======================================================================== The Secunia Weekly Advisory Summary 2006-02-16 - 2006-02-23 This week : 59 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: The Secunia staff is spending hours every day to assure you the best and most reliable source for vulnerability information. Every single vulnerability report is being validated and verified before a Secunia advisory is written. Secunia validates and verifies vulnerability reports in many different ways e.g. by downloading the software and performing comprehensive tests, by reviewing source code, or by validating the credibility of the source from which the vulnerability report was issued. As a result, Secunia's database is the most correct and complete source for recent vulnerability information available on the Internet. Secunia Online Vulnerability Database: http://secunia.com/ ======================================================================== 2) This Week in Brief: Secunia has issued an Extremely Critical advisory regarding a vulnerability in Mac OS X, which can be exploited by malicious people to compromise a user's system. Secunia has constructed a test, which can be used to check if your system is affected by this issue: http://secunia.com/mac_os_x_command_execution_vulnerability_test/ Please see the referenced Secunia advisory for additional details. Reference: http://secunia.com/SA18963 VIRUS ALERTS: Secunia has not issued any virus alerts during the week. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA18963] Mac OS X File Association Meta Data Shell Script Execution 2. [SA15852] XML-RPC for PHP PHP Code Execution Vulnerability 3. [SA14337] Mambo "GLOBALS['mosConfig_absolute_path']" File Inclusion 4. [SA17571] Opera Image Control Status Bar Spoofing Weakness 5. [SA16280] IBM Lotus Notes Multiple Vulnerabilities 6. [SA18835] Windows Media Player Bitmap File Processing Vulnerability 7. [SA18931] PHP-Nuke "Your_Account" Module SQL Injection Vulnerability 8. [SA18924] PerlBLOG Multiple Vulnerabilities 9. [SA18934] Debian update for gnupg 10 [SA18907] Mac OS X Kernel Local Denial of Service Vulnerability ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA18945] WPCeasy Admin Logon SQL Injection Vulnerability [SA18986] IA eMailServer IMAP SEARCH Command Handling Vulnerability UNIX/Linux: [SA18963] Mac OS X File Association Meta Data Shell Script Execution [SA18987] Red Hat update for metamail [SA18927] Guestex Shell Command Injection and Cross-Site Scripting [SA18923] Leif M. Wright's Blog Multiple Vulnerabilities [SA18983] Gentoo update for gpdf [SA18979] Bugzilla Multiple Vulnerabilities [SA18976] Mandriva update for tar [SA18973] GNU Tar PAX Extended Headers Handling Buffer Overflow [SA18948] Debian update for pdfkit.framework [SA18944] CherryPy "staticfilter" Directory Traversal Vulnerability [SA18943] Mandriva update for libtiff [SA18926] Quirex convert.cgi File Disclosure Vulnerability [SA18924] PerlBLOG Multiple Vulnerabilities [SA18918] Ubuntu update for libtasn [SA18939] Fedora Directory Server Admin Server Password Disclosure [SA18984] Melange Chat Server Information Disclosure Security Issue [SA18977] Mandriva update for kernel [SA18968] SUSE update for gpg / liby2util [SA18956] Gentoo update for gnupg [SA18955] Fedora update for gnupg [SA18942] Mandriva update for gnupg [SA18934] Debian update for gnupg [SA18933] Ubuntu update for gnupg [SA18974] ViRobot Linux Server Authentication Bypass Vulnerability [SA18961] Ubuntu update for heimdal [SA18960] Fedora Directory Server LDAP Denial of Service Vulnerabilities [SA18988] Red Hat update for tar [SA18958] UnixWare ptrace Privilege Escalation Vulnerability [SA18922] Netcool/NeuSecure Configuration File Permissions Weaknesses [SA18971] Ubuntu update for bluez-hcidump [SA18970] Ubuntu update for openssh [SA18969] Gentoo update for openssh / dropbear [SA18964] Dropbear SSH Server scp Command Line Shell Command Injection Other: [SA18952] Xerox ESS/ Network Controller and MicroServer Vulnerabilities [SA18932] DWL-G700AP Web Interface Denial of Service Cross Platform: [SA18982] Geeklog Media Gallery Module SQL Injection and File Inclusion [SA18941] Coppermine Photo Gallery File Inclusion Vulnerabilities [SA18935] Mambo Unspecified System Compromise Vulnerability [SA18930] Admbook "X-Forwarded-For" PHP Code Injection [SA18920] Geeklog SQL Injection and File Inclusion Vulnerabilities [SA18917] PunkBuster Cvars Monitoring Format String Vulnerability [SA18972] PHP-Nuke Personal Menu Script Insertion and SQL Injection [SA18965] Barracuda Directory Multiple Script Insertion Vulnerabilities [SA18951] ilchClan "pid" and "login_name" SQL Injection Vulnerabilities [SA18946] Guestbox Two Vulnerabilities and One Security Issue [SA18938] EmuLinker Packet Handling Denial of Service Vulnerability [SA18937] PostNuke Multiple Vulnerabilities [SA18931] PHP-Nuke "Your_Account" Module SQL Injection Vulnerability [SA18929] BXCP "tid" SQL Injection Vulnerability [SA18925] My Blog BBCode Script Insertion Vulnerability [SA18985] SquirrelMail Cross-Site Scripting and IMAP Injection Vulnerabilities [SA18981] CuteNews "show" Cross-Site Scripting Vulnerability [SA18949] PHP-Fusion Cross-Site Scripting Vulnerabilities [SA18928] ADOdb Cross-Site Scripting Vulnerabilities [SA18919] CPG Dragonfly CMS "linking.php" Cross-Site Scripting Vulnerability [SA18967] Ubuntu update for noweb [SA18936] PHP-Nuke CAPTCHA Bypass Weakness ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA18945] WPCeasy Admin Logon SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-02-20 murfie has reported a vulnerability in WPCeasy, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/18945/ -- [SA18986] IA eMailServer IMAP SEARCH Command Handling Vulnerability Critical: Less critical Where: From remote Impact: DoS Released: 2006-02-22 Joao Antunes has discovered a vulnerability in Internet Anywhere (IA) eMailServer, which can be exploited by malicious users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/18986/ UNIX/Linux:-- [SA18963] Mac OS X File Association Meta Data Shell Script Execution Critical: Extremely critical Where: From remote Impact: System access Released: 2006-02-21 Michael Lehn has discovered a vulnerability in Mac OS X, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/18963/ -- [SA18987] Red Hat update for metamail Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-02-22 Red Hat has issued and update for metamail. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/18987/ -- [SA18927] Guestex Shell Command Injection and Cross-Site Scripting Critical: Highly critical Where: From remote Impact: Cross Site Scripting, System access Released: 2006-02-17 Aliaksandr Hartsuyeu has reported two vulnerabilities in Guestex, which can be exploited by malicious people to conduct cross-site scripting attacks and to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18927/ -- [SA18923] Leif M. Wright's Blog Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Exposure of sensitive information, System access Released: 2006-02-17 Aliaksandr Hartsuyeu has reported some vulnerabilities in Leif M. Wright's Blog, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, conduct script insertion attacks, and potentially to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18923/ -- [SA18983] Gentoo update for gpdf Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-02-22 Gentoo has issued an update for gpdf. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/18983/ -- [SA18979] Bugzilla Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data, Exposure of sensitive information Released: 2006-02-22 Some vulnerabilities have been reported in Bugzilla, which can be exploited by malicious users to conduct SQL injection attacks, and by malicious people to disclose sensitive information and conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/18979/ -- [SA18976] Mandriva update for tar Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-02-22 Mandriva has issued an update for tar. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) and to compromise a user's system. Full Advisory: http://secunia.com/advisories/18976/ -- [SA18973] GNU Tar PAX Extended Headers Handling Buffer Overflow Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-02-22 A vulnerability has been reported in GNU Tar, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) and to compromise a user's system. Full Advisory: http://secunia.com/advisories/18973/ -- [SA18948] Debian update for pdfkit.framework Critical: Moderately critical Where: From remote Impact: Unknown Released: 2006-02-20 Full Advisory: http://secunia.com/advisories/18948/ -- [SA18944] CherryPy "staticfilter" Directory Traversal Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2006-02-21 A vulnerability has been reported in CherryPy, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/18944/ -- [SA18943] Mandriva update for libtiff Critical: Moderately critical Where: From remote Impact: System access Released: 2006-02-20 Mandriva has issued an update for libtiff. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18943/ -- [SA18926] Quirex convert.cgi File Disclosure Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2006-02-17 Aliaksandr Hartsuyeu has reported a vulnerability in Quirex, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/18926/ -- [SA18924] PerlBLOG Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting Released: 2006-02-17 Aliaksandr Hartsuyeu has reported some vulnerabilities in PerlBLOG, which can be exploited by malicious people to conduct script insertion attacks and to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/18924/ -- [SA18918] Ubuntu update for libtasn Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-02-17 Ubuntu has issued an update for gnutls. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/18918/ -- [SA18939] Fedora Directory Server Admin Server Password Disclosure Critical: Moderately critical Where: From local network Impact: Exposure of sensitive information Released: 2006-02-20 Frank Reppin has reported a vulnerability in Fedora Directory Server, which can be exploited by malicious people to gain knowledge of sensitive information. Full Advisory: http://secunia.com/advisories/18939/ -- [SA18984] Melange Chat Server Information Disclosure Security Issue Critical: Less critical Where: From remote Impact: Exposure of sensitive information Released: 2006-02-22 Nexus has discovered a security issue in Melange Chat Server, which potentially can be exploited by malicious people to disclose certain sensitive information. Full Advisory: http://secunia.com/advisories/18984/ -- [SA18977] Mandriva update for kernel Critical: Less critical Where: From remote Impact: Exposure of sensitive information, DoS Released: 2006-02-22 Mandriva has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain knowledge of sensitive information and cause a DoS (Denial of Service), or by malicious people to cause a DoS. Full Advisory: http://secunia.com/advisories/18977/ -- [SA18968] SUSE update for gpg / liby2util Critical: Less critical Where: From remote Impact: Security Bypass Released: 2006-02-21 SUSE has issued an update for gpg / liby2util. This fixes a security issue, which potentially can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/18968/ -- [SA18956] Gentoo update for gnupg Critical: Less critical Where: From remote Impact: Security Bypass Released: 2006-02-20 Gentoo has issued an update for gnupg. This fixes a security issue, which potentially can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/18956/ -- [SA18955] Fedora update for gnupg Critical: Less critical Where: From remote Impact: Security Bypass Released: 2006-02-20 Fedora has issued an update for gnupg. This fixes a security issue, which potentially can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/18955/ -- [SA18942] Mandriva update for gnupg Critical: Less critical Where: From remote Impact: Security Bypass Released: 2006-02-20 Mandriva has issued an update for gnupg. This fixes a security issue, which potentially can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/18942/ -- [SA18934] Debian update for gnupg Critical: Less critical Where: From remote Impact: Security Bypass Released: 2006-02-17 Debian has issued an update for gnupg. This fixes a security issue, which potentially can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/18934/ -- [SA18933] Ubuntu update for gnupg Critical: Less critical Where: From remote Impact: Security Bypass Released: 2006-02-20 Ubuntu has issued an update for gnupg. This fixes a security issue, which potentially can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/18933/ -- [SA18974] ViRobot Linux Server Authentication Bypass Vulnerability Critical: Less critical Where: From local network Impact: Security Bypass Released: 2006-02-22 dong-houn yoU has discovered a vulnerability in ViRobot Linux Server, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/18974/ -- [SA18961] Ubuntu update for heimdal Critical: Less critical Where: From local network Impact: DoS Released: 2006-02-20 Ubuntu has issued an update for heimdal. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/18961/ -- [SA18960] Fedora Directory Server LDAP Denial of Service Vulnerabilities Critical: Less critical Where: From local network Impact: DoS Released: 2006-02-20 Evgeny Legerov has reported some vulnerabilities in Fedora Directory Server, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/18960/ -- [SA18988] Red Hat update for tar Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-02-22 Red Hat has issued an update for tar. This fixes a vulnerability, which can be exploited by malicious people to cause files to be extracted to arbitrary locations on a user's system. Full Advisory: http://secunia.com/advisories/18988/ -- [SA18958] UnixWare ptrace Privilege Escalation Vulnerability Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-02-22 A vulnerability has been reported in UnixWare, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/18958/ -- [SA18922] Netcool/NeuSecure Configuration File Permissions Weaknesses Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2006-02-17 Dimitry Snezhkov has reported two weaknesses in Netcool/NeuSecure, which can be exploited by malicious, local users to disclose certain sensitive information. Full Advisory: http://secunia.com/advisories/18922/ -- [SA18971] Ubuntu update for bluez-hcidump Critical: Not critical Where: From remote Impact: DoS Released: 2006-02-22 Ubuntu has issued an update for bluez-hcidump. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/18971/ -- [SA18970] Ubuntu update for openssh Critical: Not critical Where: Local system Impact: Privilege escalation Released: 2006-02-22 Ubuntu has issued an update for openssh. This fixes a weakness, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/18970/ -- [SA18969] Gentoo update for openssh / dropbear Critical: Not critical Where: Local system Impact: Privilege escalation Released: 2006-02-21 Gentoo has issued an update for openssh / dropbear. This fixes a weakness, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/18969/ -- [SA18964] Dropbear SSH Server scp Command Line Shell Command Injection Critical: Not critical Where: Local system Impact: Privilege escalation Released: 2006-02-21 A weakness has been reported in Dropbear SSH Server, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/18964/ Other:-- [SA18952] Xerox ESS/ Network Controller and MicroServer Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting, DoS Released: 2006-02-20 Some vulnerabilities have been reported in Xerox WorkCentre Pro and Xerox WorkCentre, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, or cause a Denial of Service (DoS). Full Advisory: http://secunia.com/advisories/18952/ -- [SA18932] DWL-G700AP Web Interface Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2006-02-17 l0om has reported a vulnerability in D-Link DWL-G700AP, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/18932/ Cross Platform:-- [SA18982] Geeklog Media Gallery Module SQL Injection and File Inclusion Critical: Highly critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information, System access Released: 2006-02-22 Some vulnerabilities have been reported in the Media Gallery module for Geeklog, which can be exploited by malicious people to conduct SQL injection attacks, disclose potentially sensitive information and potentially to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18982/ -- [SA18941] Coppermine Photo Gallery File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2006-02-20 rgod has reported two vulnerabilities in Coppermine Photo Gallery, which can be exploited by malicious people and by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18941/ -- [SA18935] Mambo Unspecified System Compromise Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-02-22 A vulnerability has been reported in Mambo, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18935/ -- [SA18930] Admbook "X-Forwarded-For" PHP Code Injection Critical: Highly critical Where: From remote Impact: System access Released: 2006-02-20 rgod has reported a vulnerability in Admbook, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18930/ -- [SA18920] Geeklog SQL Injection and File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information, System access Released: 2006-02-20 James Bercegay has reported some vulnerabilities in Geeklog, which can be exploited by malicious people to conduct SQL injection attacks, disclose potentially sensitive information and potentially to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18920/ -- [SA18917] PunkBuster Cvars Monitoring Format String Vulnerability Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-02-17 Luigi Auriemma has reported a vulnerability in PunkBuster, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/18917/ -- [SA18972] PHP-Nuke Personal Menu Script Insertion and SQL Injection Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2006-02-22 Jason Lau has discovered two vulnerabilities in PHP-Nuke, which can be exploited by malicious people to conduct SQL injection and script insertion attacks. Full Advisory: http://secunia.com/advisories/18972/ -- [SA18965] Barracuda Directory Multiple Script Insertion Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2006-02-21 pcps has discovered some vulnerabilities in Barracuda Directory, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/18965/ -- [SA18951] ilchClan "pid" and "login_name" SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-02-21 Two vulnerabilities have been discovered in ilchClan, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/18951/ -- [SA18946] Guestbox Two Vulnerabilities and One Security Issue Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Exposure of sensitive information Released: 2006-02-21 l0om has discovered two vulnerabilities and a security issue in Guestbox, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, and conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/18946/ -- [SA18938] EmuLinker Packet Handling Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-02-20 A vulnerability has been reported in EmuLinker, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/18938/ -- [SA18937] PostNuke Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Manipulation of data Released: 2006-02-21 Maksymilian Arciemowicz has reported some vulnerabilities in PostNuke, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks, and to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/18937/ -- [SA18931] PHP-Nuke "Your_Account" Module SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-02-17 sp3x has discovered a vulnerability in PHP-Nuke, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/18931/ -- [SA18929] BXCP "tid" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-02-20 x128 has discovered a vulnerability in BXCP, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/18929/ -- [SA18925] My Blog BBCode Script Insertion Vulnerability Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2006-02-17 Aliaksandr Hartsuyeu has reported a vulnerability in My Blog, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/18925/ -- [SA18985] SquirrelMail Cross-Site Scripting and IMAP Injection Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2006-02-22 Some vulnerabilities have been reported in SquirrelMail, which can be exploited by malicious users to manipulate certain information and by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/18985/ -- [SA18981] CuteNews "show" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-02-22 imei addmimistrator has discovered a vulnerability in CuteNews, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/18981/ -- [SA18949] PHP-Fusion Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting, Unknown Released: 2006-02-21 Two vulnerabilities have been reported in PHP-Fusion, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/18949/ -- [SA18928] ADOdb Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-02-20 James Bercegay has reported some vulnerabilities in ADOdb, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/18928/ -- [SA18919] CPG Dragonfly CMS "linking.php" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting, Exposure of system information Released: 2006-02-22 albanialove has reported a vulnerability in CPG Dragonfly CMS, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/18919/ -- [SA18967] Ubuntu update for noweb Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-02-22 Ubuntu has issued an update for noweb. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. Full Advisory: http://secunia.com/advisories/18967/ -- [SA18936] PHP-Nuke CAPTCHA Bypass Weakness Critical: Not critical Where: From remote Impact: Security Bypass Released: 2006-02-20 Janek Vind "waraxe" has reported a weakness in PHP-Nuke, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/18936/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _________________________________ InfoSec News v2.0 - Coming Soon! http://www.infosecnews.org
This archive was generated by hypermail 2.1.3 : Thu Feb 23 2006 - 23:01:01 PST