Computer Security
[EN] securityvulns.ru no-pyccku


ps2text unfiltered shell characters code execution
Published:27.11.2006
Source:
SecurityVulns ID:6859
Type:local
Threat Level:
4/10
Description:Shell characters problem thorugh filename.
Affected:PSTOTEXT : pstotext 1.9
Original documentdocumentDEBIAN, [SECURITY] [DSA 1220-1] New pstotext packages fix arbitrary shell command execution (27.11.2006)

QBIK Wingate DoS
Published:27.11.2006
Source:
SecurityVulns ID:6861
Type:remote
Threat Level:
5/10
Description:Nedless loop on compressed DNS requests processing.
Affected:QBIK : Wingate 6.1
Original documentdocumentIDEFENSE, iDefense Security Advisory 11.26.06: Qbik WinGate Compressed Name Pointer Denial of Service Vulnerability (27.11.2006)

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:27.11.2006
Source:
SecurityVulns ID:6862
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:MALBUM : mAlbum 0.3
Original documentdocumentnagazakig74_(at)_hotmail.com, Siap Cms Sql Injection (login.asp) (27.11.2006)
 documentnagazakig74_(at)_hotmail.com, Wisi Portal [Sql Injection By Jesus Tovar] (27.11.2006)
 documenttux025_(at)_gmail.com, mAlbum v0.3 local file inclusion (27.11.2006)
 documentAdvisory_(at)_Aria-Security.net, ClickGallery Sql Injection (27.11.2006)
 documentAdvisory_(at)_Aria-Security.net, [Aria-Security Team] Evolve shopping cart SQL Injection Vulnerability (27.11.2006)
 documentAdvisory_(at)_Aria-Security.net, [Aria-Security Team] General Shopping Cart SQL Injection Vulnerability (27.11.2006)
 documentAdvisory_(at)_Aria-Security.net, Clickblog Sql Injection (27.11.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod