Computer Security
[EN] securityvulns.ru no-pyccku


NuFW transparent firewall DoS
updated since 29.11.2005
Published:28.02.2006
Source:
SecurityVulns ID:5489
Type:remote
Threat Level:
5/10
Description:Service crash on packet parsing, hangs on TLS traffic flood.
Affected:NUFW : NuFW 1.0
 NUFW : NuFW 1.1
Original documentdocumentSECUNIA, [SA19046] NuFW TLS Socket Handling Denial of Service (28.02.2006)
 documentSECUNIA, [SA17754] NuFW Packet Parsing Denial of Service Vulnerability (29.11.2005)

Multiple ArGoSoft Mail Server Pro security vulnerabilities
updated since 24.02.2006
Published:28.02.2006
Source:
SecurityVulns ID:5826
Type:remote
Threat Level:
6/10
Description:Information leak with POP3 _DUMP command, directory traversal with IMAP RENAME command, directory traversal and crossite scripting with Web interface.
Affected:ARGOSOFT : ArGoSoft Mail Server Pro 1.8
Original documentdocumentSECUNIA, Secunia Research: ArGoSoft Mail Server Pro viewheaders Script Insertion (28.02.2006)
 documentNSA Group, NSA Group Security Advisory NSAG-№200-24.02.2006 Vulnerability ArGoSoft Mail Server Pro IMAP (24.02.2006)
 documentNSA Group, NSA Group Security Advisory NSAG-№198-23.02.2006 Vulnerability ArGoSoft Mail Server Pro (24.02.2006)

Mail Transport System Professional open mail relay
Published:28.02.2006
Source:
SecurityVulns ID:5831
Type:remote
Threat Level:
5/10
Description:Mail relayed without IP address verification if smart host (ISP relay) is configured.
Affected:MTSPROFESSIONAL : MTS Professional
Original documentdocumentCraig Morrison, Mail Transport System Professional--Open Relay Hole (28.02.2006)

Thomson SpeedTouch ADSL modems crossite scripting
Published:28.02.2006
Source:
SecurityVulns ID:5833
Type:remote
Threat Level:
5/10
Affected:THOMSON : SpeedTouch 500
Original documentdocumentPreben Nylokken, Thomson SpeedTouch 500 modems vulnerable to XSS (28.02.2006)

Sun Solaris GSFS file system privilege escalation
Published:28.02.2006
Source:
SecurityVulns ID:5835
Type:local
Threat Level:
5/10
Affected:ORACLE : Solaris 8
 ORACLE : Solaris 9
 ORACLE : Solaris 10
Original documentdocumentSECUNIA, [SA19042] Sun Solaris HSFS File System Privilege Escalation Vulnerability (28.02.2006)

Microsoft Internet Explorer IsComponentInstalled buffer overflow
Published:28.02.2006
Source:
SecurityVulns ID:5837
Type:client
Threat Level:
5/10
Description:Problem is fixed in Windows 2000 SP4 / Windows XP SP1.
Affected:MICROSOFT : Internet Explorer 6.0
Files:Windows XP SP0 IE 6.0 IsComponentInstalled() Overflow

Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
updated since 28.02.2006
Published:01.03.2006
Source:
SecurityVulns ID:5832
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:MYPHPNUKE : myPHPNuke 1.8
 SQUIRRELMAIL : squirrelmail 1.4
 PUNBB : PunBB 1.2
 PWSPHP : PwsPHP 1.2
 MYBB : MyBB 1.0
 EKINBOARD : EKINboard 1.0
 FANTASTICNEWS : Fantastic News 2.1
 WORDPRESS : WordPress 2.0
 TECASCRIPTS : Quirex 2.0
 PERLBLOG : PerlBlog 1.08
 PERLBLOG : PerlBlog 1.09
 ARCHANGELWEBLOG : Archangel Weblog 0.90
 PHPRPC : phpRPC 0.7
 TL4S : D3Jeeb Pro 3
 CGICALENDAR : CGI Calendar 2.7
 REYERO : DirectContact 3.0
 LANSUITE : LanParty Intranet System 2.1
 IGENUS : iGENUS Webmail 2.02
 4HOMEPAGES : 4images 1.7
 ISSUEDEALER : Issue Dealer 0.9
 JFACETS : JFacets 0.1
 PARODIA : Parodia 6.2
 N8CMS : n8cms 1.1
 N8CMS : n8cms 1.2
 FARSINEWS : Farsinews 2.5
 EJ3 : EJ3 TOPo 2.2
 SENDCARD : SendCard 3.3
 STOREBOT : StoreBot 2002
 STOREBOT : StoreBot 2005
Original documentdocumentSECUNIA, [SA19019] StoreBot 2005 Professional Edition "Pwd" SQL Injection (01.03.2006)
 documentSECUNIA, [SA19060] StoreBot 2002 Standard Edition "ShipMethod" Script Insertion (01.03.2006)
 documentSECUNIA, [SA19039] PunBB "header.php" Cross-Site Scripting Vulnerability (01.03.2006)
 documentSECUNIA, [SA19061] MyBB "comma" Parameter SQL Injection Vulnerability (01.03.2006)
 documentSECUNIA, [SA19061] MyBB "comma" Parameter SQL Injection Vulnerability (01.03.2006)
 documentmail_(at)_yunusemreyilmaz.com, EJ3 TOPo - Cross Site Scripting Vulnerability (28.02.2006)
 documentHessam Salehi, FarsiNews 2.5Pro Exploit (28.02.2006)
 document:) :), n8cms 1.1 & 1.2 version Sql Эnjection And XSS (28.02.2006)
 documentSECUNIA, [SA19031] JFacets "ProfileID" Profile Change Vulnerability (28.02.2006)
 documentSECUNIA, [SA19044] CrossFire "oldsocketmode" Denial of Service Vulnerability (28.02.2006)
 documentSECUNIA, [SA19045] EKINboard Multiple Vulnerabilities (28.02.2006)
 documentSECUNIA, [SA19018] Issue Dealer Unpublished Content Disclosure Weakness (28.02.2006)
 documentSECUNIA, [SA19052] MyPHPNuke Cross-Site Scripting Vulnerabilities (28.02.2006)
 documentSECUNIA, [SA19023] PwsPHP "sondage" Module SQL Injection Vulnerability (28.02.2006)
 documentSECUNIA, [SA19026] 4images "template" Parameter File Inclusion Vulnerability (28.02.2006)
 documentSECUNIA, [SA19036] iGENUS Webmail File Inclusion Vulnerability (28.02.2006)
 documentSECUNIA, [SA19048] LanSuite LanParty Intranet System "fid" SQL Injection (28.02.2006)
 documentk4p0k4p0_(at)_hotmail.com, WordPress 2.0.1 Multiple Vulnerabilities (28.02.2006)
 documentDonato Ferrante, directory traversal in DirectContact 0.3b (28.02.2006)
 documentbotan_(at)_linuxmail.org, PixelArtKingdom TopSites Remote Command Exucetion (28.02.2006)
 documentbotan_(at)_linuxmail.org, Knowledgebases Remote Command Exucetion (28.02.2006)
 documentISecAuditors Security Advisories, [ISecAuditors Advisories] IMAP/SMTP Injection in SquirrelMail (28.02.2006)
 documentAliaksandr Hartsuyeu, [eVuln] PerlBlog Multiple Vulnerabilities (28.02.2006)
 documentMANDRIVA, [ MDKSA-2006:049 ] - Updated squirrelmail packages fix vulnerabilities (28.02.2006)
 documentrevnic_(at)_gmail.com, CGI Calendar XSS Vulnerability (28.02.2006)
 documents3ude_(at)_hotmail.com, 2 SQL Injection in d3jeeb (28.02.2006)
 documents3ude_(at)_hotmail.com, 2 SQL Injection in Fantastic News (28.02.2006)
 documentJeiAr, phpRPC Library Remote Code Execution (28.02.2006)
 documentAliaksandr Hartsuyeu, [eVuln] Quirex Arbitrary File Disclosure Vulnerability (28.02.2006)
 documentkingofska_(at)_gmail.com, Archangel Weblog 0.90.02 Admin Authentication Bypass & Remote File Inclusion (28.02.2006)
Files:phpRPC <= 0.7 commands execute exploit
 FarsiNews 2.5Pro Exploi

FreeBSD bfsd DoS
updated since 28.02.2006
Published:01.03.2006
Source:
SecurityVulns ID:5834
Type:remote
Threat Level:
5/10
Description:Malcrafted NFS bind request to TCP/2049 causes kernel panic.
Affected:FREEBSD : FreeBSD 6.0
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-06:10.nfs (01.03.2006)
 documentSECUNIA, [SA19017] FreeBSD "nfsd" NFS Mount Request Denial of Service (28.02.2006)

mb_send_mail() PHP safe mode protection bypass
updated since 28.02.2006
Published:01.03.2006
Source:
SecurityVulns ID:5836
Type:local
Threat Level:
6/10
Description:mb_send_mail() and imap_* unfctions allow to access system files.
Affected:PHP : PHP 4.4
 PHP : PHP 5.1
Original documentdocumentced.clerget_(at)_free.fr, (PHP) mb_send_mail security bypass (01.03.2006)
 documentced.clerget_(at)_free.fr, (PHP) imap functions bypass safemode and open_basedir restrictions (01.03.2006)
 documentSECUNIA, [SA18694] PHP "mb_send_mail()" and IMAP Functions Security Bypass (28.02.2006)
Files:Exploits imap functions bypass safemode and open_basedir restrictions
 Exploits mb_send_mail security bypass

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod