Computer Security
[EN] securityvulns.ru no-pyccku


Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
Published:05.07.2006
Source:
SecurityVulns ID:6339
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:PHPWEBGALLERY : PhpWebGallery 1.5
 PHPSYSINFO : PHPSysInfo 2.5
 RANDSHOP : randshop 1.2
 STUDIP : Stud.IP 1.3
 TASKJITSU : Taskjitsu 2.0
Original documentdocumentSECUNIA, [SA20912] Taskjitsu Task Script Insertion Vulnerabilities (05.07.2006)
 documentSECURITEAM, [EXPL] Host Flow Multiple Sql Injections (Exploit) (05.07.2006)
 documentSECURITEAM, [UNIX] Stud.IP File Inclusion (05.07.2006)
 documentblack-cod3_(at)_hotmail.com, file include exploits in randshop v1.2 (05.07.2006)
 documentMicheal Turner, [Full-disclosure] phpSysInfo arbitrary file identification (05.07.2006)

JetAudio buffer overflow
Published:05.07.2006
Source:
SecurityVulns ID:6340
Type:client
Threat Level:
5/10
Description:Buffer overflow on oversized media file tag.
Affected:JETAUDIO : jetAudio 6.2
Original documentdocumentSECUNIA, [SA19456] jetAudio ID Tag "tooltip" Buffer Overflow Vulnerability (05.07.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod