Информационная безопасность
[RU] switch to English


DoS против quagga
Опубликовано:5 мая 2009 г.
Источник:
SecurityVulns ID:9894
Тип:удаленная
Уровень опасности:
4/10
Описание:Отказ при получении префикса с большим количеством 4-байтовых номеров AS.
Затронутые продукты:QUAGGA : quagga 0.99
Оригинальный текстdocumentDEBIAN, [SECURITY] [DSA 1787-1] New quagga packages fix denial of service (05.05.2009)

Ежедневная сводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)
Опубликовано:5 мая 2009 г.
Источник:
SecurityVulns ID:9895
Тип:удаленная
Уровень опасности:
5/10
Описание:Инъекции PHP, инъекции SQL, обратный путь в каталогах, межсайтовый скриптинг, модификация файлов, утечка информации и т.д.
Затронутые продукты:ICEWARP : IceWarp eMail Server 9.4
 ICEWARP : IceWarp WebMail Server 9.4
 TEMATRES : TemaTres 1.0
 SUN : Glassfish Woodstock Project 4.2
 SUN : Glassfish Enterprise Server 2.1
CVE:CVE-2009-1469 (CRLF injection vulnerability in the Forgot Password implementation in server/webmail.php in IceWarp eMail Server and WebMail Server before 9.4.2 makes it easier for remote attackers to trick a user into disclosing credentials via CRLF sequences preceding a Reply-To header in the subject element of an XML document, as demonstrated by triggering an e-mail message from the server that contains a user's correct credentials, and requests that the user compose a reply that includes this message.)
 CVE-2009-1468 (Multiple SQL injection vulnerabilities in the search form in server/webmail.php in the Groupware component in IceWarp eMail Server and WebMail Server before 9.4.2 allow remote authenticated users to execute arbitrary SQL commands via the (1) sql and (2) order_by elements in an XML search query.)
 CVE-2009-1467 (Multiple cross-site scripting (XSS) vulnerabilities in IceWarp eMail Server and WebMail Server before 9.4.2 allow remote attackers to inject arbitrary web script or HTML via (1) the body of a message, related to the email view and incorrect HTML filtering in the cleanHTML function in server/inc/tools.php; or the (2) title, (3) link, or (4) description element in an RSS feed, related to the getHTML function in server/inc/rss/item.php.)
Оригинальный текстdocumentDSecRG, [DSECRG-09-034] Sun Glassfish Enterprise Server - Multiple Linked XSS vulnerabilies (05.05.2009)
 documentDSecRG, [DSECRG-09-038] Sun Glassfish Woodstock Project - Linked XSS Vulnerability (05.05.2009)
 documenty3nh4ck3r_(at)_gmail.com, MULTIPLE REMOTE VULNERABILITIES--TemaTres 1.0.3--> (05.05.2009)
 documenty3nh4ck3r_(at)_gmail.com, BLIND SQL INJECTION EXPLOIT--TemaTres 1.0.3--> (05.05.2009)
 documentRedTeam Pentesting, [RT-SA-2009-003] IceWarp WebMail Server: SQL Injection in Groupware Component (05.05.2009)
 documentRedTeam Pentesting, [RT-SA-2009-001] IceWarp WebMail Server: Cross Site Scripting in Email View (05.05.2009)
 documentRedTeam Pentesting, [RT-SA-2009-002] IceWarp WebMail Server: User-assisted Cross Site Scripting in RSS Feed Reader (05.05.2009)
 documentRedTeam Pentesting, [RT-SA-2009-003] IceWarp WebMail Server: SQL Injection in Groupware Component (05.05.2009)
Файлы:Exploits IceWarp WebMail Server: Client-Side Specification of "Forgot Password" eMail Content
 Exploits IceWarp WebMail Server: SQL Injection in Groupware Component
 Exploits BLIND SQL INJECTION EXPLOIT--TemaTres 1.0.3-->

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород