Computer Security
[EN] securityvulns.ru no-pyccku


Snare multiple security vulnerabilities
Published:11.12.2012
Source:
SecurityVulns ID:12769
Type:remote
Threat Level:
5/10
Description:Information leakage, CSRF, XSS.
Affected:SNARE : snare 1.6
CVE:CVE-2011-5250
 CVE-2011-5249 (Cross-site scripting (XSS) vulnerability in the events page in the System iNtrusion Analysis and Reporting Environment (SNARE) for Linux agent before 1.7.0 allows remote attackers to inject arbitrary web script or HTML via a logged shell command.)
 CVE-2011-5247
Original documentdocumentJust Bugs, Snare for Linux Password Disclosure (11.12.2012)
 documentJust Bugs, Snare for Linux Cross-Site Request Forgery (11.12.2012)
 documentSnare for Linux Cross-Site Scripting via Log Injection, [email protected] (11.12.2012)

GNU GIMP memory corruption
Published:11.12.2012
Source:
SecurityVulns ID:12770
Type:local
Threat Level:
4/10
Description:Memory corruption on XWD files parsing.
Affected:GNU : gimp 2.8
CVE:CVE-2012-5576 (Multiple stack-based buffer overflows in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.8.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large (1) red, (2) green, or (3) blue color mask in an XWD file.)
Original documentdocumentUBUNTU, [USN-1659-1] GIMP vulnerability (11.12.2012)

Contaware FreeVimager memory corruption
Published:11.12.2012
Source:
SecurityVulns ID:12771
Type:local
Threat Level:
4/10
Description:Memory corruption on GIF parsing.
Affected:CONTAWARE : FreeVimager 4.1
Original documentdocumentpereira_(at)_secbiz.de, FreeVimager 4.1.0 <= WriteAV Arbitrary Code Execution (11.12.2012)

DIMIN Viewer memory corruption
Published:11.12.2012
Source:
SecurityVulns ID:12772
Type:local
Threat Level:
4/10
Description:Memory corruption on GIF parsing.
Affected:DIMIN : DIMIN Viewer 5.4
Original documentdocumentpereira_(at)_secbiz.de, DIMIN Viewer 5.4.0 <= WriteAV Arbitrary Code Execution (11.12.2012)

Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:11.12.2012
Source:
SecurityVulns ID:12773
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:BULBSECURITY : Smartphone Pentest Framework 0.1
 IMPLEINVOICES : SimpleInvoices 2011.1
CVE:CVE-2012-5878
 CVE-2012-5695 (Multiple cross-site request forgery (CSRF) vulnerabilities in Bulb Security Smartphone Pentest Framework (SPF) 0.1.2 through 0.1.4 allow remote attackers to hijack the authentication of administrators for requests that conduct (1) shell metacharacter or (2) SQL injection attacks or (3) send an SMS message.)
 CVE-2012-4932 (Multiple cross-site scripting (XSS) vulnerabilities in SimpleInvoices before stable-2012-1-CIS3000 allow remote attackers to inject arbitrary web script or HTML via (1) the having parameter in a manage action to index.php; (2) the Email field in an Add User action; (3) the Customer Name field in an Add Customer action; the (4) Street address, (5) Street address 2, (6) City, (7) Zip code, (8) State, (9) Country, (10) Mobile Phone, (11) Phone, (12) Fax, (13) Email, (14) PayPal business name, (15) PayPal notify url, (16) PayPal return url, (17) Eway customer ID, (18) Custom field 1, (19) Custom field 2, (20) Custom field 3, or (21) Custom field 4 field in an Add Biller action; (22) the Customer field in an Add Invoice action; the (23) Invoice or (24) Notes field in a Process Payment action; (25) the Payment type description field in a Payment Types action; (26) the Description field in an Invoice Preferences action; (27) the Description field in a Manage Products action; or (28) the Description field in a Tax R)
Original documentdocumentMustLive, XSS vulnerability in swfupload in ExpressionEngine (11.12.2012)
 documenttommccredie_(at)_gmail.com, SimpleInvoices 2011.1 Cross-Site-Scripting (XSS) Vulnerabilities CVE-2012-4932 (11.12.2012)
 documentHigh-Tech Bridge Security Research, Multiple Command Execution Vulnerabilities in Smartphone Pentest Framework (11.12.2012)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod