Computer Security
[EN] securityvulns.ru no-pyccku


Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:27.02.2008
Source:
SecurityVulns ID:8721
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:DIATHEKE : diatheke 1.5
 NETWINSITE : SurgeMail 38
 NETWINSITE : NetWin WebMail 3.1
CVE:CVE-2008-0932 (diatheke.pl in The SWORD Project Diatheke 1.5.9 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the range parameter.)
Original documentdocumentLuigi Auriemma, Format string and buffer-overflow in SurgeMail 38k4 (27.02.2008)
 documentlovebug_(at)_hotmail.it, php-nuke sql injection reportaj [secid] (27.02.2008)
 documentDEBIAN, [SECURITY] [DSA 1508-1] New diatheke packages fix arbirary shell command execution (27.02.2008)
Files:SurgeMail <= 38k4 multiple vulnerabilities

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod