Computer Security
[EN] securityvulns.ru no-pyccku


Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:11.04.2011
Source:
SecurityVulns ID:11569
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:PHPCOLLAB : phpCollab 2.5
 WORDPRESS : Live Wire Edition 2.3
 JOOMLA : Joomla 1.6
 1024CMS : 1024cms Admin Control Panel 1.1
 SONEXIS : Sonexis ConferenceManager 9.2
 SONEXIS : Sonexis ConferenceManager 9.3
CVE:CVE-2011-2748 (The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.)
Original documentdocumentrobkraus_(at)_solutionary.com, Sonexis ConferenceManager SQL Injection (11.04.2011)
 documentrobkraus_(at)_solutionary.com, Sonexis ConferenceManager Multiple Cross-site Scripting (XSS) Vulnerabilities (11.04.2011)
 documentHanno Bock, phplist: cross site request forgery (CSRF), CVE-2011-0748 (11.04.2011)
 documentby_argos_(at)_hotmail.com, XSS Vulnerabilities in 1024cms Admin Control Panel v1.1.0 Beta (11.04.2011)
 documentby_argos_(at)_hotmail.com, LFI Vulnerability in 024cms Admin Control Panel v1.1.0 Beta (Complete-Modules Package) (11.04.2011)
 documentby_argos_(at)_hotmail.com, Directory Traversal Vulnerability in 1024cms Admin Control Panel v1.1.0 Beta (Complete-Modules Package) (11.04.2011)
 documentby_argos_(at)_hotmail.com, XSS Vulnerability in 1024cms Admin Control Panel v1.1.0 Beta (Master-cPanel Package) (11.04.2011)
 documentby_argos_(at)_hotmail.com, LFI Vulnerability in 1024cms Admin Control Panel v1.1.0 Beta (Master-cPanel Package) (11.04.2011)
 documenteidelweiss_(at)_windowslive.com, joomlacontenteditor (com_jce) BLIND sql injection vulnerability (11.04.2011)
 documentHigh-Tech Bridge Security Research, HTB22915: Path disclosure in Joomla (11.04.2011)
 documentHigh-Tech Bridge Security Research, HTB22921: SQL Injection in Viscacha (11.04.2011)
 documentHigh-Tech Bridge Security Research, HTB22919: Multiple XSS in Viscacha (11.04.2011)
 documentHigh-Tech Bridge Security Research, HTB22920: Path disclosure in Viscacha (11.04.2011)
 documentHigh-Tech Bridge Security Research, HTB22918: Path disclosure in phpCollab (11.04.2011)
 documentHigh-Tech Bridge Security Research, HTB22917: XSS vulnerabilities in phpCollab (11.04.2011)
 documentHigh-Tech Bridge Security Research, HTB22916: XSRF (CSRF) in phpCollab (11.04.2011)
 documentMustLive, Уязвимости в теме Live Wire Edition для WordPress (11.04.2011)

KDE KSSL certificate spoofing
Published:11.04.2011
Source:
SecurityVulns ID:11570
Type:m-i-t-m
Threat Level:
5/10
Description:It's possible to spoof certificate issued for IP address.
CVE:CVE-2011-1094 (kio/kio/tcpslavebase.cpp in KDE KSSL in kdelibs before 4.6.1 does not properly verify that the server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a certificate issued by a legitimate Certification Authority for an IP address, a different vulnerability than CVE-2009-2702.)
 CVE-2009-2702 (KDE KSSL in kdelibs 3.5.4, 4.2.4, and 4.3 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.)

Debian symbolic links vulnerability
Published:11.04.2011
Source:
SecurityVulns ID:11571
Type:local
Threat Level:
5/10
Description:/etc/cron.d/php5 cron job allows to delete arbitrary files via symlinks.
CVE:CVE-2011-0441 (The Debian GNU/Linux /etc/cron.d/php5 cron job for PHP 5.3.5 allows local users to delete arbitrary files via a symlink attack on a directory under /var/lib/php5/.)
Original documentdocumentMANDRIVA, [ MDVSA-2011:069 ] php (11.04.2011)

tmux privilege escalation
Published:11.04.2011
Source:
SecurityVulns ID:11572
Type:local
Threat Level:
5/10
Description:Elevated group privileges are not dropped.
Affected:TMUX : tmux 1.4
Original documentdocumentDEBIAN, [SECURITY] [DSA 2212-1] tmux security update (11.04.2011)

O2 DSL Router Classic router crossite scripting
Published:11.04.2011
Source:
SecurityVulns ID:11573
Type:remote
Threat Level:
4/10
Description:Crossite scripting in administration interface.
CVE:CVE-2011-0746 (Cross-site request forgery (CSRF) vulnerability in Forms/PortForwarding_Edit_1 on the ZyXEL O2 DSL Router Classic allows remote attackers to hijack the authentication of administrators for requests that insert cross-site scripting (XSS) sequences via the PortRule_Name parameter.)
Original documentdocumentHanno Bock, O2 classic router: persistent cross site scripting (XSS) and cross site request forgery (CSRF) (11.04.2011)

libmodplug library buffer overflow
Published:11.04.2011
Source:
SecurityVulns ID:11574
Type:library
Threat Level:
6/10
Description:ReadS3M buffer overflow. DoS on ABC files parsing.
Affected:LIBMODPLUG : libmodplug 0.8
CVE:CVE-2011-1761 (Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file. NOTE: some of these details are obtained from third party information.)
 CVE-2011-1574 (Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.)
Original documentdocumentSEC Consult Vulnerability Lab, SEC Consult SA-20110407-0 :: Libmodplug ReadS3M Stack Overflow (11.04.2011)

XRDB shell characters vulnerability
Published:11.04.2011
Source:
SecurityVulns ID:11575
Type:local
Threat Level:
5/10
Description:Shell characters vulnerability via host name.
Affected:XORG : xrdb 1.0
CVE:CVE-2011-0465 (xrdb.c in xrdb before 1.0.9 in X.Org X11R7.6 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a (1) DHCP or (2) XDMCP message.)
Original documentdocumentUBUNTU, [USN-1107-1] x11-xserver-utils vulnerability (11.04.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod