Computer Security
[EN] securityvulns.ru no-pyccku


IBM Lotus Notes code execution
Published:15.02.2011
Source:
SecurityVulns ID:11439
Type:client
Threat Level:
5/10
Description:Code injection via cai: URI is not fixed for more than year.
Original documentdocumentZDI, ZDI-11-051: IBM Lotus Notes cai URI Handler Remote Code Execution Vulnerability (15.02.2011)

Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:15.02.2011
Source:
SecurityVulns ID:11437
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:DJANGO : django 1.2
 SEOPANEL : Seo Panel 2.2
 CHERRYSOFTWARE : Wikipad 1.6
 GOLLOS : Gollos 2.8
 ARTGKCMS : ArtGK CMS
 ARTICFOX : Arctic Fox CMS 0.9
 CHERRYSOFTWARE : Photopad 1.2
 XARAYA : Xaraya 2.2
CVE:CVE-2011-0697 (Cross-site scripting (XSS) vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 might allow remote attackers to inject arbitrary web script or HTML via a filename associated with a file upload.)
 CVE-2011-0696 (Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a "combination of browser plugins and redirects," a related issue to CVE-2011-0447.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 2163-1] python-django security update (15.02.2011)
 documentHigh-Tech Bridge Security Research, HTB22829: Path disclosure in Xaraya (15.02.2011)
 documentHigh-Tech Bridge Security Research, HTB22828: Multiple XSS vulnerabilities in Photopad (15.02.2011)
 documentHigh-Tech Bridge Security Research, HTB22827: File Content Disclosure in Wikipad (15.02.2011)
 documentHigh-Tech Bridge Security Research, HTB22833: Information Disclosure in Arctic Fox CMS (15.02.2011)
 documentHigh-Tech Bridge Security Research, HTB22832: Path disclosure in ArtGK CMS (15.02.2011)
 documentHigh-Tech Bridge Security Research, HTB22831: XSS vulnerability in Gollos (15.02.2011)
 documentHigh-Tech Bridge Security Research, HTB22830: Multiple XSS vulnerabilities in Gollos (15.02.2011)
 documentHigh-Tech Bridge Security Research, HTB22826: Multiple XSS vulnerabilities in Wikipad (15.02.2011)
 documentHigh-Tech Bridge Security Research, HTB22825: SQL Injection in Seo Panel (15.02.2011)
 documentHigh-Tech Bridge Security Research, HTB22824: SQL Injection in Seo Panel (15.02.2011)
 documentHigh-Tech Bridge Security Research, HTB22823: SQL Injection in Seo Panel (15.02.2011)

IBM Informix buffer overflow
Published:15.02.2011
Source:
SecurityVulns ID:11438
Type:local
Threat Level:
6/10
Description:Buffer overflow in USELASTCOMMITTED option is not fixed for > 2 years.
Original documentdocumentZDI, ZDI-11-050: IBM Informix Dynamic Server SET ENVIRONMENT Remote Code Execution Vulnerability (15.02.2011)

Accellion File Transfer Appliance multiple security vulnerabilities
Published:15.02.2011
Source:
SecurityVulns ID:11440
Type:remote
Threat Level:
6/10
Description:Backdoor keys, accounts and firewall rules, code execution, unauthorized access.
Original documentdocumentHD Moore, R7-0039: Accellion File Transfer Appliance Multiple Vulnerabilities (15.02.2011)

OpenSSL DoS
Published:15.02.2011
Source:
SecurityVulns ID:11435
Type:library
Threat Level:
6/10
Description:Uninitialized memory reference on ClientHello request parsing.
CVE:CVE-2011-0014 (ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0 through 1.0.0c allows remote attackers to cause a denial of service (crash), and possibly obtain sensitive information in applications that use OpenSSL, via a malformed ClientHello handshake message that triggers an out-of-bounds memory access, aka "OCSP stapling vulnerability.")
Original documentdocumentDEBIAN, [SECURITY] [DSA 2162-1] openssl security update (15.02.2011)

Check Point Endpoint Security Server / Integrity Server information leaks
Published:15.02.2011
Source:
SecurityVulns ID:11436
Type:remote
Threat Level:
6/10
Description:Sensitive information, including private keys and passwords is accessible from Web interface.
Affected:CHECKPOINT : Endpoint Security Server 71
 CHECKPOINT : Endpoint Security Server 72
 CHECKPOINT : Endpoint Security Server 73
 CHECKPOINT : Integrity Server 7
Original documentdocumentHD Moore, R7-0038: Check Point Endpoint Security Server Information Disclosure (15.02.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod