Computer Security
[EN] securityvulns.ru no-pyccku


HP Insight Diagnostics Online Edition crossite scripting
updated since 20.12.2010
Published:25.05.2011
Source:
SecurityVulns ID:11318
Type:remote
Threat Level:
4/10
Affected:HP : HP Insight Diagnostics Online Edition 8.5
CVE:CVE-2010-4111 (Cross-site scripting (XSS) vulnerability in HP Insight Diagnostics Online Edition before 8.5.1.3712 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.)
Original documentdocumentProCheckUp Research, PR10-11: Multiple XSS injection vulnerabilities and a offsite redirection flaw within HP System Management Homepage (Insight Manager) (25.05.2011)
 documentHP, [security bulletin] HPSBMA02615 SSRT100228 rev.1 - HP Insight Diagnostics Online Edition Running on Linux and Windows, Remote Cross Site Scripting (XSS) (20.12.2010)

Linux kernel EFI/XFS DoS
updated since 14.04.2011
Published:25.05.2011
Source:
SecurityVulns ID:11588
Type:local
Threat Level:
4/10
Description:Buffer overflow on partiotion GUID parsing.
Affected:LINUX : kernel 2.6
CVE:CVE-2011-1776 (The is_gpt_valid function in fs/partitions/efi.c in the Linux kernel before 2.6.39 does not check the size of an Extensible Firmware Interface (EFI) GUID Partition Table (GPT) entry, which allows physically proximate attackers to cause a denial of service (heap-based buffer overflow and OOPS) or obtain sensitive information from kernel heap memory by connecting a crafted GPT storage device, a different vulnerability than CVE-2011-1577.)
 CVE-2011-1577 (Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.)
 CVE-2011-0711 (The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.)
Original documentdocumentUBUNTU, [USN-1133-1] Linux kernel vulnerabilities (25.05.2011)
 documentTimo Warns, [PRE-SA-2011-04] Heap overflow in EFI partition handling code of the Linux kernel (12.05.2011)
 documentTimo Warns, [PRE-SA-2011-03] Denial-of-service vulnerability in EFI partition handling code of the Linux kernel (14.04.2011)

Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:25.05.2011
Source:
SecurityVulns ID:11683
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:EXTCAL : ExtCalendar 2.0
 WORDPRESS : Easy Contact 0.1
 AJAXCHAT : Ajax Chat 1
 PHPSCHEDULEIT : phpScheduleIt 1.2
 MOJOLICIOUS : Mojolicious 1.12
Original documentdocumentjeffto_(at)_eljeffto.com, Session hacking via authentication cookie on Oracle CRM on Demand (25.05.2011)
 documentDEBIAN, [SECURITY] [DSA 2239-1] libmojolicious-perl security update (25.05.2011)
 documentHigh-Tech Bridge Security Research, HTB22986: SQL injection in ExtCalendar 2 (25.05.2011)
 documentHigh-Tech Bridge Security Research, HTB22987: Multiple XSS in phpScheduleIt (25.05.2011)
 documentHigh-Tech Bridge Security Research, HTB22995: XSS in Ajax Chat (25.05.2011)
 documentMustLive, FPD и XSS уязвимости в Easy Contact для WordPress (25.05.2011)

7T Interactive Graphical SCADA System memory corruption
Published:25.05.2011
Source:
SecurityVulns ID:11684
Type:remote
Threat Level:
6/10
Description:Memory corruption on TCP/20222 data parsing.
Affected:7T : Interactive Graphical SCADA System 9.0
Original documentdocumentVUPEN Security Research, VUPEN Security Research - 7T Interactive Graphical SCADA System (IGSS) Remote Memory Corruption (25.05.2011)

Gadu-Gadu crossite scripting
Published:25.05.2011
Source:
SecurityVulns ID:11685
Type:remote
Threat Level:
5/10
Description:Crossite scripting via filename.
Original documentdocumentKacper Szczesniak, Gadu-Gadu 0-Day Remote Code Execution (25.05.2011)

ruby multiple security vulnerabilities
Published:25.05.2011
Source:
SecurityVulns ID:11686
Type:library
Threat Level:
6/10
Description:Crossite scripting, privilege escalation, Exception#to_s method data modification, VpMemAlloc memory corruption.
Affected:RUBY : ruby 1.8
CVE:CVE-2011-1005 (The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.)
 CVE-2011-1004 (The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.)
 CVE-2011-0188 (The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an "integer truncation issue.")
 CVE-2010-0541 (Cross-site scripting (XSS) vulnerability in the WEBrick HTTP server in Ruby in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, allows remote attackers to inject arbitrary web script or HTML via a crafted URI that triggers a UTF-7 error page.)
Original documentdocumentMANDRIVA, [ MDVSA-2011:097 ] ruby (25.05.2011)

python security vulnerabilities
Published:25.05.2011
Source:
SecurityVulns ID:11688
Type:library
Threat Level:
5/10
Description:Source code leakage in CGIHTTPServer, local files acces in urllib.
Affected:PYTHON : python 2.5
 PYTHON : python 2.6
 PYTHON : python 3.0
CVE:CVE-2011-1521 (The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x before 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote attackers to obtain sensitive information or cause a denial of service (resource consumption) via a crafted URL, as demonstrated by the file:///etc/passwd and file:///dev/zero URLs.)
 CVE-2011-1015 (The is_cgi method in CGIHTTPServer.py in the CGIHTTPServer module in Python 2.5, 2.6, and 3.0 allows remote attackers to read script source code via an HTTP GET request that lacks a / (slash) character at the beginning of the URI.)
Original documentdocumentMANDRIVA, [ MDVSA-2011:096 ] python (25.05.2011)

Cisco routers Router Advertisement Guarding protection bypass
Published:25.05.2011
Source:
SecurityVulns ID:11689
Type:remote
Threat Level:
6/10
Description:It's possible to bypass protection with fragmented ICMPv6 packet.
Original documentdocumentMarc Heuse, Bypassing Cisco's ICMPv6 Router Advertisement Guard feature (25.05.2011)

Lumension Device Control memory corruption
updated since 25.05.2011
Published:27.08.2011
Source:
SecurityVulns ID:11687
Type:remote
Threat Level:
5/10
Description:Memory corruption on TCP/65129 traffic parsing.
Affected:LUMENSION : Lumension Device Control 4.4
Original documentdocument[email protected], NGS00054 Technical Advisory: : Lumension Device Control (formerly Sanctuary) remote memory corruption (27.08.2011)
 document[email protected], NGS00054 Patch Notification: Lumension Device Control (formerly Sanctuary) remote memory corruption (25.05.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod