Computer Security
[EN] securityvulns.ru no-pyccku


Ghostscript buffer overflow
updated since 12.05.2010
Published:18.05.2010
Source:
SecurityVulns ID:10829
Type:library
Threat Level:
6/10
Description:Few buffer overflows.
Affected:GHOSTSCRIPT : Ghostscript 8.64
 GHOSTSCRIPT : Ghostscript 8.70
CVE:CVE-2010-1869 (Stack-based buffer overflow in the parser function in GhostScript 8.70 and 8.64 allows context-dependent attackers to execute arbitrary code via a crafted PostScript file.)
Original documentdocumentRodrigo Branco, GhostScript Vulnerability Clarification - CVE-2010-1869 (18.05.2010)
 documentDan Rosenberg, Multiple memory corruption vulnerabilities in Ghostscript (12.05.2010)
Files:GhostScript 8.70 exploit for FreeBSD 8.0
 GhostScript 8.70 PoC

SpringSource tc Server authentication bypass
Published:18.05.2010
Source:
SecurityVulns ID:10846
Type:remote
Threat Level:
5/10
Description:Access with empty password is possible if encrypted passwords are used for JMX interface.
Affected:SPRINGSOURCE : tc Server 6.0
CVE:CVE-2010-1454 (com.springsource.tcserver.serviceability.rmi.JmxSocketListener in VMware SpringSource tc Server Runtime 6.0.19 and 6.0.20 before 6.0.20.D, and 6.0.25.A before 6.0.25.A-SR01, does not properly enforce the requirement for an encrypted (aka s2enc) password, which allows remote attackers to obtain JMX interface access via a blank password.)
Original documentdocumentVMWARE, CVE-2010-1454: SpringSource tc Server unauthenticated remote access to JMX interface (18.05.2010)

Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:18.05.2010
Source:
SecurityVulns ID:10847
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:JOOMLA : com_simpledownload 0.9
Original documentdocumentjerzy.patraszewski_(at)_gmail.com, Joomla component SimpleDownload Local File Inclusion (18.05.2010)
 documentMaciej Gojny, XSS, SQL injection vulnerability in I-Vision CMS (18.05.2010)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod