Computer Security
[EN] securityvulns.ru no-pyccku


FreeBSD IEEE 802.11 wireless network buffer overflow
updated since 19.01.2006
Published:20.01.2006
Source:
SecurityVulns ID:5667
Type:remote
Threat Level:
7/10
Description:Buffer overflow on parsing IEEE 802.11 control frames.
Affected:FREEBSD : FreeBSD 6.0
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-06:05.80211 (20.01.2006)
 documentSECUNIA, [SA18353] FreeBSD IEEE 802.11 Buffer Overflow Vulnerability (19.01.2006)

tftpd32 TFTP server format string vulnerability
Published:20.01.2006
Source:
SecurityVulns ID:5671
Type:remote
Threat Level:
5/10
Description:SEND and GET TFTP commands format string bug.
Affected:TFTPD32 : TFTPD 2.81
Original documentdocumentmircia, tftpd32 format string (20.01.2006)
Files:Tftpd32 Format String PoC DoS

Unauthorized ecartis mailing lists manager access
Published:20.01.2006
Source:
SecurityVulns ID:5673
Type:remote
Threat Level:
6/10
Description:Attachment sent to -request address is saved to web accessible folder, allowing to put files on the Web server.
Affected:ECARTIS : ecartis 1.0
Original documentdocumentSECUNIA, [SA18524] Ecartis "pantomime" Functionality Attachment Handling Security Issue (20.01.2006)

Multiple RockLife MailSite mail server vulnerabilities
Published:20.01.2006
Source:
SecurityVulns ID:5672
Type:remote
Threat Level:
5/10
Description:Crossite scripting and DoS.
Affected:ROCKLIFE : MailSite 6.1
 ROCKLIFE : MailSite 7.0
Original documentdocumentOS2A BTO, [Full-disclosure] RockLiffe MailSite wconsole.dll Denial of Service/Script Injection Vulnerability (20.01.2006)
 documentSECUNIA, [SA18551] MailSite Cross-Site Scripting and Denial of Service (20.01.2006)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:20.01.2006
Source:
SecurityVulns ID:5670
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:ETOMITE : Etomite 0.6
 GALLERY : Gallery 1.5
 ARBLOG : ar-blog 5.2
 WEBSPOT : WebspotBlogging 3.0
 TYPO3 : TYPO3 3.7
Original documentdocumentSECUNIA, [SA18557] Gallery Fullname Script Insertion Vulnerability (20.01.2006)
 documentSECUNIA, [SA18556] Etomite "cij" Shell Command Execution Backdoor Security Issue (20.01.2006)
 documentAliaksandr Hartsuyeu, [eVuln] WebspotBlogging Authentication Bypass Vulnerability (20.01.2006)
 documentnight_warrior771_(at)_hotmail.com, Land Down Under Signature HTML Code Injection (20.01.2006)
 documents3ude_(at)_hotmail.com, -2- [XSS] in ar-blog v 5.2 (20.01.2006)
 document:) :), Phpclanwebsite BBCode IMG Tag XSS Vulnerability (20.01.2006)
 document:) :), phpXplorer file inclusion biyosecurity.be (20.01.2006)

KDE libraries / Konqueror buffer overflow
updated since 20.01.2006
Published:22.01.2006
Source:
SecurityVulns ID:5669
Type:remote
Threat Level:
6/10
Description:Buffer overflow on Unicode URL parsing within JavaScript processor.
Affected:KDE : KDE 3.2
 KDE : KDE 3.3
 KDE : KDE 3.4
 KDE : kdelibs 3.4
 KDE : KDE 3.5
Original documentdocumentKDE, [KDE Security Advisory] kjs encodeuri/decodeuri heap overflow (22.01.2006)
 documentUBUNTU, [Full-disclosure] [USN-245-1] KDE library vulnerability (20.01.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod