Computer Security
[EN] securityvulns.ru no-pyccku


PGP Desktop privilege escalation
Published:13.04.2009
Source:
SecurityVulns ID:9831
Type:remote
Threat Level:
5/10
Description:Multiple vulnerabilities on IOCTL processing.
Affected:PGP : PGP Desktop 9.9
Original documentdocumentValery Marchuk, [Positive Technologies SA 2009-01] PGP Desktop Pgpdisk.sys And Pgpwded.sys Multiple Vulnerabilities (13.04.2009)

Apache mod_perl crossite scripting
updated since 13.04.2009
Published:16.04.2009
Source:
SecurityVulns ID:9829
Type:remote
Threat Level:
5/10
Description:perl-status crossite scripting.
Affected:APACHE : mod_perl 2.0
 APACHE : mod_perl 1.3
CVE:CVE-2009-0796 (Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for the Apache HTTP Server, when /perl-status is accessible, allows remote attackers to inject arbitrary web script or HTML via the URI.)
Original documentdocumentantonia.goodwin_(at)_procheckup.com, XSS with mod_perl perl_status utility (16.04.2009)
 documentMANDRIVA, [ MDVSA-2009:091 ] mod_perl (13.04.2009)

OpenBSD pf DoS
updated since 13.04.2009
Published:03.05.2009
Source:
SecurityVulns ID:9830
Type:remote
Threat Level:
7/10
Description:Null pointer dereferenceon malformed IPv4 packet with ICMPv6 data.
Affected:OPENBSD : OpenBSD 4.3
 OPENBSD : OpenBSD 4.4
 NETBSD : OpenBSD 4.5
Original documentdocumentrembrandt, multiple vendor - PF NULL pointer dereference (03.05.2009)
 documentrembrandt, OpenBSD 4.3 up to OpenBSD-current: PF null pointer dereference - remote DoS (kernel panic) (13.04.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod