Computer Security
[EN] securityvulns.ru no-pyccku


Medal of Honor game buffer overflow
Published:11.05.2006
Source:
SecurityVulns ID:6122
Type:remote
Threat Level:
6/10
Affected:EA : Medal of Honor Allied Assault 1.11
 EA : Medal of honor: Spearhead 2.15
Files:MOHAA Win32 Server Buffer-Overflow Exploit (getinfo)

Zango Adware code execution
Published:11.05.2006
Source:
SecurityVulns ID:6123
Type:m-i-t-m
Threat Level:
5/10
Description:The integrity of downloaded components is not checked.
Original documentdocumentThierry Zoller, [Full-disclosure] [TZO-042006] Insecure Auto-Update and File execution (11.05.2006)

Cisco Application Velocity System TCP port relaying
Published:11.05.2006
Source:
SecurityVulns ID:6124
Type:remote
Threat Level:
5/10
Description:Default configuration allows any TCP port to be accessed with transparent HTTP proxy request.
Affected:CISCO : AVS 3110 4.0
 CISCO : AVS 3110 5.0
 CISCO : AVS 3120 5.0
Original documentdocumentCISCO, Cisco Security Advisory: AVS TCP Relay Vulnerability (11.05.2006)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:11.05.2006
Source:
SecurityVulns ID:6125
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:MYBB : MyBB 1.1
 HACKMASTER : DMCounter 0.9
 UAPPLICATION : UBlog 1.6
 PHPLISTPRO : PhpListPro 2.01
 MANAGEENGINE : OpManager 6.0
 ALIPAGER : AliPAGER 1.5
Original documentdocumentSECUNIA, [SA20067] ManageEngine OpManager "searchTerm" Cross-Site Scripting (11.05.2006)
 documentaura_(at)_aria-security.net, vbulletin security Alert (11.05.2006)
 documentSnoBMSN_(at)_Hotmail.De, PhpListPro 2.01 Remote File Include Vulnerability (11.05.2006)
 documentBreeeeh_(at)_hotmail.com, mybb v1.1.1(showthread.php) SQL Injection Exploit (11.05.2006)
 documentSnoBMSN_(at)_Hotmail.De, UBlog Remote XSS Exploit (11.05.2006)
 documentc-w-m_(at)_hackmaster.us, Hackmaster Group DMCounter Remote File Include (11.05.2006)
Files:Exploits Vbulletin CSS upload code execution

Verisign I-Nav Internationalized Domain Names (IDN) code execution
Published:11.05.2006
Source:
SecurityVulns ID:6126
Type:client
Threat Level:
6/10
Description:VUpdater.Install allows to install software without integrity check.
Affected:VERISIGN : i-Nav ActiveX Control
Original documentdocumentZDI, ZDI-06-014: Verisign I-Nav ActiveX Control Code Execution Vulnerability (11.05.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod