Computer Security
[EN] securityvulns.ru no-pyccku


Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:25.08.2007
Source:
SecurityVulns ID:8088
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:BUGZILLA : Bugzilla 2.20
 TIKIWIKI : tikiwiki 1.9
 SPIP : SPIP 1.7
 BUGZILLA : Bugzilla 3.0
Original documentdocumentBUGZILLA, Security Advisory for Bugzilla 3.0, 2.22.1, and 2.20.4 (25.08.2007)
 documentmorin.josh_(at)_gmail.com, Tikiwiki 1.9.7 HTML/embed object injection (25.08.2007)
 documentsystem-errrror_(at)_hotmail.com, SPIP v1.7 Remote File Inclusion Bug (25.08.2007)

UnrealCommander file manager directory traversal
Published:25.08.2007
Source:
SecurityVulns ID:8089
Type:local
Threat Level:
5/10
Description:Directory traversal on archive extraction.
Affected:XDIESEL : Unreal Commander 0.92
Original documentdocumentGynvael Coldwind, X-Diesel Unreal Commander v0.92 (build 573) multiple vulnerabilities (25.08.2007)

Skulltag game buffer overflow
Published:25.08.2007
Source:
SecurityVulns ID:8090
Type:remote
Threat Level:
5/10
Description:Buffer overflow on UDP datagram parsing.
Affected:SKULLTAG : Skulltag 0.97
Original documentdocumentLuigi Auriemma, Heap overflow in Skulltag 0.97d-beta4.1 (25.08.2007)
Files:Exploits Skulltag <= 0.97d-beta4.1 heap overflow

Soldat game multiple security vulnerabilities
Published:25.08.2007
Source:
SecurityVulns ID:8091
Type:remote
Threat Level:
4/10
Description:Multiple DoS conditions.
Affected:SOLDAT : Soldat 1.4
 SOLDAT : Soldat 2.6
Original documentdocumentLuigi Auriemma, Multiple denial of service in Soldat 1.4.2/2.6.2 (25.08.2007)
Files:Exploits Soldat <= 1.4.2/2.6.2 multiple DoS

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod