Computer Security
[EN] securityvulns.ru no-pyccku


SHTTPD HTTP server information leak
Published:26.06.2007
Source:
SecurityVulns ID:7849
Type:remote
Threat Level:
5/10
Description:It's possible to access scripts source code with request of kind http://127.0.0.1/test.php%20
Affected:SHTTPD : SHTTPD 1.38
Original documentdocumentimprili_(at)_gmail.com, SHTTPD V1.38 server source code disclosure (26.06.2007)

Safari bufer overflow
Published:26.06.2007
Source:
SecurityVulns ID:7850
Type:client
Threat Level:
4/10
Description:Buffer overflow during creation of bookmark for the page with oversized title.
Affected:APPLE : Safari 3.0
Original documentdocumentazizov_(at)_itdefence.ru, Safari Bookmarks Buffer Overflow Vulnerability (26.06.2007)

Key Focus Web Server crossite scripting
Published:26.06.2007
Source:
SecurityVulns ID:7851
Type:remote
Threat Level:
5/10
Description:Crossite scripting with administration console.
Affected:KEYFOCUS : KF Web Server 3.1
Original documentdocumentimprili_(at)_gmail.com, KF Web Server 3.1.0 admin console XSS (26.06.2007)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:26.06.2007
Source:
SecurityVulns ID:7852
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:CALENDARIX : Calendarix 0.7
 EQDKP : eqDKP 1.3
 PHPTRAFFICA : phpTrafficA 1.4
 POWERPHLOGGER : Power Phlogger 2.2
 PLUXML : Pluxml 0.3
 MYNEWS : MyNews 0.10
CVE:CVE-2007-3259 (Calendarix 0.7.20070307 allows remote attackers to obtain sensitive information via (1) an invalid month[] parameter to calendar.php, (2) an invalid catview[] parameter to cal_week.php in a week operation, (3) an invalid ycyear[] parameter to yearcal.php, or (4) a direct request to cal_functions.inc.php, which reveals the installation path in various error messages.)
 CVE-2007-3258 (calendar.php in Calendarix 0.7.20070307 allows remote attackers to obtain sensitive information via large values to the (1) year and (2) month parameters, which causes negative values to be passed to the mktime library call, and reveals the installation path in the error message.)
 CVE-2007-3183 (Multiple SQL injection vulnerabilities in Calendarix 0.7.20070307, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) month and (2) year parameters to calendar.php and the (3) search string to cal_search.php.)
 CVE-2007-3182 (Multiple cross-site scripting (XSS) vulnerabilities in Calendarix 0.7.20070307, when register_globals is enabled, allow remote attackers to inject arbitrary web script or HTML via the (1) year and (2) month parameters to calendar.php, and the (3) leftfooter parameter to cal_footer.inc.php. NOTE: the ycyear parameter to yearcal.php is already covered by CVE-2006-1835.)
 CVE-2007-2520 (SQL injection vulnerability in admin.php in MyNews 0.10, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the authacc cookie.)
Original documentdocumentkefka, [Full-disclosure] Overwrite variables eqDKP 1.3.2d and prior (login.php) (26.06.2007)
 documentlaurent gaffie, phpTrafficA < 1.4.2 (26.06.2007)
 documentsecurityresearch_(at)_netvigilance.com, Calendarix version 0.7. 20070307 Multiple Path Disclosure Vulnerabilities (26.06.2007)
 documentsecurityresearch_(at)_netvigilance.com, MyNews version 0.10 SQL Injection Vulnerability (26.06.2007)
 documentsecurityresearch_(at)_netvigilance.com, Calendarix version 0.7. 20070307 Multiple XSS Attacks (26.06.2007)
 documentsecurityresearch_(at)_netvigilance.com, Calendarix version 0.7. 20070307 Multiple SQL Injection Vulnerabilities (26.06.2007)
 documentsecurityresearch_(at)_netvigilance.com, Calendarix version 0.7. 20070307 Multiple Path Disclosure Vulnerabilities (26.06.2007)
 documentgmdarkfig_(at)_gmail.com, Pluxml 0.3.1 Remote Code Execution Exploit (26.06.2007)
 documentdarkz.gsa_(at)_gmail.com, POWER PHLOGGER v.2.2.5 (username) SQL Injection (26.06.2007)
Files:Pluxml 0.3.1 Remote Code Execution Exploit

LiteWeb HTTP server DoS
Published:26.06.2007
Source:
SecurityVulns ID:7853
Type:remote
Threat Level:
5/10
Description:Large number of requests to nonexistant page causes resource consumption.
Affected:LITEWEB : LiteWEB 2.7
Original documentdocumentimprili_(at)_gmail.com, LiteWEB 2.7 404 Denial of Services (26.06.2007)
Files:LiteWEB 2.7 404 Denial of Services

MIT Kerberos multiple security vulnerabilities
updated since 26.06.2007
Published:27.06.2007
Source:
SecurityVulns ID:7854
Type:remote
Threat Level:
6/10
Description:kadmind stack-based buffer overflow, buffer overflow and uninitialized pointer free() in RPC library.
Affected:MIT : krb5 1.6
CVE:CVE-2007-2798 (Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.)
 CVE-2007-2443 (Integer signedness error in the gssrpc__svcauth_unix function in svc_auth_unix.c in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a negative length value.)
 CVE-2007-2442 (The gssrpc__svcauth_gssapi function in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a zero-length RPC credential, which causes kadmind to free an uninitialized pointer during cleanup.)
Original documentdocumentIDEFENSE, iDefense Security Advisory 06.26.07: Multiple Vendor Kerberos kadmind Rename Principal Buffer Overflow Vulnerability (26.06.2007)
 documentMIT, MITKRB5-SA-2007-005: kadmind vulnerable to buffer overflow (26.06.2007)
 documentMIT, MITKRB5-SA-2007-004: kadmind multiple RPC lib vulnerabilities (26.06.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod