Computer Security
[EN] no-pyccku

Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
SecurityVulns ID:10357
Threat Level:
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:WOWD : Wowd 1.3
Original documentdocumentMustLive, Cross-Site Scripting vulnerability in Joostina (29.10.2009)
 documentLostmon lords, Fwd: Wowd search client multiple variable xss (29.10.2009)

Opera code execution
SecurityVulns ID:10358
Threat Level:
Description:Code execution via RSS feeds.
Affected:OPERA : Opera 10.0
Original documentdocumentInferno, Hijacking Opera's Native Page using malicious RSS payloads (29.10.2009)

Hummingbird STR service / EMC Documentum eRoom / OpenText Search Server buffer overflow
SecurityVulns ID:10359
Threat Level:
Description:Buffer overflow on TCP/10500 traffic parsing.
Affected:EMC : Documentum eRoom 7.4
 OPENTEXT : OpenText Search Server 6.0
 OPENTEXT : OpenText Search Server 6.1
Original documentdocumentZDI, ZDI-09-074: Multiple Vendor Hummingbird STR Service Stack Overflow Vulnerability (29.10.2009)

VMWare multiple security vulnerabilities
SecurityVulns ID:10360
Threat Level:
Description:Privilege escalation in guest system. Directory traversal on access from guest to host system.
Affected:VMWARE : VMware Server 1.0
 VMWARE : VMware ESXi 3.5
 VMWARE : VMware ESX 3.5
 VMWARE : VMware Workstation 6.5
 VMWARE : VMware Player 2.5
 VMWARE : VMware ACE 2.5
 VMWARE : VMware Server 2.0
 VMWARE : VMware Fusion 2.0
 VMWARE : VMware ESXi 4.0
 VMWARE : VMware ESX 4.0
CVE:CVE-2009-3733 (Directory traversal vulnerability in VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138 on Linux, VMware ESXi 3.5, and VMware ESX 3.0.3 and 3.5 allows remote attackers to read arbitrary files via unspecified vectors.)
 CVE-2009-2267 (VMware Workstation 6.5.x before 6.5.3 build 185404, VMware Player 2.5.x before 2.5.3 build 185404, VMware ACE 2.5.x before 2.5.3 build 185404, VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138, VMware Fusion 2.x before 2.0.6 build 196839, VMware ESXi 3.5 and 4.0, and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0, when Virtual-8086 mode is used, do not properly set the exception code upon a page fault (aka #PF) exception, which allows guest OS users to gain privileges on the guest OS by specifying a crafted value for the cs register.)
Original documentdocumentVMWARE, Invalid #PF Exception Code in VMware can result in Guest Privilege Escalation (29.10.2009)
 documentVMWARE, VMSA-2009-0015 VMware hosted products and ESX patches resolve two security issues (29.10.2009)
Files:VMWare Workstation Virtual 8086 Linux Local ring0 exploit

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod