Computer Security
[EN] securityvulns.ru no-pyccku


Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:28.01.2006
Source:
SecurityVulns ID:5705
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:RANDSHOP : randshop 1.1
 ARTICLEBEACH : free articles
 ASPTHAI : ASPThai Forums 8.0
 AZBB : azbb 1.1
Original documentdocumentroozbeh afrasiabi, [CORRECTIONS AND ADDITIONS ]Azbb v1.1.00 Cross-Site Scripting (28.01.2006)
 documentcvh_(at)_kapda.ir, The WorldsEnd.NET - Free Ping Script, written in PHP (2 vulns) (28.01.2006)
 documentroozbeh afrasiabi, Azbb v1.1.00 Cross-Site Scripting (28.01.2006)
 documentcode.shell_(at)_yahoo.com, hello (28.01.2006)
 documentSaiLynx, Уязвимость в Randshop <V1_1 (28.01.2006)

Shareaza peeer-to-peer network client multiple integer overflows
Published:28.01.2006
Source:
SecurityVulns ID:5706
Type:remote
Threat Level:
5/10
Description:Multiple integer overflows in different functions.
Affected:SHAREAZA : Shareaza 2.2
Original documentdocumentRyan Smith, Shareaza P2P Remote Vulnerability (28.01.2006)

libAST buffer overflow
updated since 26.01.2006
Published:28.01.2006
Source:
SecurityVulns ID:5695
Type:library
Threat Level:
5/10
Description:conf_find_file() buffer overflow
Affected:LIBAST : libAST 0.7
Original documentdocumentMichael Jennings, LibAST 0.7 Release Fixes Security Vulnerability (28.01.2006)
 documentangelo_(at)_rosiello.org, Rosiello Security - Eterm-LibAST Advisory (26.01.2006)
Files:Eterm libAST buffer overflow exploit

Gnome Evolution mail client DoS
updated since 28.01.2006
Published:21.03.2006
Source:
SecurityVulns ID:5708
Type:client
Threat Level:
5/10
Description:Inline text attachment with oversized string causes application to hang.
Affected:GNOME : Evolution 2.4
 CAIRO : libcairo 1.0
 CAIRO : cairo 1.0
Original documentdocumentMANDRIVA, [ MDKSA-2006:057 ] - Updated cairo packages to address Evolution DoS vulnerability (21.03.2006)
 documentMike Davis, [Full-disclosure] gnome evolution mail client inline text file DoS issue (28.01.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod