Computer Security
[EN] securityvulns.ru no-pyccku


Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:05.11.2007
Source:
SecurityVulns ID:8316
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc. WordPress Peter’s Custom Anti-Spam Image: CAPTCHA protection bypass.
Affected:PHPHELPDESK : phphelpdesk 0.6
 SKALINKS : Skalinks 1.5
 JBCEXPLORER : JBC Explorer 7.20
Original documentdocumentgmdarkfig_(at)_gmail.com, JBC Explorer <= V7.20 RC 1 Remote Code Execution Exploit (05.11.2007)
 documentdjvincy_(at)_hotmail.it, Skalinks <= 1_5 Cross Site Request Forgery Add Admin (05.11.2007)
 documentjoseph.giron13_(at)_gmail.com, phphelpdesk Multiple vulnerabilities (05.11.2007)
 documentMustLive, Vulnerability in Peter’s Custom Anti-Spam Image (05.11.2007)
Files:JBC Explorer <= V7.20 RC 1 Remote Code Execution Exploit

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod