Computer Security
[EN] securityvulns.ru no-pyccku


Daily web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
updated since 31.05.2006
Published:31.05.2006
Source:
SecurityVulns ID:6203
Type:remote
Threat Level:
5/10
Description:PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
Affected:PHPNUKE : PHP-Nuke 7.9
 OABOARD : OaBoard 1.0
 WEBCALENDAR : WebCalendar 1.0
 WBB : WBB 2.3
 4NNUKEWARE : 4nNukeWare 0.91
 PHPMYDESKTOP : phpMyDesktop|arcade 1.0
 WORDPRESS : Open Searchable Image Catalogue 0.7
 QONTENTONE : QontentOneCMS 1.0
 TOENDA : toendaCMS 0.7
 SUPPORTCARDS : Support Cards 1
Original documentdocumentblack-cod3_(at)_hotmail.com, file include exploit in Support Cards v1 (31.05.2006)
 documentkubasx_(at)_gmail.com, toendaCMS 0.7.0 Cross Site Scripting (31.05.2006)
 documentluny_(at)_youfucktard.com, QontentOneCMS v1.0 (31.05.2006)
 documenterne_(at)_ernealizm.com, # MHG Security Team --- PHP NUKE All version Remote File Inc. (31.05.2006)
 documentblack-cod3_(at)_hotmail.com, Xss exploit in Chipmunk directory (31.05.2006)
 documentenji_(at)_seclab.tuwien.ac.at, Open Searchable Image Catalogue: XSS and SQL Injection Vulnerabilities (31.05.2006)
 documentsocsam_(at)_linuxmail.org, WebCalendar-1.0.3 reading of any files (31.05.2006)
 documentHessam Salehi, OaBoard 1.0 Remote File inclusion (31.05.2006)
 documentCrAzY.CrAcKeR_(at)_hotmail.com, WBB<--v2.3.4"misc.php" SQL injection Vulnerability (31.05.2006)
 documentCrAzY.CrAcKeR_(at)_hotmail.com, NorthStudio Cross Site Scripting Vulnerability (31.05.2006)
 documentCrAzY.CrAcKeR_(at)_hotmail.com, Bratpack Cross Site Scripting Vulnerability (31.05.2006)
 documentdarkgod.xsf_(at)_gmail.com, phpMyDesktop|arcade 1.0 FINAL Code Execution (31.05.2006)
 documentCrAzY.CrAcKeR_(at)_hotmail.com, 4nNukeWare<--V 0.91 SQL Injection exploits (31.05.2006)
Files:pppBlog <= 0.3.8 system disclosure exploit

Multiple eserv IMAP mail server and web server vulnerabilities
Published:31.05.2006
Source:
SecurityVulns ID:6205
Type:remote
Threat Level:
6/10
Description:IMAP server directory traversal, HTTP scripts source code disclosure.
Affected:ETYPE : Eserv/3 3.25
Original documentdocumentSECUNIA, [Full-disclosure] Secunia Research: Eserv/3 IMAP and HTTP Server Multiple Vulnerabilities (31.05.2006)
Files:Imap directory traversal file listing, retrieval and deletion tools

ktools library buffer overflow
updated since 28.11.2005
Published:31.05.2006
Source:
SecurityVulns ID:5485
Type:library
Threat Level:
5/10
Description:VGETSTRING macro buffer overflow.
Affected:MOTOR : motor 3.2
 KTOOLS : ktools 0.3
Original documentdocumentDEBIAN, [Full-disclosure] [SECURITY] [DSA 1083-1] New motor packages fix arbitrary code execution (31.05.2006)
 documentSieg Fried, [Full-disclosure] ZRCSA-200503 - ktools Buffer Overflow Vulnerability (28.11.2005)

Mozilla / Firefox / Firebird / Netscape array overflow
updated since 31.05.2006
Published:05.02.2009
Source:
SecurityVulns ID:6204
Type:client
Threat Level:
7/10
Description:Array ovrflow on high marquee tag recursion level.
Affected:MOZILLA : Mozilla 1.7
 MOZILLA : Firefox 1.0
 NETSCAPE : Netscape 8.1
 MOZILLA : Firefox 1.5
 NOKIA : Nokia N95
 MOZILLA : Firefox 3.06
Original documentdocumentThierry Zoller, Re: Nokia N95-8 browser denial of service (05.02.2009)
 documentjplopezy_(at)_gmail.com, Nokia N95-8 browser denial of service (05.02.2009)
 documentco296_(at)_aol.com, Fire fox dos exploit (31.05.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod