Computer Security
[EN] securityvulns.ru no-pyccku


Agnitum Outpost protection bypass
Published:24.07.2008
Source:
SecurityVulns ID:9169
Type:local
Threat Level:
5/10
Description:File protection bypass with special characters in filenames.
Affected:AGNITUM : Outpost Security Suite Pro 2009
Original documentdocumentjplopezy_(at)_gmail.com, Outpost Security Suite Pro ver. 2009 Multiple vulnerabilities (24.07.2008)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:24.07.2008
Source:
SecurityVulns ID:9168
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc. Nucleus: information leak, SQL injection, crossite scripting, automation protection bypass.
Affected:MOODLE : Moodle 1.6
 CLAROLINE : Claroline 1.8
 NUCLEUS : Nucleus 3.01
Original documentdocumentProCheckUp Research, PR08-16: CSRF (Cross-site Request Forgery) on Moodle edit profile page (24.07.2008)
 documentProCheckUp Research, PR08-15: Several Webroot Disclosures on Moodle (24.07.2008)
 documentProCheckUp Research, PR08-13: Persistent Cross-site Scripting (XSS) on Moodle via blog entry title (24.07.2008)
 documentDigital Security Research Group [DSecRG], [DSECRG-08-032] Claroline 1.8.10 Multiple XSS Vulnerabilities (24.07.2008)
 documentMustLive, Multiple vulnerabilities in Nucleus (24.07.2008)

Wireshark sniffer DoS
Published:24.07.2008
Source:
SecurityVulns ID:9170
Type:remote
Threat Level:
5/10
Description:Application crash on network traffic parsing.
Affected:WIRESHARK : Wireshark 1.0
 WIRESHARK : Tshark 1.0
CVE:CVE-2008-3145 (The fragment_add_work function in epan/reassemble.c in Wireshark 0.8.19 through 1.0.1 allows remote attackers to cause a denial of service (crash) via a series of fragmented packets with non-sequential fragmentation offset values, which lead to a buffer over-read.)
Original documentdocumentMANDRIVA, [ MDVSA-2008:152 ] - Updated wireshark packages fix denial of service vulnerability (24.07.2008)

Asterisk multiple security vulnerabilities
Published:24.07.2008
Source:
SecurityVulns ID:9171
Type:remote
Threat Level:
5/10
Description:Traffic amplification, DoS with resouurces exhaustion.
Affected:ASTERISK : Asterisk 1.0
 ASTERISK : Asterisk 1.2
 DIGIUM : Asterisk 1.4
CVE:CVE-2008-3264 (The FWDOWNL firmware-download implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (traffic amplification) via an IAX2 FWDOWNL request.)
 CVE-2008-3263 (The IAX2 protocol implementation in Asterisk Open Source 1.0.x, 1.2.x before 1.2.30, and 1.4.x before 1.4.21.2; Business Edition A.x.x, B.x.x before B.2.5.4, and C.x.x before C.1.10.3; AsteriskNOW; Appliance Developer Kit 0.x.x; and s800i 1.0.x before 1.2.0.1 allows remote attackers to cause a denial of service (call-number exhaustion and CPU consumption) by quickly sending a large number of IAX2 (IAX) POKE requests.)
Original documentdocumentASTERISK, AST-2008-010: Asterisk IAX 'POKE' resource exhaustion (24.07.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod