Computer Security
[EN] securityvulns.ru no-pyccku


Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
updated since 20.04.2007
Published:22.04.2007
Source:
SecurityVulns ID:7622
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:INVISION : Invision Power Board 2.1
 PHORUM : Phorum 5.1
 ECLIPSEBB : EclipseBB 0.5
 GIZZAR : Gizzar 03162002
 NUKEEVOLUTION : Nuke-Evolution 2.0
 PHPBB : Extreme 3.0 phpBB module
 INVISION : Invision Power Board 2.2
 NEATUPLOAD : NeatUpload 1.2
 EBASCRIPTS : Eba News 1.1
 FREEPBX : freePBX 2.2
Original documentdocumentXenoMuta, [Full-disclosure] freePBX 2.2.x's Music-on-hold Remote Code Execution Injection (22.04.2007)
 documentseko_(at)_se-ko.info, Eba News Version : v1.1 <= (webpages.php) Remote File Include // starhack.org (20.04.2007)
 documentdean_(at)_brettle.com, NeatUpload vulnerability and fix (20.04.2007)
 documentJanek Vind, [waraxe-2007-SA#049] - Multiple vulnerabilities in Phorum 5.1.20 (20.04.2007)
 documentHACKERS PAL, IPB (Invision Power Board) Full Path Disclusure (20.04.2007)
 documentjohn_(at)_martinelli.com, NuclearBB Alpha 1 - Multiple Blind SQL/XPath Injection Vulnerabilities (20.04.2007)
 documentHACKERS PAL, Extreme PHPBB2 Remote File Inclusion (20.04.2007)
 documentHACKERS PAL, EclipseBB Remote File Inclusion (20.04.2007)
 documentHACKERS PAL, FullyModdedphpBB2 Remote File Inclusion (20.04.2007)
 documentHACKERS PAL, MediaBeez Sql query Execution .. Wear isn't ?? :) (20.04.2007)
 documentprogrammer_(at)_serbiansite.com, NukeSentinel Bypass SQL Injection & Nuke Evolution <= 2.0.3 SQL Injections (20.04.2007)
 documentBorN To K!LL BorN To K!LL, Gizzar <= (basePath) Remote File Include Vulnerability (20.04.2007)
Files:Exploits MediaBeez Sql Query Execution
 Fully Moded PHPBB2 Command Execution Exploit
 EclipseBB Command Execution Exploit
 Extreme PHPBB2 Command Execution Exploit

aMSN messenger denial of service
Published:22.04.2007
Source:
SecurityVulns ID:7628
Type:remote
Threat Level:
5/10
Description:Crash on double '{' character to dynamic application port.
Affected:AMSN : amsn 0.96
Original documentdocumentLevent Kayan, Re: [Full-disclosure] [Amsn-devel] aMSN <= 0.96 remote DoS vulnerability (22.04.2007)
Files:Exploits amsn remote DoS vulnerability

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod