======================================================================== The Secunia Weekly Advisory Summary 2005-12-01 - 2005-12-08 This week : 89 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: The Secunia staff is spending hours every day to assure you the best and most reliable source for vulnerability information. Every single vulnerability report is being validated and verified before a Secunia advisory is written. Secunia validates and verifies vulnerability reports in many different ways e.g. by downloading the software and performing comprehensive tests, by reviewing source code, or by validating the credibility of the source from which the vulnerability report was issued. As a result, Secunia's database is the most correct and complete source for recent vulnerability information available on the Internet. Secunia Online Vulnerability Database: http://secunia.com/ ======================================================================== 2) This Week in Brief: Several vulnerabilities have been reported in xpdf, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. Please refer to the Secunia advisory below for additional details. Reference: http://secunia.com/SA17897 -- Apple has acknowledged some vulnerabilities in Java for Mac OS X, which can be exploited by malicious people to compromise a user's system. References: http://secunia.com/SA17847 http://secunia.com/SA17748 VIRUS ALERTS: Secunia has not issued any virus alerts during the week. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA15546] Microsoft Internet Explorer "window()" Arbitrary Code Execution Vulnerability 2. [SA17748] Sun Java JRE Sandbox Security Bypass Vulnerabilities 3. [SA7127] Windows XP/2000/NT will let user execute any 16bit application 4. [SA17847] Apple Mac OS X update for Java 5. [SA16907] Opera Command Line URL Shell Command Injection 6. [SA15601] Mozilla / Mozilla Firefox Frame Injection Vulnerability 7. [SA11762] Opera Browser Favicon Displaying Address Bar Spoofing Vulnerability 8. [SA17430] Macromedia Flash Player SWF File Handling Arbitrary Code Execution 9. [SA17813] Mac OS X Security Update Fixes Multiple Vulnerabilities 10. [SA16560] Windows Registry Editor Utility String Concealment Weakness ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA17863] Ipswitch IMail Server IMAP and SMTP Service Two Vulnerabilities [SA17939] CF_Nuke Directory Traversal and Cross-Site Scripting Vulnerabilities [SA17900] A-FAQ SQL Injection Vulnerabilities [SA17906] Ideal BB.NET Custom Error Page Cross-Site Scripting Vulnerability [SA17905] rwAuction Pro "searchtxt" Cross-Site Scripting Vulnerability [SA17904] XcPhotoAlbum "SearchFor" Cross-Site Scripting Vulnerability [SA17903] XcClassified "SearchFor" Cross-Site Scripting Vulnerability [SA17902] NetAuctionHelp Auction Software Cross-Site Scripting Vulnerabilities [SA17901] IISWorks ASPKnowledgeBase "a" Cross-Site Scripting Vulnerability [SA17898] DUware DUportal Pro "result" Cross-Site Scripting Vulnerability [SA17857] SiteBeater News System "Archive.asp" Cross-Site Scripting Vulnerability [SA17856] SiteBeater MP3 Catalog "Search.asp" Cross-Site Scripting Vulnerability [SA17854] Solupress News "search.asp" Cross-Site Scripting Vulnerability [SA17851] MyTemplateSite "search.asp" Cross-Site Scripting Vulnerability [SA17933] Sony SunnComm MediaMax DRM Software Insecure Directory Permissions UNIX/Linux: [SA17899] Ubuntu update for kerberos [SA17847] Apple Mac OS X update for Java [SA17930] Red Hat update for imap [SA17929] Red Hat update for xpdf [SA17928] Red Hat update for libc-client [SA17926] Fedora update for xpdf [SA17923] Ubuntu update for apache2 [SA17921] pdftohtml Xpdf Buffer Overflow Vulnerabilities [SA17920] KDE kpdf Xpdf Buffer Overflow Vulnerabilities [SA17916] teTeX Xpdf Buffer Overflow Vulnerabilities [SA17912] Poppler Xpdf Buffer Overflow Vulnerabilities [SA17910] Horde IMP Attachments Script Insertion Vulnerability [SA17908] KOffice KWord PDF Filter Xpdf Buffer Overflow Vulnerabilities [SA17897] Xpdf Multiple Buffer Overflow Vulnerabilities [SA17892] FFmpeg libavcodec Buffer Overflow Vulnerability [SA17882] Debian update for inkscape [SA17874] Mandriva update for mailman [SA17860] Debian update for helix-player [SA17913] coWiki "q" Cross-Site Scripting Vulnerability [SA17878] Mandriva update for webmin [SA17877] Mandriva update for spamassassin [SA17839] FastJar File Extraction Directory Traversal Vulnerability [SA17917] SUSE update for kernel [SA17845] Fedora update for openldap [SA17924] AIX "umountall" Command Absolute Path Vulnerability [SA17907] cURL/libcURL URL Parsing Off-By-One Vulnerability [SA17886] Ubuntu update for inkscape [SA17844] Fedora update for perl Other: [SA17888] Cisco Products OpenSSL Potential SSL 2.0 Rollback Vulnerability [SA17852] MultiTech MultiVoIP Gateway Denial of Service Vulnerability Cross Platform: [SA17925] phpMyAdmin register_globals Emulation "import_blacklist" Manipulation [SA17896] DoceboLMS Information Disclosure and File Upload Vulnerabilities [SA17887] Jinzora Snoopy "_httpsrequest()" Command Injection Vulnerability [SA17866] MediaWiki Language Option PHP Code Execution Vulnerability [SA17858] PHPX "username" SQL Injection Vulnerability [SA17935] Magic Forum Personal Cross-Site Scripting and SQL Injection [SA17915] phpForumPro SQL Injection Vulnerabilities [SA17914] Cars Portal SQL Injection Vulnerabilities [SA17911] PluggedOut Blog "index.php" SQL Injection Vulnerabilities [SA17909] PluggedOut Nexus SQL Injection and Cross-Site Scripting Vulnerabilities [SA17894] Trac Search Module SQL Injection Vulnerability [SA17893] Blog System SQL Injection Vulnerabilities [SA17884] HobSR "view.php" SQL Injection Vulnerability [SA17883] Web4Future Affiliate Manager Pro "pid" SQL Injection Vulnerability [SA17881] Web4Future eCommerce Products SQL Injection Vulnerabilities [SA17880] Web4Future Portal Solutions Information Disclosure and SQL Injection [SA17879] Web4Future eDating Professional SQL Injection Vulnerabilities [SA17871] PHP-Fusion "srch_text" SQL Injection Vulnerability [SA17869] Zen Cart "admin_email" SQL Injection Vulnerability [SA17867] Nodezilla Potential Information Disclosure Vulnerability [SA17861] Quicksilver Forums HTTP_USER_AGENT SQL Injection Vulnerability [SA17859] SAPID CMS Security Bypass Vulnerability [SA17855] Coppermine Photo Gallery "relocate_server.php" Exposure of Configuration [SA17853] NetClassifieds Multiple SQL Injection Vulnerabilities [SA17849] phpYellow SQL Injection Vulnerabilities [SA17846] Relative Real Estate Systems "mls" SQL Injection Vulnerability [SA17843] LandShop SQL Injection Vulnerabilities [SA17842] Lore "id" SQL Injection Vulnerability [SA17841] Instant Photo Gallery SQL Injection Vulnerabilities [SA17840] Widget Imprint "product_id" SQL Injection Vulnerability [SA17937] Magic List Pro "ListID" SQL Injection Vulnerability [SA17895] phpMyAdmin Cross-Site Scripting Vulnerabilities [SA17885] PHP-addressbook "view.php" SQL Injection Vulnerability [SA17876] KeyWord Frequency Counter "url" Cross-Site Scripting Vulnerability [SA17875] Amazon Search Directory "search.cgi" Cross-Site Scripting Vulnerability [SA17873] Sun Java System Application Server Reverse SSL Proxy Plug-in Vulnerability [SA17872] Hot Links Pro "search.cgi" Cross-Site Scripting Vulnerability [SA17868] Hot Links SQL "search.cgi" Cross-Site Scripting Vulnerability [SA17864] Warm Links "search.cgi" Cross-Site Scripting Vulnerability [SA17862] 1-Search "1search.cgi" Cross-Site Scripting Vulnerability [SA17850] QualityEBiz Quality PPC "REQ" Cross-Site Scripting Vulnerability [SA17848] WebCalendar Two Vulnerabilities and a Weakness [SA17890] e107 "rate.php" Redirection and Multiple Rating Weakness [SA17889] Sun Java System Communications Services Delegated Administrator Password Disclosure ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA17863] Ipswitch IMail Server IMAP and SMTP Service Two Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2005-12-07 Two vulnerabilities have been reported in IMail Server, which can be exploited by malicious users to cause a DoS (Denial of Service) and to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17863/ -- [SA17939] CF_Nuke Directory Traversal and Cross-Site Scripting Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Exposure of sensitive information Released: 2005-12-07 r0t has discovered two vulnerabilities in CF_Nuke, which can be exploited by malicious people to conduct cross-site scripting attacks and to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/17939/ -- [SA17900] A-FAQ SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-12-06 r0t has reported two vulnerabilities in A-FAQ, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17900/ -- [SA17906] Ideal BB.NET Custom Error Page Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-12-07 r0t has discovered a vulnerability in Ideal BB.NET, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17906/ -- [SA17905] rwAuction Pro "searchtxt" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-12-06 r0t has reported a vulnerability in rwAuction Pro, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17905/ -- [SA17904] XcPhotoAlbum "SearchFor" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-12-06 r0t has reported a vulnerability in XcPhotoAlbum, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17904/ -- [SA17903] XcClassified "SearchFor" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-12-06 r0t has reported a vulnerability in XcClassified, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17903/ -- [SA17902] NetAuctionHelp Auction Software Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-12-06 r0t has reported some vulnerabilities in NetAuctionHelp Auction Software, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17902/ -- [SA17901] IISWorks ASPKnowledgeBase "a" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-12-06 r0t has reported a vulnerability in IISWorks ASPKnowledgeBase, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17901/ -- [SA17898] DUware DUportal Pro "result" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-12-06 Dj_Eyes has reported a vulnerability in DUware DUportal Pro, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17898/ -- [SA17857] SiteBeater News System "Archive.asp" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-12-05 r0t has reported a vulnerability in SiteBeater News System, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17857/ -- [SA17856] SiteBeater MP3 Catalog "Search.asp" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-12-05 r0t has reported a vulnerability in SiteBeater MP3 Catalog, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17856/ -- [SA17854] Solupress News "search.asp" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-12-05 r0t has reported a vulnerability in Solupress News, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17854/ -- [SA17851] MyTemplateSite "search.asp" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-12-05 r0t has reported a vulnerability in MyTemplateSite, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17851/ -- [SA17933] Sony SunnComm MediaMax DRM Software Insecure Directory Permissions Critical: Less critical Where: Local system Impact: Manipulation of data, Privilege escalation Released: 2005-12-07 Jesse Burns and Alex Stamos has reported a security issue in SunnComm MediaMax, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/17933/ UNIX/Linux:-- [SA17899] Ubuntu update for kerberos Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2005-12-06 Ubuntu has issued an update for kerberos. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17899/ -- [SA17847] Apple Mac OS X update for Java Critical: Highly critical Where: From remote Impact: System access Released: 2005-12-02 Apple has acknowledged some vulnerabilities in Java for Mac OS X, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17847/ -- [SA17930] Red Hat update for imap Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2005-12-07 Red Hat has issued an update for imap. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17930/ -- [SA17929] Red Hat update for xpdf Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2005-12-07 Red Hat has issued an update for xpdf. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/17929/ -- [SA17928] Red Hat update for libc-client Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2005-12-07 Red Hat has issued an update for libc-client. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17928/ -- [SA17926] Fedora update for xpdf Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2005-12-07 Fedora has issued an update for xpdf. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/17926/ -- [SA17923] Ubuntu update for apache2 Critical: Moderately critical Where: From remote Impact: DoS Released: 2005-12-07 Ubuntu has issued an update for apache2. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/17923/ -- [SA17921] pdftohtml Xpdf Buffer Overflow Vulnerabilities Critical: Moderately critical Where: From remote Impact: System access, DoS Released: 2005-12-07 Some vulnerabilities have been reported in pdftohtml, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/17921/ -- [SA17920] KDE kpdf Xpdf Buffer Overflow Vulnerabilities Critical: Moderately critical Where: From remote Impact: System access, DoS Released: 2005-12-07 Some vulnerabilities have been reported in KDE kpdf, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/17920/ -- [SA17916] teTeX Xpdf Buffer Overflow Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2005-12-07 Some vulnerabilities have been reported in teTeX, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/17916/ -- [SA17912] Poppler Xpdf Buffer Overflow Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2005-12-07 Some vulnerabilities have been reported in Poppler, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/17912/ -- [SA17910] Horde IMP Attachments Script Insertion Vulnerability Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2005-12-06 Igor has reported a vulnerability in Horde IMP, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/17910/ -- [SA17908] KOffice KWord PDF Filter Xpdf Buffer Overflow Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2005-12-07 Some vulnerabilities have been reported in KOffice, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/17908/ -- [SA17897] Xpdf Multiple Buffer Overflow Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2005-12-06 infamous41md has reported some vulnerabilities in xpdf, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/17897/ -- [SA17892] FFmpeg libavcodec Buffer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2005-12-06 Simon Kilvington has reported a vulnerability in FFmpeg libavcodec, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. Full Advisory: http://secunia.com/advisories/17892/ -- [SA17882] Debian update for inkscape Critical: Moderately critical Where: From remote Impact: Privilege escalation, DoS, System access Released: 2005-12-07 Debian has issued an update for inkscape. This fixes two vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges and by malicious people to potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/17882/ -- [SA17874] Mandriva update for mailman Critical: Moderately critical Where: From remote Impact: Unknown, DoS Released: 2005-12-05 Mandriva has issued an update for mailman. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/17874/ -- [SA17860] Debian update for helix-player Critical: Moderately critical Where: From remote Impact: System access Released: 2005-12-02 Debian has issued an update for helix-player. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17860/ -- [SA17913] coWiki "q" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-12-06 r0t has reported a vulnerability in coWiki, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17913/ -- [SA17878] Mandriva update for webmin Critical: Less critical Where: From remote Impact: DoS Released: 2005-12-05 Mandriva has issued an update for webmin. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/17878/ -- [SA17877] Mandriva update for spamassassin Critical: Less critical Where: From remote Impact: DoS Released: 2005-12-05 Mandriva has issued an update for spamassassin. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/17877/ -- [SA17839] FastJar File Extraction Directory Traversal Vulnerability Critical: Less critical Where: From remote Impact: System access Released: 2005-12-01 tv has discovered a vulnerability in FastJar, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/17839/ -- [SA17917] SUSE update for kernel Critical: Less critical Where: From local network Impact: Exposure of sensitive information, DoS Released: 2005-12-06 SUSE has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), or by malicious people to disclose certain sensitive information. Full Advisory: http://secunia.com/advisories/17917/ -- [SA17845] Fedora update for openldap Critical: Less critical Where: From local network Impact: Exposure of sensitive information Released: 2005-12-02 Fedora has issued an update for openldap. This fixes a security issue, which can be exploited by malicious people to gain knowledge of sensitive information. Full Advisory: http://secunia.com/advisories/17845/ -- [SA17924] AIX "umountall" Command Absolute Path Vulnerability Critical: Less critical Where: Local system Impact: Unknown Released: 2005-12-07 A vulnerability has been reported in AIX, which can be exploited by malicious, local users with unknown impact. Full Advisory: http://secunia.com/advisories/17924/ -- [SA17907] cURL/libcURL URL Parsing Off-By-One Vulnerability Critical: Less critical Where: Local system Impact: Unknown Released: 2005-12-07 Stefan Esser has reported a vulnerability in cURL/libcURL, which has an unknown impact. Full Advisory: http://secunia.com/advisories/17907/ -- [SA17886] Ubuntu update for inkscape Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2005-12-05 Ubuntu has issued an update for inkscape. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/17886/ -- [SA17844] Fedora update for perl Critical: Not critical Where: From remote Impact: DoS Released: 2005-12-02 Fedora has issued an update for perl. This fixes a vulnerability, which can be exploited by malicious people to cause a Denial of Service. Full Advisory: http://secunia.com/advisories/17844/ Other:-- [SA17888] Cisco Products OpenSSL Potential SSL 2.0 Rollback Vulnerability Critical: Less critical Where: From remote Impact: Security Bypass Released: 2005-12-05 Cisco has acknowledged a vulnerability in some products, which potentially can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/17888/ -- [SA17852] MultiTech MultiVoIP Gateway Denial of Service Vulnerability Critical: Less critical Where: From local network Impact: DoS Released: 2005-12-07 Ejovi Nuwere has reported a vulnerability in MultiTech MultiVoIP Gateway, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/17852/ Cross Platform:-- [SA17925] phpMyAdmin register_globals Emulation "import_blacklist" Manipulation Critical: Highly critical Where: From remote Impact: Cross Site Scripting, Exposure of sensitive information, System access Released: 2005-12-07 Stefan Esser has reported a vulnerability in phpMyAdmin, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17925/ -- [SA17896] DoceboLMS Information Disclosure and File Upload Vulnerabilities Critical: Highly critical Where: From remote Impact: Exposure of system information, System access Released: 2005-12-06 rgod has reported two vulnerabilities in DoceboLMS, which can be exploited by malicious people to disclose system information and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17896/ -- [SA17887] Jinzora Snoopy "_httpsrequest()" Command Injection Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2005-12-05 A vulnerability has been reported in Jinzora, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17887/ -- [SA17866] MediaWiki Language Option PHP Code Execution Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2005-12-05 A vulnerability has been reported in MediaWiki, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17866/ -- [SA17858] PHPX "username" SQL Injection Vulnerability Critical: Highly critical Where: From remote Impact: Security Bypass, Manipulation of data, System access Released: 2005-12-02 rgod has reported a vulnerability in PHPX, which can be exploited by malicious people to conduct SQL injection attacks and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/17858/ -- [SA17935] Magic Forum Personal Cross-Site Scripting and SQL Injection Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2005-12-07 r0t has reported some vulnerabilities in Magic Forum Personal, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/17935/ -- [SA17915] phpForumPro SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-12-06 $um$id has reported two vulnerabilities in phpForumPro, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17915/ -- [SA17914] Cars Portal SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-12-06 r0t has reported two vulnerabilities in Cars Portal, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17914/ -- [SA17911] PluggedOut Blog "index.php" SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-12-06 r0t has discovered some vulnerabilities in PluggedOut Blog, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17911/ -- [SA17909] PluggedOut Nexus SQL Injection and Cross-Site Scripting Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2005-12-06 r0t has discovered some vulnerabilities in PluggedOut Nexus, which can be exploited by malicious people to conduct SQL injection and cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17909/ -- [SA17894] Trac Search Module SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-12-06 A vulnerability has been reported in Trac, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17894/ -- [SA17893] Blog System SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-12-06 vipsta has reported two vulnerabilities in Blog System, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17893/ -- [SA17884] HobSR "view.php" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-12-05 r0t has reported a vulnerability in HobSR, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17884/ -- [SA17883] Web4Future Affiliate Manager Pro "pid" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-12-06 r0t has reported a vulnerability in Web4Future Affiliate Manager Pro, which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17883/ -- [SA17881] Web4Future eCommerce Products SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-12-06 r0t has reported some vulnerabilities in various Web4Future eCommerce products, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17881/ -- [SA17880] Web4Future Portal Solutions Information Disclosure and SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of system information Released: 2005-12-05 r0t has reported two vulnerabilities in Web4Future Portal Solutions, which can be exploited by malicious people to disclose system information and conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17880/ -- [SA17879] Web4Future eDating Professional SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-12-05 r0t has reported some vulnerabilities in Web4Future eDating Professional, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17879/ -- [SA17871] PHP-Fusion "srch_text" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-12-05 Nolan West has reported a vulnerability in PHP-Fusion, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17871/ -- [SA17869] Zen Cart "admin_email" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of system information, Manipulation of data Released: 2005-12-05 rgod has reported a vulnerability in Zen Cart, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17869/ -- [SA17867] Nodezilla Potential Information Disclosure Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2005-12-05 A vulnerability has been reported in Nodezilla, which potentially can be exploited by malicious people to disclose certain sensitive information. Full Advisory: http://secunia.com/advisories/17867/ -- [SA17861] Quicksilver Forums HTTP_USER_AGENT SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-12-05 A vulnerability has been reported in Quicksilver Forums, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17861/ -- [SA17859] SAPID CMS Security Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2005-12-02 A vulnerability has been reported in SAPID, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/17859/ -- [SA17855] Coppermine Photo Gallery "relocate_server.php" Exposure of Configuration Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2005-12-02 A security issue has been reported in Coppermine Photo Gallery, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/17855/ -- [SA17853] NetClassifieds Multiple SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-12-02 r0t has reported some vulnerabilities in NetClassifieds, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17853/ -- [SA17849] phpYellow SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-12-05 r0t has reported two vulnerabilities in phpYellow, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17849/ -- [SA17846] Relative Real Estate Systems "mls" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-12-05 r0t has reported a vulnerability in Relative Real Estate Systems, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17846/ -- [SA17843] LandShop SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data, Exposure of system information Released: 2005-12-05 r0t has reported some vulnerabilities in LandShop, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17843/ -- [SA17842] Lore "id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-12-01 r0t has reported a vulnerability in Lore, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17842/ -- [SA17841] Instant Photo Gallery SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-12-01 r0t has reported two vulnerabilities in Instant Photo Gallery, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17841/ -- [SA17840] Widget Imprint "product_id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2005-12-05 r0t has reported a vulnerability in Widget Imprint, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17840/ -- [SA17937] Magic List Pro "ListID" SQL Injection Vulnerability Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2005-12-07 r0t has reported a vulnerability in Magic List Pro, which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17937/ -- [SA17895] phpMyAdmin Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-12-06 Some vulnerabilities have been reported in phpMyAdmin, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17895/ -- [SA17885] PHP-addressbook "view.php" SQL Injection Vulnerability Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2005-12-06 $um$id has discovered a vulnerability in PHP-addressbook, which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/17885/ -- [SA17876] KeyWord Frequency Counter "url" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-12-06 r0t has discovered a vulnerability in KeyWord Frequency Counter, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17876/ -- [SA17875] Amazon Search Directory "search.cgi" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-12-05 r0t has reported a vulnerability in Amazon Search Directory, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17875/ -- [SA17873] Sun Java System Application Server Reverse SSL Proxy Plug-in Vulnerability Critical: Less critical Where: From remote Impact: Hijacking Released: 2005-12-06 A vulnerability has been reported in Sun ONE and Java System Application Server, which potentially can be exploited by malicious people to conduct MitM (Man-in-the-Middle) attacks. Full Advisory: http://secunia.com/advisories/17873/ -- [SA17872] Hot Links Pro "search.cgi" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-12-05 r0t has reported a vulnerability in Hot Links Pro, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17872/ -- [SA17868] Hot Links SQL "search.cgi" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-12-05 r0t has reported a vulnerability in Hot Links SQL, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17868/ -- [SA17864] Warm Links "search.cgi" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-12-05 r0t has reported a vulnerability in Warm Links, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17864/ -- [SA17862] 1-Search "1search.cgi" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-12-05 r0t has reported a vulnerability in 1-Search, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17862/ -- [SA17850] QualityEBiz Quality PPC "REQ" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2005-12-02 r0t has reported a vulnerability in QualityEBiz Quality PPC (QualityPPC), which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/17850/ -- [SA17848] WebCalendar Two Vulnerabilities and a Weakness Critical: Less critical Where: From remote Impact: Manipulation of data, Exposure of system information, Cross Site Scripting Released: 2005-12-02 Two vulnerabilities and a weakness have been reported in WebCalendar, which can be exploited by malicious users to conduct SQL injection attacks, and by malicious people to gain knowledge of certain information and conduct HTTP response splitting attacks. Full Advisory: http://secunia.com/advisories/17848/ -- [SA17890] e107 "rate.php" Redirection and Multiple Rating Weakness Critical: Not critical Where: From remote Impact: Security Bypass Released: 2005-12-05 Marc Ruef has reported two weakness in e107, which potentially can be exploited by malicious users to bypass certain security restrictions and by malicious people to conduct phishing attacks. Full Advisory: http://secunia.com/advisories/17890/ -- [SA17889] Sun Java System Communications Services Delegated Administrator Password Disclosure Critical: Not critical Where: From local network Impact: Exposure of sensitive information Released: 2005-12-06 A weakness has been reported in Sun Java System Messaging Server, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/17889/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _________________________________________ Earn your Master's degree in Information Security ONLINE www.msia.norwich.edu/csi Study IA management practices and the latest infosec issues. Norwich University is an NSA Center of Excellence.
This archive was generated by hypermail 2.1.3 : Thu Dec 08 2005 - 22:54:08 PST