[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1692 php-xajax -- insufficient input sanitising

ID: oval:org.mitre.oval:def:7894Date: (C)2009-12-15   (M)2021-07-09
Class: PATCHFamily: unix




It was discovered that php-xajax, a library to develop Ajax applications, did not sufficiently sanitise URLs, which allows attackers to perform cross-site scripting attacks by using malicious URLs. For the stable distribution (etch) this problem has been fixed in version 0.2.4-2+etch1. For the testing (lenny) and unstable (sid) distributions this problem has been fixed in version 0.2.5-1. We recommend that you upgrade your php-xajax package.

Platform:
Debian 4.0
Product:
php-xajax
Reference:
DSA-1692
CVE-2007-2739
CVE    1
CVE-2007-2739
CPE    1
cpe:/o:debian:debian_linux:4.0

© SecPod Technologies