Blogs

Pegasus Mail POP3 Response Remote Buffer Overflow Vulnerability

http://www.securityfocus.com/bid/36797/info

"Pegasus Mail is prone to a remote buffer-overflow vulnerability because
it fails to properly sanitize user-supplied input.

An attacker may exploit this issue to execute arbitrary code in the
context of the vulnerable application. Failed exploit attempts will
likely result in a denial-of-service condition.

Pegasus Mail 4.51 is vulnerable; other versions may also be affected."

Pegasus Mail POP3 Response Remote Buffer Overflow Vulnerability

http://www.securityfocus.com/bid/36797/info

"Pegasus Mail is prone to a remote buffer-overflow vulnerability because
it fails to properly sanitize user-supplied input.

An attacker may exploit this issue to execute arbitrary code in the
context of the vulnerable application. Failed exploit attempts will
likely result in a denial-of-service condition.

Pegasus Mail 4.51 is vulnerable; other versions may also be affected."

Multiple vulnerabilities in Opera allow for remote code execution and URL obfuscation

http://blogs.zdnet.com/security/?p=4775

"Specially crafted domain names can cause a memory corruption in Opera,
which may lead to a crash. Successful exploitation can lead to execution
of arbitrary code."

"Opera may allow scripts to run on the feed subscription page, thereby
gaining access to the feeds object. This can be used for automatic
subscription of feeds, or reading other feeds."

Multiple vulnerabilities in Opera allow for remote code execution and URL obfuscation

http://blogs.zdnet.com/security/?p=4775

"Specially crafted domain names can cause a memory corruption in Opera,
which may lead to a crash. Successful exploitation can lead to execution
of arbitrary code."

"Opera may allow scripts to run on the feed subscription page, thereby
gaining access to the feeds object. This can be used for automatic
subscription of feeds, or reading other feeds."

Pegasus Mail POP3 Response Remote Buffer Overflow Vulnerability

http://www.securityfocus.com/bid/36797/info

"Pegasus Mail is prone to a remote buffer-overflow vulnerability because
it fails to properly sanitize user-supplied input.

An attacker may exploit this issue to execute arbitrary code in the
context of the vulnerable application. Failed exploit attempts will
likely result in a denial-of-service condition.

Pegasus Mail 4.51 is vulnerable; other versions may also be affected."

Multiple vulnerabilities in Opera allow for remote code execution and URL obfuscation

http://blogs.zdnet.com/security/?p=4775

"Specially crafted domain names can cause a memory corruption in Opera,
which may lead to a crash. Successful exploitation can lead to execution
of arbitrary code."

"Opera may allow scripts to run on the feed subscription page, thereby
gaining access to the feeds object. This can be used for automatic
subscription of feeds, or reading other feeds."

Drupal - SA-CONTRIB-2009-085 - Insert Node - Cross Site Scripting

http://drupal.org/node/617400

"Description

The Insert Node module provides an input filter that enables a node to
be inserted within the body field of another node.

The module fails to sanitize the inserted node, making it vulnerable to
a cross site scripting (XSS) attack.
Versions affected

* Insert Node module versions for Drupal 5.x prior to Insert Node
5.x-1.2

Drupal - SA-CONTRIB-2009-085 - Insert Node - Cross Site Scripting

http://drupal.org/node/617400

"Description

The Insert Node module provides an input filter that enables a node to
be inserted within the body field of another node.

The module fails to sanitize the inserted node, making it vulnerable to
a cross site scripting (XSS) attack.
Versions affected

* Insert Node module versions for Drupal 5.x prior to Insert Node
5.x-1.2

Pages