Computer Security
[EN] securityvulns.ru no-pyccku


Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:10.08.2007
Source:
SecurityVulns ID:8026
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:COPPERMINE : Coppermine Photo Gallery 1.3
 PHPMYADMIN : phpMyAdmin 2.10
 STORESPRITE : Storesprite 7
 MAPOSSCRIPTS : File Uploader 1.1
 MAPOSSCRIPTS : Web News 1.1
 MAPOSSCRIPTS : Bilder Uploader 1.3
 MAPOSSCRIPTS : Mapos Bilder Galerie Version 1.0
 MAPOSSCRIPTS : Gästebuch 1.5
 IDEVSPOT : PhpHostBot 1.06
 SHOUTBOX : Shoutbox 1.0
Original documentdocumentokan alp, CA.View/view-law.asp/view-info.asp sql injection (10.08.2007)
 documentokan alp, Education_info/edu_view.asp sql injection (10.08.2007)
 documentrizgar_(at)_linuxmail.org, Shoutbox 1.0 Remote Command Execution Vulnerability (10.08.2007)
 documentmaster-of-desastor_(at)_hotmail.com, Coppermine Photo Gallery (yabbse.inc.php) Remote File Inclusion Vulnerability (10.08.2007)
 documentAdvisory_(at)_Aria-Security.net, [Aria-Security.net] SAS Hotel Management System SQL Injection (10.08.2007)
 documenterdc_(at)_echo.or.id, [ECHO_ADV_83$2007] PhpHostBot <= 1.06 (svr_rootscript) Remote File Inclusion Vulnerability (10.08.2007)
 documentrizgar_(at)_linuxmail.org, Web News 1.1 Remote Command Execution Vulnerability (10.08.2007)
 documentrizgar_(at)_linuxmail.org, Bilder Uploader 1.3 Remote Command Execution Vulnerability (10.08.2007)
 documentrizgar_(at)_linuxmail.org, Mapos Bilder Galerie Version 1.0 Remote Command Execution Vulnerability (10.08.2007)
 documentrizgar_(at)_linuxmail.org, Gstebuch Version 1.5 Remote Command Execution Vulnerability (10.08.2007)
 documentrizgar_(at)_linuxmail.org, File Uploader Version 1.1 Remote Command Execution Vulnerability (10.08.2007)
 documentrizgar_(at)_linuxmail.org, FinDix Remote File Inclusion Vulnerability (10.08.2007)
 documentr0t, phpMyAdmin multiple XSS vuln. (10.08.2007)
 documentr0t, Storesprite XSS vuln. (10.08.2007)

Xvid array index overflow
Published:10.08.2007
Source:
SecurityVulns ID:8027
Type:client
Threat Level:
5/10
Description:Array index overflow in multiple get_intra_block() variants for different Video formats parsing.
CVE:CVE-2007-3329 (Multiple array index errors in the (1) get_intra_block, (2) get_inter_block_h263, and (3) get_inter_block_mpeg functions in src/bitstream/mbcoding.c in Xvid 1.1.2 allow remote attackers to execute arbitrary code via a crafted (a) Avi, (b) H.263, or (c) MPEG file.)
Original documentdocumentGENTOO, [ GLSA 200708-02 ] Xvid: Array indexing vulnerabilities (10.08.2007)

Java screen content spoofing
Published:10.08.2007
Source:
SecurityVulns ID:8030
Type:client
Threat Level:
6/10
Description:It's possible to switch applet to full-screen mode.
Original documentdocumentTonu Samuel, [Full-disclosure] Java fullscreen PWNage (10.08.2007)

Zyxel Zywall crossite request forgery
Published:10.08.2007
Source:
SecurityVulns ID:8031
Type:remote
Threat Level:
3/10
Description:Referer is not chacked on data submission.
Affected:ZYXEL : Zywall 2
Original documentdocumentHenri Lindberg - Smilehouse Oy, [Full-disclosure] Zyxel Zywall 2 multiple vulnerabilities (10.08.2007)

HP OpenView Operations OVTrace buffer overflow
updated since 10.08.2007
Published:29.08.2007
Source:
SecurityVulns ID:8029
Type:remote
Threat Level:
6/10
Description:Multiple buffer overflows on request parsing.
Affected:HP : OpenView Network Node Manager 7.50
 HP : OpenView Network Node Manager 7.01
 HP : OpenView Network Node Manager 6.41
 HP : OpenView Performance Insight 5.0
 HP : OpenView Performance Insight 5.1
 HP : OpenView Performance Insight 5.2
 HP : OpenView Dashboard 2.01
 HP : OpenView Business Process Insight 1.0
 HP : OpenView Business Process Insight 1.1
 HP : OpenView Business Process Insight 2.0
 HP : OpenView Business Process Insight 2.10
 HP : OpenView Cross Platform Component 3.10
 HP : OpenView Service Quality Manager 1.2
 HP : OpenView Service Quality Manager 1.3
 HP : OpenView Service Quality Manager 1.40
 HP : OpenView Operations Manager 7.5
 HP : OpenView Operations Agent 3.10
 HP : OpenView Reporter 3.7
 HP : OpenView Performance Agent 4.5
 HP : OpenView Performance Agent 4.6
 HP : OpenView Internet Service 6.0
 HP : OpenView Internet Service 6.10
 HP : OpenView Internet Service 6.11
 HP : OpenView Internet Service 6.20
CVE:CVE-2007-3872 (Multiple stack-based buffer overflows in the Shared Trace Service (OVTrace) service for HP OpenView Operations A.07.50 for Windows, and possibly earlier versions, allow remote attackers to execute arbitrary code via certain crafted requests.)
 CVE-2007-1676
Original documentdocumentHP, HPSBMA02236 SSRT061260 rev.1 - HP OpenView Performance Manager (OVPM) Running Shared Trace Service on HP-UX, Solaris, and Windows, Remote Arbitrary Code Execution (29.08.2007)
 documentHP, HPSBMA02240 SSRT061260 rev.1 - HP OpenView Operations Manager for Windows (OVOW) with the OpenView Operations Add On Module for OpenView Operations-Business Availability Center Integration Running Shared Trace Service, Remote Arbitrary Code E (16.08.2007)
 document3COM, TPTI-07-14: HP OpenView Multiple Product Shared Trace Service Stack Overflow Vulnerabilities (15.08.2007)
 documentHP, [security bulletin] HPSBMA02239 SSRT061260 rev.1 - HP OpenView Operations (OVO) Agents Running Shared Trace Service, Remote Arbitrary Code Execution (14.08.2007)
 documentHP, [security bulletin] HPSBMA02237 SSRT061260 rev.1 - HP OpenView Performance Agent (OVPA) Running Shared Trace Service, Remote Arbitrary Code Execution (14.08.2007)
 documentHP, [security bulletin] HPSBMA02238 SSRT061260 rev.1 - HP OpenView Reporter Running Shared Trace Service, Remote Arbitrary Code Execution (14.08.2007)
 documentHP, [security bulletin] HPSBMA02241 SSRT061260 rev.1 - HP OpenView Service Quality Manager (OV SQM) Running Shared Trace Service, Remote Arbitrary Code Execution (14.08.2007)
 documentHP, [security bulletin] HPSBMA02242 SSRT061260 rev.1 - HP OpenView Network Node Manager (OV NNM) Running Shared Trace Service, Remote Arbitrary Code Execution (14.08.2007)
 documentHP, [security bulletin] HPSBMA02245 SSRT061260 rev.1 - HP OpenView Dashboard Running Shared Trace Service, Remote Arbitrary Code Execution (14.08.2007)
 documentHP, [security bulletin] HPSBMA02246 SSRT061260 rev.1 - HP OpenView Performance Insight (OVPI) Running Shared Trace Service, Remote Arbitrary Code Execution -------- (14.08.2007)
 documentHP, [security bulletin] HPSBMA02235 SSRT061260 rev.1 - HP OpenView Internet Service (OVIS) Running Shared Trace Service, Remote Arbitrary Code Execution (14.08.2007)
 documentHP, [security bulletin] HPSBMA02244 SSRT061260 rev.1 - HP OpenView Business Process Insight and Related Products Running Shared Trace Service, Remote Arbitrary Code Execution (14.08.2007)
 documentIDEFENSE, iDefense Security Advisory 08.09.07: Hewlett-Packard OpenView Operations OVTrace Buffer Overflow Vulnerabilities (10.08.2007)

Adobe Flash Player sandbox protection bypass
updated since 10.08.2007
Published:24.12.2007
Source:
SecurityVulns ID:8028
Type:client
Threat Level:
5/10
Description:SecurityErrorEvent can be used for client ports scanning.
Affected:ADOBE : Flash Player 9.0
CVE:CVE-2007-4324 (ActionScript 3 (AS3) in Adobe Flash Player 9.0.47.0 allows remote attackers to bypass the Security Sandbox Model, obtain sensitive information, and port scan arbitrary hosts via a Flash (SWF) movie that specifies a connection to make, then uses timing discrepancies from the SecurityErrorEvent error to determine whether a port is open or not.)
Original documentdocumentSECURITEAM, [EXPL] Socket Connection Timing Can Reveal Information About Network Configuration (Exploit) (24.12.2007)
 documentfukami, Design flaw in AS3 socket handling allows port probing (10.08.2007)
Files:Flash 9 AS3 TCP-Portprober

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod