Computer Security
[EN] securityvulns.ru no-pyccku


Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:05.02.2006
Source:
SecurityVulns ID:5736
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:PLUGGEDOUT : PluggedOut Blog 1.9
 LOUDBLOG : LoudBlog 0.4
 MYTOPIX : MyTopix 1.2
 TACHYONDECAY : Vanilla Guestbook 1.0
Original documentdocumentShell, [Full-disclosure] cPanel 10 mime/handle.html XSS Vulnerability (05.02.2006)
 documentShell, [Full-disclosure] cPanel 10 File Editing Vulnerability (05.02.2006)
 documentAliaksandr Hartsuyeu, [eVuln] Vanilla Guestbook Multiple XSS & SQL Injection Vulnerabilities (05.02.2006)
 documenth e, PluggedOut Blog SQL injection and XSS (05.02.2006)
 documentalireza hassani, [KAPDA::#26] - MyTopix Sql Injection & Path Disclosure (05.02.2006)
 documentmfoxhacker_(at)_gmail.com, sql injection in ASP Survey (05.02.2006)
 documentrgod_(at)_autistici.org, LoudBlog <= 0.4 arbitrary remote inclusion (05.02.2006)
Files:Exploits LoudBlog 0.4 remote commands execution

Microsoft Internet Explorer 7 beta version buffer overflow
Published:05.02.2006
Source:
SecurityVulns ID:5737
Type:client
Threat Level:
6/10
Description:urlmon.dll <bgsound> tag oversized SRC filename paramter buffer overflow.
Affected:MICROSOFT : Internet Explorer 7.0
Original documentdocumentSECURITEAM, [NT] Internet Explorer 7.0 Beta 2 urlmon.dll Buffer Overflow (05.02.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod