Computer Security
[EN] securityvulns.ru no-pyccku


Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:24.01.2011
Source:
SecurityVulns ID:11372
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:PHPCMS : phpcms 9
 RT : request-tracker 3.6
 AWSTATS : awstats 6.9
CVE:CVE-2011-0009 (Best Practical Solutions RT 3.x before 3.8.9rc2 and 4.x before 4.0.0rc4 uses the MD5 algorithm for password hashes, which makes it easier for context-dependent attackers to determine cleartext passwords via a brute-force attack on the database.)
 CVE-2010-4369 (Directory traversal vulnerability in AWStats before 7.0 allows remote attackers to have an unspecified impact via a crafted LoadPlugin directory.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 2150-1] request-tracker3.6 security update (24.01.2011)
 documentUBUNTU, [USN-1047-1] AWStats vulnerability (24.01.2011)
 documenteidelweiss_(at)_windowslive.com, phpcms V9 BLind SQL Injection Vulnerability (24.01.2011)
 documentMustLive, Full path disclosure и SQL Injection уязвимости в MC Content Manager (24.01.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod