Computer Security
[EN] securityvulns.ru no-pyccku


Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:13.07.2006
Source:
SecurityVulns ID:6373
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:TOPO : TOPo 2.2
 SQUERY : SQuery 4.5
 CMSMUNDO : CMS Mundo 1.0
 LAZARUS : Lazarus Guestbook 1.6
 FLV : FLV Players 8
Original documentdocumentSECUNIA, [SA20589] CMS Mundo SQL Injection Vulnerabilities (13.07.2006)
 documentxzerox_(at)_linuxmail.org, FLV Players Multiple Input Validation Vulnerabilities (13.07.2006)
 documentdarkz.gsa_(at)_gmail.com, Lazarus Guestbook Cross Site Scripting Vulnerabilities (13.07.2006)
 documentdarkz.gsa_(at)_gmail.com, TOPo v.2.2.178 Account Reset (13.07.2006)
 documentSHiKaA-_(at)_hotmail.com, SQuery <= 4.5(libpath) Remote File Inclusion Exploit (13.07.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod