Computer Security
[EN] securityvulns.ru no-pyccku


snort IDS intrusion detection bypass
Published:18.02.2006
Source:
SecurityVulns ID:5793
Type:remote
Threat Level:
5/10
Description:Invalid IP packets reassembly allows signatures bypass.
Affected:SNORT : snort 2.4
Original documentdocumentsiouxsie_(at)_entheogen.ru, SNORT Incorrect fragmented packet reassembly (18.02.2006)

Multiple PatchLink Update Server patch management solution vulnerabilities
updated since 18.02.2006
Published:18.02.2006
Source:
SecurityVulns ID:5795
Type:remote
Threat Level:
5/10
Affected:NOVELL : PatchLink Update Server 6.2
Original documentdocumentBrian Boner, Bugs/Security issues with PatchLink's Update Server (18.02.2006)

Mozilla Thunderbird buffer overflow
Published:18.02.2006
Source:
SecurityVulns ID:5796
Type:client
Threat Level:
6/10
Description:Buffer overflow on oversized LDIF file entry.
Affected:MOZILLA : Thunderbird 1.5
Original documentdocumentJavor Ninov, [Full-disclosure] Mozila Thunderbird 1.5 Address Book DoS (18.02.2006)

libapreq library DoS
Published:18.02.2006
Source:
SecurityVulns ID:5797
Type:library
Threat Level:
5/10
Description:Incorrect functions "apreq_parse_headers()" and "apreq_parse_urlencoded()" implementation.
Affected:LIBAPREQ : libapreq 2.06
Original documentdocumentSECUNIA, [SA18846] Libapreq2 Unspecified Vulnerability (18.02.2006)

Macallan Mail Solution directory traversal
Published:18.02.2006
Source:
SecurityVulns ID:5798
Type:remote
Threat Level:
5/10
Description:Directory traversal in IMAP server.
Affected:MACALLAN : Macallan Mail Solution 4.8
Original documentdocumentSECUNIA, [SA18775] Macallan Mail Solution IMAP Commands Directory Traversal (18.02.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod