconfig privilege escalation
Published:10.08.2006
Source:
SecurityVulns ID:6481
Type:local
Threat Level:
5/10
Affected:SUN : Sun Ray Server Software 3.0
Original documentdocumentSECUNIA, [SA21398] Sun Ray Server Software utxconfig Privilege Escalation (10.08.2006)

Sun Solaris DoS
Published:10.08.2006
Source:
SecurityVulns ID:6482
Type:library
Threat Level:
5/10
Description:System panic in drain_squeue() on large number of TCP connections.
Affected:ORACLE : Solaris 10
Original documentdocumentSECUNIA, [SA21453] Sun Solaris "drain_squeue()" Denial of Service (10.08.2006)

Microsoft Office code execution
updated since 16.06.2006
Published:10.08.2006
Source:
SecurityVulns ID:6270
Type:client
Threat Level:
8/10
Description:hlink.dll and Excel styles vulnerability, vulnerabilities in different record types processing are used to install malicious software in-the-wild.
Affected:MICROSOFT : Office 2000
 MICROSOFT : Office XP
 MICROSOFT : Office 2003
Original documentdocumentTSRT_(at)_3com.com, TSRT-06-10: Microsoft HLINK.DLL Hyperlink Object Library Buffer Overflow Vulnerability (10.08.2006)
 documentTSRT_(at)_3com.com, [Full-disclosure] TSRT-06-10: Microsoft HLINK.DLL Hyperlink Object Library Buffer Overflow Vulnerability (09.08.2006)
 documentMICROSOFT, Microsoft Security Bulletin MS06-050 Vulnerabilities in Microsoft Windows Hyperlink Object Library Could Allow Remote Code Execution (920670) (09.08.2006)
 documentNSFOCUS, [VulnWatch] NSFOCUS SA2006-06 : Microsoft Excel COLINFO Record Buffer Overflow Vulnerability (12.07.2006)
 documentNSFOCUS, [VulnWatch] NSFOCUS SA2006-05 : Microsoft Excel SELECTION Record Memory Corruption Vulnerability (12.07.2006)
 documentxin ouyang, [Full-disclosure] Microsoft Excel Could Allow Remote Code Execution by Malformed FNGROUPCOUNT value Vulnerability (12.07.2006)
 documentSowhat ., [Full-disclosure] Microsoft Excel Array Index Error Remote Code Execution (12.07.2006)
 documentZDI, ZDI-06-022: Microsoft Office Excel File Rebuilding Code Execution Vulnerability (12.07.2006)
 documentMICROSOFT, Microsoft Security Bulletin MS06-037 Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (917285) (11.07.2006)
 documentnanika, Excel 0day : Excel 2000/XP/2003 Style 0day POC (03.07.2006)
 documentCERT, US-CERT Technical Cyber Security Alert TA06-167A -- Microsoft Excel Vulnerability (17.06.2006)
 documentMIKEREAVEY, Reports of a new vulnerability in Microsoft Excel (16.06.2006)
Files:excel unicode overflow poc
 Microsoft Excel Remote Code Execution Proof Of Concept
 "Microsoft Office Excel 2003" Hlink Stack/SEH Overflow Exploit
 Excel 2000/XP/2003 Style 0day POC
 0-day Microsoft WORD Hlink Local Buffer Overflow Exploit
 Microsoft Security Bulletin MS06-037 Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (917285)
 Microsoft Security Bulletin MS06-050 Vulnerabilities in Microsoft Windows Hyperlink Object Library Could Allow Remote Code Execution (920670)

Multiple Intel Centrino / PROSet / Apple Airport wireless drivers security vulnerabilities
updated since 10.08.2006
Published:22.09.2006
Source:
SecurityVulns ID:6475
Type:remote
Threat Level:
9/10
Description:Multiple vulnerabilities, including local privilege escalation anre remote code execution.
Affected:APPLE : MacOS X 10.3
 APPLE : Mac OS X 10.4
 INTEL : Intel PRO/Wireless 2200BG
 INTEL : Intel PRO/Wireless 2915ABG
 INTEL : Intel PRO/Wireless 2100
 INTEL : Intel PRO/Wireless 3945ABG
CVE:CVE-2007-0686 (The Intel 2200BG 802.11 Wireless Mini-PCI driver 9.0.3.9 (w29n51.sys) allows remote attackers to cause a denial of service (system crash) via crafted disassociation packets, which triggers memory corruption of "internal kernel structures," a different vulnerability than CVE-2006-6651. NOTE: this issue might overlap CVE-2006-3992.)
 CVE-2006-3992 (Unspecified vulnerability in the Centrino (1) w22n50.sys, (2) w22n51.sys, (3) w29n50.sys, and (4) w29n51.sys Microsoft Windows drivers for Intel 2200BG and 2915ABG PRO/Wireless Network Connection before 10.5 with driver 9.0.4.16 allows remote attackers to execute arbitrary code via certain frames that trigger memory corruption.)
Original documentdocumentAPPLE, About the security content of AirPort Update 2006-001 and Security Update 2006-005 (22.09.2006)
 documentINTEL, Intel® Centrino Wireless Driver Malformed Frame Privilege Escalation (10.08.2006)
 documentINTEL, Intel® PROSet/Wireless Software Local Information Disclosure (10.08.2006)
 documentINTEL, Intel® Centrino Wireless Driver Malformed Frame Remote Code Execution (10.08.2006)
Files:Exploits Intel 2200BG 802.11 disassociation packet Kernel Memory Corruption

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod