Computer Security
[EN] securityvulns.ru no-pyccku


Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:11.07.2006
Source:
SecurityVulns ID:6355
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:RANDSHOP : randshop 1.1
 EDGEWALL : Trac 0.9
 SQUERY : SQuery 4.5
 OTTOMAN : Ottoman CMS 1.1
 PCCOOKBOOK : pc_cookbook 0.3
 PHPPOLLS : phpPolls 1.0
 FARSINEWS : Farsinews 3.0
 BLUEDOJO : Graffiti Forums 1.0
 SQUERY : SQuery 4.0
 SQUERY : SQuery 3.9
 EJ3 : TOPo 2.1
 SABDRIMER : Sabdrimer PRO 2.2
Original documentdocumentSECUNIA, [SA20958] Trac "reStructuredText" Directives Vulnerability (11.07.2006)
 documentA.nosrati, Sabdrimer PRO (v.2.2.4 ) Remote File Include Vulnerability (11.07.2006)
 documentSHiKaA, SQuery <= 4.5(libpath) Remote File Inclusion Exploit (11.07.2006)
 documentpaisterist.nst_(at)_gmail.com, Graffiti Forums v1.0 SQL Injection Vulnerabilities (11.07.2006)
 documentStorM BoY, MT rmcek Toplist v2.2 Version Microsoft Access Driver ( MDB ) Download (11.07.2006)
 documentSaudi Hackrz, randshop <= 1.1.x (index.php) Remote File Inclusion Vulnerability (11.07.2006)
 documentarmin390_(at)_9mail.com, Local file inclusion in Farsinews3.0BETA1 (11.07.2006)
 documentalp_eren_(at)_ayyildiz.org, phpPolls 1.0.3 Administration ByPass (11.07.2006)
 documentmatdhule_(at)_gmail.com, [ECHO_ADV_37$2006] pc_cookbook Mambo/Joomla Component <= v0.3 Remote File Include Vulnerabilities (11.07.2006)
Files:Ottoman CMS <= 1.1.3 Remote File Inclusion Exploit
 EJ3 TOPO 2.2 Remote Code Execution Exploit

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod