Computer Security
[EN] securityvulns.ru no-pyccku


GE Fanuc Cimplicity buffer overflow
Published:27.01.2008
Source:
SecurityVulns ID:8609
Type:remote
Threat Level:
5/10
Affected:GEFANUC : Cimplicity 6.1
CVE:CVE-2008-0176
Original documentdocumentEyal Udassin, C4 Security Advisory - GE Fanuc Cimplicity 6.1 Heap Overflow (27.01.2008)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:27.01.2008
Source:
SecurityVulns ID:8610
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc. Boundless Source: crossite scripting.
Affected:BOUNDLESS : Boundless Source 1.2
 BOUNDLESS : Boundless Source 2.4
 GEFANUC : Proficy Information Portal 2.6
 PHPRESS : PhPress 0.3
CVE:CVE-2008-0175
 CVE-2008-0174
Original documentdocumentr2t_(at)_hotmail.it, PhPress-0.3.0 Read All Sql Information For Config (27.01.2008)
 documentEyal Udassin, C4 Security Advisory - GE Fanuc Proficy Information Portal 2.6 Authentication Vulnerability (27.01.2008)
 documentEyal Udassin, C4 Security Advisory - GE Fanuc Proficy Information Portal 2.6 Arbitrary File Upload and Execution (27.01.2008)
 documentMustLive, Vulnerabilities in Boundless Source (27.01.2008)

icu / libicu multiple security vulnerabilities
Published:27.01.2008
Source:
SecurityVulns ID:8611
Type:library
Threat Level:
5/10
Description:Multiple vulnerabilities on regular expressions execution.
Affected:ICU : icu 3.6
 ICU : libicu 3.6
CVE:CVE-2007-4771
 CVE-2007-4770
Original documentdocumentMANDRIVA, [ MDVSA-2008:026 ] - Updated icu packages fix vulnerabilities (27.01.2008)

PatchLink Update Unix client symbolic links vulnerability
Published:27.01.2008
Source:
SecurityVulns ID:8612
Type:local
Threat Level:
5/10
Description:Symbolic links vulnerability on temporayr files creation.
Original documentdocumentLarry Cashdollar, Two vulnerabilities for PatchLink Update Client for Unix. (27.01.2008)

pulseuadio privilege escalation
Published:27.01.2008
Source:
SecurityVulns ID:8613
Type:local
Threat Level:
5/10
Description:setuid() result is not checked.
Affected:PULSEAUDIO : PulseAudio 0.9
CVE:CVE-2008-0008 (The pa_drop_root function in PulseAudio 0.9.8, and a certain 0.9.9 build, does not check return values from (1) setresuid, (2) setreuid, (3) setuid, and (4) seteuid calls when attempting to drop privileges, which might allow local users to gain privileges by causing those calls to fail via attacks such as resource exhaustion.)
Original documentdocumentMANDRIVA, [ MDVSA-2008:027 ] - Updated pulseaudio packages fix local root vulnerability (27.01.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod