Computer Security
[EN] no-pyccku

Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
SecurityVulns ID:10487
Threat Level:
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:PRAGMAMX : pragmaMx 0.1
 SQLLEDGER : SQL-Ledger 2.8
CVE:CVE-2009-3584 (SQL-Ledger 2.8.24 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.)
 CVE-2009-3583 (Directory traversal vulnerability in the Preferences menu item in SQL-Ledger 2.8.24 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the countrycode field.)
 CVE-2009-3582 (Multiple SQL injection vulnerabilities in the delete subroutine in SQL-Ledger 2.8.24 allow remote authenticated users to execute arbitrary SQL commands via the (1) id and possibly (2) db parameters in a Delete action to the output of a Vendors>Reports>Search search operation.)
 CVE-2009-3581 (Multiple cross-site scripting (XSS) vulnerabilities in SQL-Ledger 2.8.24 allow remote authenticated users to inject arbitrary web script or HTML via (1) the DCN Description field in the Accounts Receivables menu item for Add Transaction, (2) the Description field in the Accounts Payable menu item for Add Transaction, or the name field in (3) the Customers menu item for Add Customer or (4) the Vendor menu item for Add Vendor.)
 CVE-2009-3580 (Cross-site request forgery (CSRF) vulnerability in in SQL-Ledger 2.8.24 allows remote attackers to hijack the authentication of arbitrary users for requests that change a password via the login, new_password, and confirm_password parameters in a preferences action.)
Original documentdocumentedgard.chammas_(at), ClarkConnect XSS vulnerability (22.12.2009)
 documentAlexander Klink, SQL-Ledger – several vulnerabilities (22.12.2009)
 documenthadikiamarsi_(at), pragmaMx CMS Blind SQL/XPath Injection vulnerability (22.12.2009)

Allied Telesyn TFTP Daemon buffer overflow
SecurityVulns ID:10488
Threat Level:
Description:Buffer overflow on request parsing.
Affected:ALLIEDTELESYN : Allied Telesyn TFTP Daemon 1.9
Original documentdocumentSocket_0x03_(at), Remote Buffer Overflow Exploit (TFTP Daemon Version 1.9) by Socket_0x03 (22.12.2009)
Files:TFTP Daemon Version 1.9 Remote Buffer Overflow Exploit

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod