======================================================================== The Secunia Weekly Advisory Summary 2006-05-11 - 2006-05-18 This week: 54 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: The Secunia staff is spending hours every day to assure you the best and most reliable source for vulnerability information. Every single vulnerability report is being validated and verified before a Secunia advisory is written. Secunia validates and verifies vulnerability reports in many different ways e.g. by downloading the software and performing comprehensive tests, by reviewing source code, or by validating the credibility of the source from which the vulnerability report was issued. As a result, Secunia's database is the most correct and complete source for recent vulnerability information available on the Internet. Secunia Online Vulnerability Database: http://secunia.com/ ======================================================================== 2) This Week in Brief: Steve Wiseman has reported a vulnerability in RealVNC, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to an error within the handling of VNC password authentication requests. This can be exploited to bypass authentication and allows access to the remote system without requiring knowledge of the VNC password. Additional details are available in the referenced Secunia advisory below. Reference: http://secunia.com/SA20107 -- Multiple vulnerabilities have been reported in QuickTime, which can be exploited by malicious people to compromise a user's system. All users of QuickTime are advised to check for available updates. Reference: http://secunia.com/SA20069 -- VIRUS ALERTS: Secunia has not issued any virus alerts during the week. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA20069] QuickTime Multiple Code Execution Vulnerabilities 2. [SA20107] RealVNC Password Authentication Bypass Vulnerability 3. [SA19762] Internet Explorer "object" Tag Memory Corruption Vulnerability 4. [SA20077] Mac OS X Security Update Fixes Multiple Vulnerabilities 5. [SA19738] Internet Explorer "mhtml:" Redirection Disclosure of Sensitive Information 6. [SA19521] Internet Explorer Window Loading Race Condition Address Bar Spoofing 7. [SA18680] Microsoft Internet Explorer "createTextRange()" Code Execution 8. [SA20083] Linux Kernel "lease_init()" Denial of Service Vulnerability 9. [SA20082] Symantec Firewall Products Internal IP Addresses Disclosure 10. [SA20084] AliPAGER "ubild" Cross-Site Scripting and SQL Injection ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA20136] FreeFTPd SFTP Key Exchange Algorithm String Buffer Overflow [SA20114] FortressSSH SSH_MSG_KEXINIT Logging Buffer Overflow [SA20107] RealVNC Password Authentication Bypass Vulnerability [SA20146] LiveData ICCP Server Buffer Overflow Vulnerability [SA20112] Azboard Multiple SQL Injection Vulnerabilities [SA20102] DUbanner Insecure File Upload Vulnerability [SA20086] FileZilla Unspecified Buffer Overflow Vulnerability [SA20132] Sun Java JRE Large Temporary File Creation Vulnerability UNIX/Linux: [SA20123] Nagios Content-Length Integer Overflow Vulnerability [SA20117] SUSE Updates for Multiple Packages [SA20094] Empire Server "client_cmd()" Denial of Service Vulnerability [SA20139] Novell eDirectory iMonitor Unspecified Buffer Overflow Vulnerability [SA20124] Debian update for phpldapadmin [SA20137] Ubuntu update for Quagga [SA20127] Sun N1 System Manager Password Disclosure Vulnerability [SA20108] Debian update for webcalendar [SA20116] Quagga bgpd Denial of Service Vulnerability Other: [SA20109] AdderLink IP Unspecified VNC Vulnerability [SA20085] ClamXav freshclam suid Permissions Security Issue Cross Platform: [SA20135] DeluxeBB Multiple File Extensions File Upload Vulnerability [SA20128] NewsPortal Cross-Site Scripting and File Inclusion [SA20121] Squirrelcart "cart_isp_root" File Inclusion Vulnerability [SA20120] Quezza "quezza_root_path" File Inclusion Vulnerability [SA20119] TR Newsportal "file_newsportal" Parameter File Inclusion Vulnerability [SA20115] Php Blue Dragon CMS "vsDragonRootPath" File Inclusion [SA20103] ezUserManager "ezUserManager_Path" File Inclusion Vulnerability [SA20099] Genecys Buffer Overflow and Denial of Service [SA20098] Outgun Multiple Vulnerabilities [SA20097] Raydium Multiple Vulnerabilities [SA20092] phpBB foing Module "phpbb_root_path" File Inclusion [SA20090] Unclassified NewsBoard "ABBC[Config][smileset]" Local File Inclusion [SA20087] PopPhoto "cfg[popphoto_base_path]" File Inclusion Vulnerability [SA20133] RadLance Gold "popup.php" Local File Inclusion Vulnerability [SA20131] Sphider Multiple Vulnerabilities [SA20129] PHP-Fusion "srch_where" SQL Injection Vulnerablility [SA20125] Caucho Resin Two Disclosure of Sensitive Information Vulnerabilities [SA20106] Hitachi EUR Unspecified SQL Injection Vulnerability [SA20104] DeluxeBB "name" SQL Injection Vulnerability [SA20096] GNUnet Empty UDP Datagram Denial of Service Vulnerability [SA20089] e107 "e107_cookie" Parameter SQL Injection Vulnerability [SA20088] phpCOIN E-Mail Address Disclosure of Arbitrary Messages [SA20084] AliPAGER "ubild" Cross-Site Scripting and SQL Injection [SA20144] Sun Java System Directory Server Authentication Bypass [SA20141] phpRemoteView Multiple Cross-Site Scripting Vulnerabilities [SA20130] BEA WebLogic Server/Express Multiple Security Issues [SA20118] Directory Listing Script "dir" Cross-Site Scripting Vulnerability [SA20113] phpMyAdmin "theme" and "db" Cross-Site Scripting Vulnerabilities [SA20111] phpODP "browse" Cross-Site Scripting Vulnerability [SA20110] Jax Guestbook "guestbook.admin.php" Cross-Site Scripting [SA20105] Confixx Pro "login" Parameter Cross-Site Scripting Vulnerability [SA20101] FlexChat "username" Parameter Cross-Site Scripting [SA20095] GPhotos Cross-Site Scripting and Disclosure of Arbitrary Directories [SA20091] OZJournals "vname" Parameter Cross-Site Scripting [SA20093] phpBB "Upload Avatar from a URL" Remote HTTP Request Weakness ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA20136] FreeFTPd SFTP Key Exchange Algorithm String Buffer Overflow Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-05-17 A vulnerability has been reported in FreeFTPd, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20136/ -- [SA20114] FortressSSH SSH_MSG_KEXINIT Logging Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2006-05-16 Gerry Eisenhaur has discovered a vulnerability in FortressSSH, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20114/ -- [SA20107] RealVNC Password Authentication Bypass Vulnerability Critical: Highly critical Where: From remote Impact: Security Bypass Released: 2006-05-15 Steve Wiseman has reported a vulnerability in RealVNC, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/20107/ -- [SA20146] LiveData ICCP Server Buffer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-05-17 A vulnerability has been reported in LiveData ICCP Server, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20146/ -- [SA20112] Azboard Multiple SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-05-16 x90c has reported some vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20112/ -- [SA20102] DUbanner Insecure File Upload Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2006-05-16 Dj ReMix has discovered a vulnerability in DUbanner, which can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20102/ -- [SA20086] FileZilla Unspecified Buffer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2006-05-15 A vulnerability has been reported in FileZilla, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/20086/ -- [SA20132] Sun Java JRE Large Temporary File Creation Vulnerability Critical: Not critical Where: From remote Impact: DoS Released: 2006-05-16 Marc Schoenefeld has discovered a vulnerability in Sun Java JRE (Java Runtime Environment), which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20132/ UNIX/Linux:-- [SA20123] Nagios Content-Length Integer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-05-16 A vulnerability has been reported in Nagios, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20123/ -- [SA20117] SUSE Updates for Multiple Packages Critical: Highly critical Where: From remote Impact: Security Bypass, Cross Site Scripting, DoS, System access Released: 2006-05-15 SUSE has issued an update for multiple packages. This fixes some vulnerabilities, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to cause files to be extracted to arbitrary locations on a user's system, bypass certain security restrictions, conduct cross-site scripting attacks, cause a DoS (Denial of Service), or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20117/ -- [SA20094] Empire Server "client_cmd()" Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-05-15 Luigi Auriemma has reported a vulnerability in Empire Server, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20094/ -- [SA20139] Novell eDirectory iMonitor Unspecified Buffer Overflow Vulnerability Critical: Moderately critical Where: From local network Impact: DoS, System access Released: 2006-05-18 A vulnerability has been reported in in Novell eDirectory, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20139/ -- [SA20124] Debian update for phpldapadmin Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-16 Debian has issued an update for phpldapadmin. This fixes some vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20124/ -- [SA20137] Ubuntu update for Quagga Critical: Less critical Where: From local network Impact: Security Bypass, Exposure of system information, DoS Released: 2006-05-16 Ubuntu has issued an update for Quagga. This fixes two security issues and a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to bypass certain security restrictions, and to disclose system information. Full Advisory: http://secunia.com/advisories/20137/ -- [SA20127] Sun N1 System Manager Password Disclosure Vulnerability Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2006-05-18 A vulnerability has been reported in Sun N1 System Manager, which can be exploited by malicious, local users to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/20127/ -- [SA20108] Debian update for webcalendar Critical: Not critical Where: From remote Impact: Exposure of system information Released: 2006-05-15 Debian has issued an update for webcalendar. This fixes a weakness, which can be exploited by malicious people to identify valid user accounts. Full Advisory: http://secunia.com/advisories/20108/ -- [SA20116] Quagga bgpd Denial of Service Vulnerability Critical: Not critical Where: Local system Impact: DoS Released: 2006-05-15 Fredrik Widell has reported a vulnerability in Quagga, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20116/ Other:-- [SA20109] AdderLink IP Unspecified VNC Vulnerability Critical: Highly critical Where: From remote Impact: Unknown Released: 2006-05-16 A vulnerability with unknown impact has been reported in AdderLink IP. Full Advisory: http://secunia.com/advisories/20109/ -- [SA20085] ClamXav freshclam suid Permissions Security Issue Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2006-05-15 Kevin Finisterre has reported a security issue in ClamXav, which can be exploited by malicious, local users to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/20085/ Cross Platform:-- [SA20135] DeluxeBB Multiple File Extensions File Upload Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-05-17 rgod has discovered a vulnerability in DeluxeBB, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20135/ -- [SA20128] NewsPortal Cross-Site Scripting and File Inclusion Critical: Highly critical Where: From remote Impact: Cross Site Scripting, System access Released: 2006-05-17 Some vulnerabilities have been reported in NewsPortal, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20128/ -- [SA20121] Squirrelcart "cart_isp_root" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-05-16 OLiBekaS has reported a vulnerability in Squirrelcart, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20121/ -- [SA20120] Quezza "quezza_root_path" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-05-17 Mustafa Can Bjorn has reported a vulnerability in Quezza, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20120/ -- [SA20119] TR Newsportal "file_newsportal" Parameter File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-05-16 Kacper has discovered a vulnerability in TR Newsportal, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20119/ -- [SA20115] Php Blue Dragon CMS "vsDragonRootPath" File Inclusion Critical: Highly critical Where: From remote Impact: System access Released: 2006-05-15 Kacper has discovered a vulnerability in Php Blue Dragon CMS, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20115/ -- [SA20103] ezUserManager "ezUserManager_Path" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-05-16 OLiBekaS has discovered a vulnerability in ezUserManager, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20103/ -- [SA20099] Genecys Buffer Overflow and Denial of Service Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-05-15 Luigi Auriemma has reported two vulnerabilities in Genecys, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20099/ -- [SA20098] Outgun Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-05-15 Luigi Auriemma has reported some vulnerabilities in Outgun, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20098/ -- [SA20097] Raydium Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2006-05-15 Luigi Auriemma has reported some vulnerabilities in Raydium, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20097/ -- [SA20092] phpBB foing Module "phpbb_root_path" File Inclusion Critical: Highly critical Where: From remote Impact: System access Released: 2006-05-15 Kurdish Security has discovered some vulnerabilities in the foing module for phpBB, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20092/ -- [SA20090] Unclassified NewsBoard "ABBC[Config][smileset]" Local File Inclusion Critical: Highly critical Where: From remote Impact: Exposure of sensitive information, System access Released: 2006-05-12 rgod has reported a vulnerability in Unclassified NewsBoard, which can be exploited by malicious people to disclose sensitive information and compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20090/ -- [SA20087] PopPhoto "cfg[popphoto_base_path]" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-05-15 VietMafia has reported a vulnerability in PopPhoto, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20087/ -- [SA20133] RadLance Gold "popup.php" Local File Inclusion Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2006-05-16 Mr.CrackerZ has reported a vulnerability in RadLance Gold, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/20133/ -- [SA20131] Sphider Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2006-05-17 Some vulnerabilities have been discovered in Sphider, which can be exploited by malicious people to conduct cross-site scripting attacks and SQL injection attacks. Full Advisory: http://secunia.com/advisories/20131/ -- [SA20129] PHP-Fusion "srch_where" SQL Injection Vulnerablility Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-05-17 rgod has discovered a vulnerability in PHP-Fusion, which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20129/ -- [SA20125] Caucho Resin Two Disclosure of Sensitive Information Vulnerabilities Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2006-05-17 Two vulnerabilities have been reported in Caucho Resin, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/20125/ -- [SA20106] Hitachi EUR Unspecified SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-05-17 A vulnerability has been reported in EUR, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20106/ -- [SA20104] DeluxeBB "name" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-05-16 KingOfSka has discovered a vulnerability in DeluxeBB, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20104/ -- [SA20096] GNUnet Empty UDP Datagram Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-05-15 Luigi Auriemma has reported a vulnerability in GNUnet, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20096/ -- [SA20089] e107 "e107_cookie" Parameter SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-05-15 socsam has discovered a vulnerability in e107, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20089/ -- [SA20088] phpCOIN E-Mail Address Disclosure of Arbitrary Messages Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2006-05-12 A vulnerability has been reported in phpCOIN, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/20088/ -- [SA20084] AliPAGER "ubild" Cross-Site Scripting and SQL Injection Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2006-05-11 Hamid Ebadi has discovered a vulnerability in AliPAGER, which can be exploited by malicious people to conduct cross-site scripting attacks and SQL injection attacks. Full Advisory: http://secunia.com/advisories/20084/ -- [SA20144] Sun Java System Directory Server Authentication Bypass Critical: Moderately critical Where: From local network Impact: Security Bypass Released: 2006-05-17 A security issue has been reported in Sun Java System Directory Server, which can be exploited by malicious people to gain unauthorised access. Full Advisory: http://secunia.com/advisories/20144/ -- [SA20141] phpRemoteView Multiple Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-17 Soot has discovered some vulnerabilities in phpRemoteView, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20141/ -- [SA20130] BEA WebLogic Server/Express Multiple Security Issues Critical: Less critical Where: From remote Impact: Security Bypass, Exposure of system information, Exposure of sensitive information Released: 2006-05-16 Multiple security issues and a vulnerability have been reported in WebLogic Server / Express, which can be exploited by malicious people to disclose system and sensitive information, and bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/20130/ -- [SA20118] Directory Listing Script "dir" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-15 Kiki has discovered a vulnerability in Directory Listing Script, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20118/ -- [SA20113] phpMyAdmin "theme" and "db" Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-15 Two vulnerabilities have been reported in phpMyAdmin, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20113/ -- [SA20111] phpODP "browse" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-15 Kiki has discovered a vulnerability in phpODP, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20111/ -- [SA20110] Jax Guestbook "guestbook.admin.php" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-15 Kiki has discovered a vulnerability in Jax Guestbook, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20110/ -- [SA20105] Confixx Pro "login" Parameter Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-16 LoK-Crew has reported a vulnerability in Confixx Pro, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20105/ -- [SA20101] FlexChat "username" Parameter Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-15 r0t has discovered a vulnerability in FlexChat, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20101/ -- [SA20095] GPhotos Cross-Site Scripting and Disclosure of Arbitrary Directories Critical: Less critical Where: From remote Impact: Cross Site Scripting, Exposure of system information Released: 2006-05-15 Moroccan Security has discovered some vulnerabilities and a weakness in GPhotos, which can be exploited by malicious people to disclose system information and conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20095/ -- [SA20091] OZJournals "vname" Parameter Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-05-12 Kiki has discovered a vulnerability in OZJournals, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20091/ -- [SA20093] phpBB "Upload Avatar from a URL" Remote HTTP Request Weakness Critical: Not critical Where: From remote Impact: Security Bypass Released: 2006-05-16 rgod has discovered a weakness in phpBB, which can be exploited by malicious people to use it for making HTTP requests to other sites. Full Advisory: http://secunia.com/advisories/20093/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _________________________________ Attend the Black Hat Briefings and Training, Las Vegas July 29 - August 3 2,500+ international security experts from 40 nations, 10 tracks, no vendor pitches. www.blackhat.com
This archive was generated by hypermail 2.1.3 : Fri May 19 2006 - 00:25:54 PDT