=========================================================================== The Secunia Weekly Advisory Summary 2003-08-21 - 2003-08-28 This week : 40 advisories =========================================================================== Secunia Improvements! Secunia has improved the online vulnerability database making it even more open and easy to use! Several new features have been added. Furthermore, every Secunia Advisory is now identified with a SA ID - making it very easy to refer to Secunia Advisories. Read more about the Features: http://www.secunia.com/about_secunia_advisories/ =========================================================================== ============ 2003-08-28 ============ Red Hat update for sendmail SA9627 - Moderately critical http://www.secunia.com/advisories/9627/ ============ 2003-08-27 ============ PY-Membres SQL Injection and Admin Access SA9624 - Moderately critical http://www.secunia.com/advisories/9624/ -- AttilaPHP Authentication Bypass SA9623 - Moderately critical http://www.secunia.com/advisories/9623/ -- eNdonesia Cross Site Scripting Vulnerability SA9622 - Less critical http://www.secunia.com/advisories/9622/ -- aldweb miniPortail Cross Site Scripting Vulnerability SA9621 - Less critical http://www.secunia.com/advisories/9621/ -- SNMPc User Authentication Vulnerability SA9620 - Moderately critical http://www.secunia.com/advisories/9620/ -- NewsPHP Inclusion of Arbitrary Files SA9619 - Moderately critical http://www.secunia.com/advisories/9619/ -- Tellurian TftpdNT Filename Buffer Overflow Vulnerability SA9616 - Highly critical http://www.secunia.com/advisories/9616/ -- SuSE update for sendmail SA9615 - Moderately critical http://www.secunia.com/advisories/9615/ -- FreeBSD update for sendmail SA9614 - Moderately critical http://www.secunia.com/advisories/9614/ -- Debian update for libpam-smb SA9613 - Moderately critical http://www.secunia.com/advisories/9613/ -- Red Hat update for pam_smb SA9612 - Moderately critical http://www.secunia.com/advisories/9612/ -- pam_smb Password Buffer Overflow Vulnerability SA9611 - Moderately critical http://www.secunia.com/advisories/9611/ ============ 2003-08-26 ============ slrn Xref Buffer Overflow Vulnerability SA9610 - Moderately critical http://www.secunia.com/advisories/9610/ -- AnalogX Proxy Cross Site Scripting Vulnerability SA9609 - Less critical http://www.secunia.com/advisories/9609/ -- Slackware update for unzip SA9608 - Less critical http://www.secunia.com/advisories/9608/ -- Slackware update for gdm SA9607 - Less critical http://www.secunia.com/advisories/9607/ -- Gentoo update for vmware-workstation SA9606 - Less critical http://www.secunia.com/advisories/9606/ -- IRIX update for sendmail SA9605 - Moderately critical http://www.secunia.com/advisories/9605/ -- OpenBSD update for sendmail SA9604 - Moderately critical http://www.secunia.com/advisories/9604/ -- Mandrake update for sendmail SA9603 - Moderately critical http://www.secunia.com/advisories/9603/ -- Sendmail DNS Map Uninitialised Structure Vulnerability SA9602 - Moderately critical http://www.secunia.com/advisories/9602/ -- SnapGear Filter Denial of Service Vulnerability SA9601 - Moderately critical http://www.secunia.com/advisories/9601/ ============ 2003-08-25 ============ KisMAC Local Privilege Escalation Vulnerabilities SA9600 - Less critical http://www.secunia.com/advisories/9600/ -- widz apmon Arbitrary Command Execution Vulnerability SA9599 - Highly critical http://www.secunia.com/advisories/9599/ -- Blubster Denial of Service Vulnerability SA9598 - Less critical http://www.secunia.com/advisories/9598/ -- Netbula Anyboard Exposes System Information SA9597 - Not critical http://www.secunia.com/advisories/9597/ -- DWebPro Discloses Username and Password SA9596 - Less critical http://www.secunia.com/advisories/9596/ -- akpop3d SQL Injection Vulnerability SA9595 - Moderately critical http://www.secunia.com/advisories/9595/ -- phpGACL Database Password Disclosure Vulnerability SA9594 - Less critical http://www.secunia.com/advisories/9594/ -- Helix Universal Server Remotely Exploitable Vulnerability SA9593 - Highly critical http://www.secunia.com/advisories/9593/ -- GBrowse Directory Traversal Vulnerability SA9591 - Moderately critical http://www.secunia.com/advisories/9591/ ============ 2003-08-22 ============ BitKeeper Unspecified Code Injection Vulnerability SA9592 - Moderately critical http://www.secunia.com/advisories/9592/ -- Mandrake update for gdm SA9590 - Less critical http://www.secunia.com/advisories/9590/ -- Red Hat update for gdm SA9589 - Less critical http://www.secunia.com/advisories/9589/ -- Red Hat IA64 kernel update SA9588 - Moderately critical http://www.secunia.com/advisories/9588/ -- Red Hat update for kernel SA9587 - Moderately critical http://www.secunia.com/advisories/9587/ -- Piolet Denial of Service Vulnerability SA9586 - Less critical http://www.secunia.com/advisories/9586/ ============ 2003-08-21 ============ oMail-webmail Arbitrary Command Execution Vulnerability SA9585 - Highly critical http://www.secunia.com/advisories/9585/ -- RealOne Player SMIL Arbitrary Script Execution Vulnerability SA9584 - Moderately critical http://www.secunia.com/advisories/9584/ =========================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Contact details: Web : http://www.secunia.com/ E-mail : supportat_private Tel : +44 (0) 20 7016 2693 Fax : +44 (0) 20 7637 0419 =========================================================================== - ISN is currently hosted by Attrition.org To unsubscribe email majordomoat_private with 'unsubscribe isn' in the BODY of the mail.
This archive was generated by hypermail 2b30 : Fri Aug 29 2003 - 04:24:25 PDT