ID SECURITYVULNS:VULN:5078
Type securityvulns
Reporter
Modified 2005-08-14T00:00:00
Description
PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
{"id": "SECURITYVULNS:VULN:5078", "bulletinFamily": "software", "title": "Web applications security vulnerabilities (PHP, ASP, CGI, Perl, etc)", "description": "PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.", "published": "2005-08-14T00:00:00", "modified": "2005-08-14T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:5078", "reporter": " ", "references": ["https://vulners.com/securityvulns/securityvulns:doc:9413", "https://vulners.com/securityvulns/securityvulns:doc:9443", "https://vulners.com/securityvulns/securityvulns:doc:9429", "https://vulners.com/securityvulns/securityvulns:doc:9417", "https://vulners.com/securityvulns/securityvulns:doc:9406", "https://vulners.com/securityvulns/securityvulns:doc:9462", "https://vulners.com/securityvulns/securityvulns:doc:9471", "https://vulners.com/securityvulns/securityvulns:doc:9408", "https://vulners.com/securityvulns/securityvulns:doc:9418", "https://vulners.com/securityvulns/securityvulns:doc:9449", "https://vulners.com/securityvulns/securityvulns:doc:9457", "https://vulners.com/securityvulns/securityvulns:doc:9425", "https://vulners.com/securityvulns/securityvulns:doc:9451", "https://vulners.com/securityvulns/securityvulns:doc:9448", "https://vulners.com/securityvulns/securityvulns:doc:9435", "https://vulners.com/securityvulns/securityvulns:doc:9426", "https://vulners.com/securityvulns/securityvulns:doc:9402", "https://vulners.com/securityvulns/securityvulns:doc:9427", "https://vulners.com/securityvulns/securityvulns:doc:9409", "https://vulners.com/securityvulns/securityvulns:doc:9405", "https://vulners.com/securityvulns/securityvulns:doc:9468", "https://vulners.com/securityvulns/securityvulns:doc:9464", "https://vulners.com/securityvulns/securityvulns:doc:9428", "https://vulners.com/securityvulns/securityvulns:doc:9444", "https://vulners.com/securityvulns/securityvulns:doc:9460", "https://vulners.com/securityvulns/securityvulns:doc:9461", "https://vulners.com/securityvulns/securityvulns:doc:9436", "https://vulners.com/securityvulns/securityvulns:doc:9404", "https://vulners.com/securityvulns/securityvulns:doc:9403", "https://vulners.com/securityvulns/securityvulns:doc:9407", "https://vulners.com/securityvulns/securityvulns:doc:9442", "https://vulners.com/securityvulns/securityvulns:doc:9441", "https://vulners.com/securityvulns/securityvulns:doc:9440", "https://vulners.com/securityvulns/securityvulns:doc:9470", "https://vulners.com/securityvulns/securityvulns:doc:9450", "https://vulners.com/securityvulns/securityvulns:doc:9414"], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:09:20", "edition": 1, "viewCount": 1, "enchantments": {"score": {"value": 2.7, "vector": "NONE", "modified": "2018-08-31T11:09:20", "rev": 2}, "dependencies": {"references": [{"type": "mskb", "idList": ["KB4464564", "KB4484364", "KB4464515", "KB4464602", "KB4461596", "KB3115294", "KB4462208", "KB3085501", "KB4484321", "KB3191914"]}, {"type": "ics", "idList": ["ICSA-20-065-01"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:9464", "SECURITYVULNS:DOC:9436", "SECURITYVULNS:DOC:9426", "SECURITYVULNS:DOC:9405", "SECURITYVULNS:DOC:9448", "SECURITYVULNS:DOC:9427", "SECURITYVULNS:DOC:9404", "SECURITYVULNS:DOC:9462", "SECURITYVULNS:DOC:9471", "SECURITYVULNS:DOC:9435", "SECURITYVULNS:DOC:9450", "SECURITYVULNS:DOC:9460", "SECURITYVULNS:DOC:9402", "SECURITYVULNS:DOC:9443", "SECURITYVULNS:DOC:9461", "SECURITYVULNS:DOC:9417", "SECURITYVULNS:DOC:9457", "SECURITYVULNS:DOC:9449", "SECURITYVULNS:DOC:9451", "SECURITYVULNS:DOC:9442", "SECURITYVULNS:DOC:9470", "SECURITYVULNS:DOC:9418", "SECURITYVULNS:DOC:9407", "SECURITYVULNS:DOC:9409", "SECURITYVULNS:DOC:9441", "SECURITYVULNS:DOC:9444", "SECURITYVULNS:DOC:9468", "SECURITYVULNS:DOC:9403", "SECURITYVULNS:DOC:9428", "SECURITYVULNS:DOC:9414", "SECURITYVULNS:DOC:9413", "SECURITYVULNS:DOC:9440", "SECURITYVULNS:DOC:9425", "SECURITYVULNS:DOC:9406", "SECURITYVULNS:DOC:9429", "SECURITYVULNS:DOC:9408"]}], "modified": "2018-08-31T11:09:20", "rev": 2}, "vulnersScore": 2.7}, "affectedSoftware": [{"name": "XMB Forum", "operator": "eq", "version": "1.9"}, {"name": "phpIncludes News System", "operator": "eq", "version": "1.0"}, {"name": "WordPress", "operator": "eq", "version": "1.5"}, {"name": "CaLogic", "operator": "eq", "version": "1.22"}, {"name": "XMB", "operator": "eq", "version": "1.9"}, {"name": "tDiary", "operator": "eq", "version": "2.1"}, {"name": "Bloodshed Dev-Pascal", "operator": "eq", "version": "1.9"}, {"name": "BlogTorrent", "operator": "eq", "version": "0.92"}, {"name": "Gallery", "operator": "eq", "version": "1.5"}, {"name": "FunkBoard", "operator": "eq", "version": "0.66"}, {"name": "PHlyMail", "operator": "eq", "version": "3.02"}, {"name": "Invision Power Board", "operator": "eq", "version": "2.0"}, {"name": "Lasso", "operator": "eq", "version": "8.0"}, {"name": "OpenBB", "operator": "eq", "version": "1.1"}, {"name": "CFBB", "operator": "eq", "version": "1.1"}, {"name": "Gravity Board X", "operator": "eq", "version": "1.1"}, {"name": "e107", "operator": "eq", "version": "0.6171"}, {"name": "EQdkp", "operator": "eq", "version": "1.2"}, {"name": "Topic Boards", "operator": "eq", "version": "2.0"}, {"name": "PHP Designer 2005", "operator": "eq", "version": "3.0"}, {"name": "AWStats", "operator": "eq", "version": "6.3"}, {"name": "MyBB", "operator": "eq", "version": "1.0"}, {"name": "Calendar Express", "operator": "eq", "version": "2.0"}, {"name": "SimplePHPBlog", "operator": "eq", "version": "0.4"}, {"name": "OpenBB", "operator": "eq", "version": "1.0"}, {"name": "Dev-PHP", "operator": "eq", "version": "2.0"}, {"name": "PhpOpenChat", "operator": "eq", "version": "3.0"}, {"name": "Chipmunk Forum", "operator": "eq", "version": "1.3"}, {"name": "cPanel", "operator": "eq", "version": "10.4"}, {"name": "XOOPS", "operator": "eq", "version": "2.2"}, {"name": "Invision Power Board", "operator": "eq", "version": "1.0"}, {"name": "ezUpload", "operator": "eq", "version": "2.2"}, {"name": "VegaDNS", "operator": "eq", "version": "0.9"}, {"name": "Claroline", "operator": "eq", "version": "1.6"}, {"name": "MYFAQ", "operator": "eq", "version": "1.0"}, {"name": "SysCP", "operator": "eq", "version": "1.2"}, {"name": "Fud Forum", "operator": "eq", "version": "2.6"}]}
{"rst": [{"lastseen": "2021-02-24T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **syedfoundation[.]com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **13**.\n First seen: 2020-11-20T03:00:00, Last seen: 2021-02-24T03:00:00.\n IOC tags: **spam**.\nDomain has DNS A records: 162[.]213.251.25\nWhois:\n Created: 2020-11-10 05:56:52, \n Registrar: NameCheap Inc, \n Registrant: unknown.\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-11-20T00:00:00", "id": "RST:DDA4A08A-5078-3C28-A2C8-E3FEC24AA229", "href": "", "published": "2021-02-25T00:00:00", "title": "RST Threat feed. IOC: syedfoundation.com", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-24T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **164[.]58.29.186** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **13**.\n First seen: 2020-12-22T03:00:00, Last seen: 2021-02-24T03:00:00.\n IOC tags: **generic**.\nASN 5078: (First IP 164.58.2.0, Last IP 164.58.76.255).\nASN Name \"ONENETAS1\" and Organisation \"Oklahoma Network for Education Enrichment and\".\nASN hosts 767 domains.\nGEO IP information: City \"Ada\", Country \"United States\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-12-22T00:00:00", "id": "RST:342B9C0C-535B-3CAE-A951-9CE8DB49BE01", "href": "", "published": "2021-02-25T00:00:00", "title": "RST Threat feed. IOC: 164.58.29.186", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-23T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **162[.]142.125.218** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **11**.\n First seen: 2020-11-03T03:00:00, Last seen: 2021-02-23T03:00:00.\n IOC tags: **generic**.\nASN 398324: (First IP 162.142.125.0, Last IP 162.142.125.255).\nASN Name \"AS398324\" and Organisation \"\".\nASN hosts 0 domains.\nGEO IP information: City \"\", Country \"United States\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-11-03T00:00:00", "id": "RST:C9A57561-5078-3542-8234-7E9B03AF79F7", "href": "", "published": "2021-02-24T00:00:00", "title": "RST Threat feed. IOC: 162.142.125.218", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-20T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **136[.]179.21.72** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **12**.\n First seen: 2020-10-31T03:00:00, Last seen: 2021-02-20T03:00:00.\n IOC tags: **shellprobe**.\nASN 23005: (First IP 136.179.5.0, Last IP 136.179.32.255).\nASN Name \"SWITCHLTD\" and Organisation \"SWITCH LTD\".\nASN hosts 14595 domains.\nGEO IP information: City \"Las Vegas\", Country \"United States\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-10-31T00:00:00", "id": "RST:F1FF0E70-5078-3925-8ADC-2C11DD0CE24C", "href": "", "published": "2021-02-21T00:00:00", "title": "RST Threat feed. IOC: 136.179.21.72", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-18T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **191[.]102.78.229** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **8**.\n First seen: 2020-08-11T03:00:00, Last seen: 2021-02-18T03:00:00.\n IOC tags: **scan, generic**.\nASN 262186: (First IP 191.102.64.0, Last IP 191.102.79.255).\nASN Name \"TV\" and Organisation \"AZTECA SUCURSAL COLOMBIA\".\nASN hosts 299 domains.\nGEO IP information: City \"Villavicencio\", Country \"Colombia\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-08-11T00:00:00", "id": "RST:D6CCEAEE-5078-379A-8D02-258CC9D81AD2", "href": "", "published": "2021-02-19T00:00:00", "title": "RST Threat feed. IOC: 191.102.78.229", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-14T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **bigandfreesystemupgrading[.]bid** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2020-12-22T03:00:00, Last seen: 2021-02-14T03:00:00.\n IOC tags: **generic**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-12-22T00:00:00", "id": "RST:DF3860E1-5078-33BE-8A87-95C69BC5D31B", "href": "", "published": "2021-02-15T00:00:00", "title": "RST Threat feed. IOC: bigandfreesystemupgrading.bid", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-15T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **0[.]0.0.0 www.getaskdealappclicks.icu** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2021-02-15T03:00:00, Last seen: 2021-02-15T03:00:00.\n IOC tags: **generic**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-15T00:00:00", "id": "RST:820813EF-5078-3CC4-8AC2-BB8B9EA0EEF1", "href": "", "published": "2021-02-15T00:00:00", "title": "RST Threat feed. IOC: 0.0.0.0 www.getaskdealappclicks.icu", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-14T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **kirikata[.]cf** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2020-12-22T03:00:00, Last seen: 2021-02-14T03:00:00.\n IOC tags: **generic**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-12-22T00:00:00", "id": "RST:8097B192-5078-327A-BC91-8624F4295AB0", "href": "", "published": "2021-02-15T00:00:00", "title": "RST Threat feed. IOC: kirikata.cf", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-15T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **0[.]0.0.0 adsl-99-54-151-247.dsl.wotnoh.sbcglobal.net** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2021-02-15T03:00:00, Last seen: 2021-02-15T03:00:00.\n IOC tags: **generic**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-15T00:00:00", "id": "RST:4931CB9F-5078-3026-8881-02921BFF9C94", "href": "", "published": "2021-02-15T00:00:00", "title": "RST Threat feed. IOC: 0.0.0.0 adsl-99-54-151-247.dsl.wotnoh.sbcglobal.net", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-15T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **0[.]0.0.0 baixakialtcdn3.com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2021-02-15T03:00:00, Last seen: 2021-02-15T03:00:00.\n IOC tags: **generic**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-15T00:00:00", "id": "RST:6E9BAA9C-5078-375C-B7B4-1D0061ED9437", "href": "", "published": "2021-02-15T00:00:00", "title": "RST Threat feed. IOC: 0.0.0.0 baixakialtcdn3.com", "type": "rst", "cvss": {}}]}