======================================================================== The Secunia Weekly Advisory Summary 2006-06-08 - 2006-06-15 This week: 149 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: The Secunia staff is spending hours every day to assure you the best and most reliable source for vulnerability information. Every single vulnerability report is being validated and verified before a Secunia advisory is written. Secunia validates and verifies vulnerability reports in many different ways e.g. by downloading the software and performing comprehensive tests, by reviewing source code, or by validating the credibility of the source from which the vulnerability report was issued. As a result, Secunia's database is the most correct and complete source for recent vulnerability information available on the Internet. Secunia Online Vulnerability Database: http://secunia.com/ ======================================================================== 2) This Week in Brief: Tuesday Microsoft issued a total of 12 bulletins. One of the bulletins addressed the Extremely Critical Word vulnerability which already has been exploited by malicious malware. Another addressed the Internet Explorer vulnerability which was discovered by Secunia Security Researcher Andreas Sandblad while researching the crash bug reported by Michal Zalewski. References: http://secunia.com/SA20153 http://secunia.com/SA19762 -- VIRUS ALERTS: During the past week Secunia collected 297 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA20153] Microsoft Word Malformed Object Pointer Vulnerability 2. [SA20595] Microsoft Internet Explorer Multiple Vulnerabilities 3. [SA20639] Microsoft Windows TCP/IP Protocol Driver Buffer Overflow 4. [SA19762] Internet Explorer Exception Handling Memory Corruption Vulnerability 5. [SA20442] Firefox File Upload Form Keystroke Event Cancel Vulnerability 6. [SA19521] Internet Explorer Window Loading Race Condition Vulnerability 7. [SA20543] FilZip Multiple Archive Directory Traversal Vulnerability 8. [SA19738] Internet Explorer "mhtml:" Redirection Disclosure of Sensitive Information 9. [SA20626] Windows Media Player PNG Processing Buffer Overflow 10. [SA15601] Mozilla / Mozilla Firefox Frame Injection Vulnerability ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA20631] Microsoft Windows Graphics Rendering Engine Vulnerability [SA20626] Windows Media Player PNG Processing Buffer Overflow [SA20620] Microsoft JScript Memory Corruption Vulnerability [SA20605] Microsoft Windows ART Image Handling Buffer Overflow [SA20595] Microsoft Internet Explorer Multiple Vulnerabilities [SA20575] WinSCP Protocol Handler Command Line Switch Injection [SA20639] Microsoft Windows TCP/IP Protocol Driver Buffer Overflow [SA20634] Microsoft Exchange Server Outlook Web Access Script Insertion [SA20609] ePhotos Multiple SQL Injection Vulnerabilities [SA20574] CesarFTP MKD Command Buffer Overflow Vulnerability [SA20556] MailEnable Enterprise Multiple WebMail Vulnerabilities [SA20554] My Photo Scrapbook SQL Injection and Cross-Site Scripting [SA20545] OfficeFlow Cross-Site Scripting and SQL Injection Vulnerabilities [SA20517] ASP ListPics Cross-Site Scripting and Script Insertion [SA20637] Microsoft Windows RPC Mutual Authentication Vulnerability [SA20630] Microsoft Windows Routing and Remote Access Vulnerabilities [SA20617] fipsCMS "index.asp" Cross-Site Scripting Vulnerabilities [SA20614] ClickGallery Cross-Site Scripting Vulnerabilities [SA20610] i-Gallery Cross-Site Scripting Vulnerabilities [SA20606] Uphotogallery thumbnails.asp Cross-Site Scripting [SA20604] Xtreme ASP Photo Gallery Cross-Site Scripting Vulnerabilities [SA20603] DwZone Shopping Cart "ProductDetailsForm.asp" Cross-Site Scripting [SA20583] Cabacos Web CMS "suchtext" Parameter Cross-Site Scripting [SA20582] CFXe CMS "voltext_suche" Parameter Cross-Site Scripting [SA20578] LogiSphere Cross-Site Scripting Vulnerability [SA20559] fipsGallery "path" Parameter Cross-Site Scripting Vulnerability [SA20553] EZGallery Multiple Cross-Site Scripting Vulnerabilities [SA20544] VanillaSoft Helpdesk "username" Cross-Site Scripting [SA20543] FilZip Multiple Archive Directory Traversal Vulnerability [SA20537] WS-Album "FullPhoto.asp" Cross-Site Scripting Vulnerabilities [SA20527] ClickCart "cat" Parameter Cross-Site Scripting Vulnerability [SA20635] Windows SMB Denial of Service and Privilege Escalation [SA20629] Kaspersky Anti-Virus "klif.sys" Denial of Service Vulnerability UNIX/Linux: [SA20669] Gentoo update for DokuWiki [SA20592] Zeroboard ".htaccess" File Upload Vulnerability [SA20569] free QBoard "qb_path" Parameter File Inclusion Vulnerability [SA20561] Gentoo update for firefox [SA20689] Ubuntu update for wv2 [SA20683] Slackware update for sendmail [SA20675] IBM AIX update for Sendmail [SA20673] SGI IRIX update for sendmail [SA20671] Debian update for kernel-source-2.4.27 [SA20667] Avaya Products LibTIFF Multiple Vulnerabilities [SA20665] wvWare wv2 Library Integer Overflow Vulnerability [SA20654] SUSE update for sendmail [SA20653] Avaya Products PostgreSQL Multiple Vulnerabilities [SA20651] FreeBSD update for sendmail [SA20650] Solaris update for sendmail [SA20641] Red Hat update for sendmail [SA20638] Mandriva update for freetype2 [SA20625] Red Hat update for mysql [SA20624] Red Hat update for mailman [SA20608] Gentoo update for wordpress [SA20591] Debian update for freetype [SA20564] Gentoo update for cscope [SA20562] Gentoo update for mysql [SA20555] SUSE update for postgresql [SA20551] 0verkill Denial of Service Vulnerability [SA20550] Ubuntu update for binutils [SA20548] Ubuntu update for courier-mta [SA20542] Debian update for webcalendar [SA20541] Debian update for mysql-dfsg-4.1 [SA20531] Trustix updates for binutils / mysql / spamassassin [SA20525] Ubuntu update for libfreetype6 [SA20520] Debian update for tiff [SA20519] Courier Mail Server Username Encoding Denial of Service [SA20658] Gentoo update for asterisk [SA20566] Gentoo update for Spamassassin [SA20676] SUSE update for php4 / php5 [SA20672] Debian update for horde3 [SA20627] SUSE Updates for Multiple Packages [SA20622] Debian update for gforge [SA20601] P.A.I.D "read" Parameter Cross-Site Scripting Vulnerability [SA20571] Ubuntu update for libgd2 [SA20563] Gentoo update for jpeg [SA20677] aRts "artswrapper" Helper Application setuid Security Issue [SA20674] Ubuntu update for kdm [SA20660] Red Hat update for kdebase [SA20636] Gentoo update for gdm [SA20616] Gentoo update for vixie-cron [SA20602] KDE KDM Arbitrary File Reading Vulnerability [SA20587] Mandriva update for gdm [SA20552] Ubuntu update for gdm [SA20532] GNOME Display Manager Configuration GUI Access Vulnerability [SA20549] Ubuntu update for xine-lib [SA20666] Avaya Products vixie-cron Exposure of Arbitrary Cron Files Other: [SA20618] FAST360 Appliance DNS Analysis Denial of Service [SA20570] FAST360 Appliance HTTP Analysis Bypass Vulnerability [SA20644] Cisco WebVPN Cross-Site Scripting Vulnerability [SA20647] Symantec Security Information Manager Authentication Bypass Cross Platform: [SA20656] PictureDis Products "lang" Parameter File Inclusion Vulnerability [SA20633] Microsoft PowerPoint Malformed Record Vulnerability [SA20632] Flipper Poll "root_path" File Inclusion Vulnerability [SA20588] aePartner "dir[data]" File Inclusion Vulnerability [SA20573] phpCMS "PHPCMS_INCLUDEPATH" File Inclusion Vulnerabilities [SA20568] webprojectdb "INCDIR" Parameter File Inclusion Vulnerabilities [SA20558] AWF CMS "spaw_root" Parameter File Inclusion Vulnerability [SA20557] Content*Builder File Inclusion Vulnerabilities [SA20536] Minerva "phpbb_root_path" File Inclusion Vulnerability [SA20522] Enterprise Payroll Systems "absolutepath" File Inclusion [SA20687] phpBannerExchange "email" Parameter SQL Injection [SA20648] TikiWiki Unspecified Cross-Site Scripting and SQL Injection [SA20646] blur6ex "ID" Parameter SQL Injection Vulnerability [SA20642] PhpMyFactures Multiple Vulnerabilities [SA20613] Five Star Review Script Multiple Vulnerabilities [SA20611] Mobile Space Community Multiple Vulnerabilities [SA20607] tinyMuw "comment" Script Insertion Vulnerability [SA20599] MyScrapbook Script Insertion Vulnerabilities [SA20598] ST AdManager Lite Article Submission Script Insertion Vulnerability [SA20597] Coppermine Photo Gallery "add_hit()" SQL Injection [SA20581] Fast Menu Restaurant Ordering Multiple Vulnerabilities [SA20576] Adobe Reader Unspecified Vulnerabilities [SA20547] i.List Cross-Site Scripting and Script Insertion Vulnerabilities [SA20535] E-Dating System Multiple Vulnerabilities [SA20534] CS-Forum Multiple Vulnerabilities [SA20529] Mafia Moblog "img" Parameter SQL Injection Vulnerability [SA20526] PBL Guestbook Script Insertion Vulnerabilities [SA20523] NPDS Local File Inclusion and Cross-Site Scripting Vulnerabilities [SA20521] KAPhotoservice Cross-Site Scripting and Script Insertion [SA20623] iaxComm iaxclient Buffer Overflow Vulnerability [SA20567] Kiax iaxclient Buffer Overflow Vulnerability [SA20560] IDE FISK iaxclient Buffer Overflow Vulnerability [SA20661] Horde Cross-Site Scripting Vulnerabilities [SA20652] 35mm Slide Gallery Multiple Cross-Site Scripting Vulnerabilities [SA20640] Event Registration Multiple Cross-Site Scripting Vulnerabilities [SA20621] OkMall "search.php" Cross-Site Scripting Vulnerabilities [SA20619] iFoto "file" Cross-Site Scripting Vulnerability [SA20612] Mole Group Ticket Booking Script Cross-Site Scripting [SA20594] QuickLinks "q" Cross-Site Scripting Vulnerability [SA20593] OkArticles "q" Cross-Site Scripting Vulnerability [SA20590] Ringlink "ringid" Cross-Site Scripting Vulnerabilities [SA20586] Realty Room Rent "sel_menu" Cross-Site Scripting Vulnerability [SA20585] ZMS "raw" Parameter Cross-Site Scripting Vulnerability [SA20584] Realty Home Rent "sel_menu" Cross-Site Scripting Vulnerability [SA20580] SubText MultiBlog Admin Logon Security Issue [SA20577] Sylpheed URI Check Bypass Security Issue [SA20572] myPHP Guestbook "lang" Cross-Site Scripting [SA20565] Car Classifieds "make_id" Cross-Site Scripting Vulnerability [SA20546] EvGenius Counter "page" Parameter Cross-Site Scripting [SA20540] Chemical Directory Search Functionality Cross-Site Scripting [SA20539] Easy Ad-Manager "mbid" Parameter Cross-Site Scripting [SA20538] ViArt Shop Free Cross-Site Scripting Vulnerabilities [SA20533] vSCAL / vsREAL Cross-Site Scripting Vulnerabilities [SA20530] Ez Ringtone Manager Cross-Site Scripting Vulnerabilities [SA20528] IntegraMOD "STYLE_URL" Parameter Cross-Site Scripting [SA20524] SHOUTcast Server DJ Script Insertion Vulnerabilities [SA20579] DB2 Universal Database Multiple Denial of Service Vulnerabilities [SA20518] Sun Grid Engine CSP Mode Authentication Security Issue ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA20631] Microsoft Windows Graphics Rendering Engine Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-06-13 Symantec has reported a vulnerability in certain old versions of Windows, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/20631/ -- [SA20626] Windows Media Player PNG Processing Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2006-06-13 iDefense Labs has reported a vulnerability in Windows Media Player, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/20626/ -- [SA20620] Microsoft JScript Memory Corruption Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-06-13 A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/20620/ -- [SA20605] Microsoft Windows ART Image Handling Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2006-06-13 A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/20605/ -- [SA20595] Microsoft Internet Explorer Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Spoofing, System access Released: 2006-06-13 Some vulnerabilities have been reported in Internet Explorer, which can be exploited by malicious people to conduct phishing attacks and compromise a user's system. Full Advisory: http://secunia.com/advisories/20595/ -- [SA20575] WinSCP Protocol Handler Command Line Switch Injection Critical: Highly critical Where: From remote Impact: Manipulation of data, System access Released: 2006-06-12 Jelmer Kuperus has discovered a vulnerability in WinSCP, which can be exploited by malicious people to manipulate certain files on a user's system and potentially to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20575/ -- [SA20639] Microsoft Windows TCP/IP Protocol Driver Buffer Overflow Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-06-13 A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20639/ -- [SA20634] Microsoft Exchange Server Outlook Web Access Script Insertion Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-13 SEC Consult has reported a vulnerability in Microsoft Exchange Server, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/20634/ -- [SA20609] ePhotos Multiple SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-06-13 r0t has reported some vulnerabilities in ePhotos, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20609/ -- [SA20574] CesarFTP MKD Command Buffer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-06-12 h07 has discovered a vulnerability in CesarFTP, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20574/ -- [SA20556] MailEnable Enterprise Multiple WebMail Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Privilege escalation Released: 2006-06-12 Soroush Dalili has discovered some vulnerabilities in MailEnable Enterprise, which potentially can be exploited by malicious users to gain escalated privileges, and by malicious people and users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/20556/ -- [SA20554] My Photo Scrapbook SQL Injection and Cross-Site Scripting Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2006-06-09 r0t has reported some vulnerabilities in My Photo Scrapbook, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/20554/ -- [SA20545] OfficeFlow Cross-Site Scripting and SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2006-06-09 r0t has reported two vulnerabilities in OfficeFlow, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/20545/ -- [SA20517] ASP ListPics Cross-Site Scripting and Script Insertion Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-09 Two vulnerabilities have been reported in ASP ListPics, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks. Full Advisory: http://secunia.com/advisories/20517/ -- [SA20637] Microsoft Windows RPC Mutual Authentication Vulnerability Critical: Moderately critical Where: From local network Impact: Spoofing Released: 2006-06-13 A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to spoof a valid RPC server. Full Advisory: http://secunia.com/advisories/20637/ -- [SA20630] Microsoft Windows Routing and Remote Access Vulnerabilities Critical: Moderately critical Where: From local network Impact: System access Released: 2006-06-13 Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people or users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20630/ -- [SA20617] fipsCMS "index.asp" Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-12 r0t has reported some vulnerabilities in fipsCMS, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20617/ -- [SA20614] ClickGallery Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-13 r0t has reported two vulnerabilities in ClickGallery, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20614/ -- [SA20610] i-Gallery Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-13 r0t has reported some vulnerabilities in i-Gallery, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20610/ -- [SA20606] Uphotogallery thumbnails.asp Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-13 r0t has reported a vulnerability in Uphotogallery, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20606/ -- [SA20604] Xtreme ASP Photo Gallery Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-13 r0t has discovered some vulnerabilities in Xtreme ASP Photo Gallery, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20604/ -- [SA20603] DwZone Shopping Cart "ProductDetailsForm.asp" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-13 r0t has reported two vulnerabilities in DwZone Shopping Cart, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20603/ -- [SA20583] Cabacos Web CMS "suchtext" Parameter Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-12 David "Aesthetico" Vieira-Kurz has reported a vulnerability in Cabacos Web CMS, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20583/ -- [SA20582] CFXe CMS "voltext_suche" Parameter Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-12 David "Aesthetico" Vieira-Kurz has reported a vulnerability in CFXe CMS, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20582/ -- [SA20578] LogiSphere Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-12 Ziv Kamir has discovered a vulnerability in LogiSphere, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20578/ -- [SA20559] fipsGallery "path" Parameter Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-12 r0t has reported a vulnerability in fipsGallery, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20559/ -- [SA20553] EZGallery Multiple Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-12 r0t has reported some vulnerabilities in EZGallery, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20553/ -- [SA20544] VanillaSoft Helpdesk "username" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-09 r0t has reported a vulnerability in VanillaSoft Helpdesk, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20544/ -- [SA20543] FilZip Multiple Archive Directory Traversal Vulnerability Critical: Less critical Where: From remote Impact: System access Released: 2006-06-09 Claus Berghamer has discovered a vulnerability in FilZip, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/20543/ -- [SA20537] WS-Album "FullPhoto.asp" Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-12 r0t has discovered some vulnerabilities in WS-Album, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20537/ -- [SA20527] ClickCart "cat" Parameter Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-12 r0t has reported a vulnerability in ClickCart, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20527/ -- [SA20635] Windows SMB Denial of Service and Privilege Escalation Critical: Less critical Where: Local system Impact: Privilege escalation, DoS Released: 2006-06-13 Ruben Santamarta has reported two vulnerabilities in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges. Full Advisory: http://secunia.com/advisories/20635/ -- [SA20629] Kaspersky Anti-Virus "klif.sys" Denial of Service Vulnerability Critical: Not critical Where: Local system Impact: DoS Released: 2006-06-14 Skywing has discovered a vulnerability in Kaspersky Anti-Virus, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20629/ UNIX/Linux:-- [SA20669] Gentoo update for DokuWiki Critical: Highly critical Where: From remote Impact: Security Bypass, Exposure of sensitive information, System access Released: 2006-06-15 Gentoo has issued an update for DokuWiki. This fixes some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20669/ -- [SA20592] Zeroboard ".htaccess" File Upload Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-06-13 Richard Son has discovered a vulnerability in Zeroboard, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20592/ -- [SA20569] free QBoard "qb_path" Parameter File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-06-12 Kacper has reported a vulnerability in free QBoard, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20569/ -- [SA20561] Gentoo update for firefox Critical: Highly critical Where: From remote Impact: Security Bypass, Cross Site Scripting, System access Released: 2006-06-12 Gentoo has issued an update for firefox. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and HTTP response smuggling attacks, and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/20561/ -- [SA20689] Ubuntu update for wv2 Critical: Moderately critical Where: From remote Impact: System access Released: 2006-06-15 Ubuntu has issued an update for wv2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/20689/ -- [SA20683] Slackware update for sendmail Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-06-15 Slackware has issued an update for sendmail. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20683/ -- [SA20675] IBM AIX update for Sendmail Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-06-15 IBM has acknowledged a vulnerability in sendmail, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20675/ -- [SA20673] SGI IRIX update for sendmail Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-06-15 SGI has issued an update for sendmail. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20673/ -- [SA20671] Debian update for kernel-source-2.4.27 Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of system information, Exposure of sensitive information, DoS Released: 2006-06-15 Debian has issued an update for kernel-source-2.4.27. This fixes some vulnerabilities and weaknesses, which can be exploited by malicious, local users to bypass certain security restrictions, disclose potentially sensitive information and cause a DoS (Denial of Service), and by malicious people to bypass certain security restrictions, gain knowledge of certain system information, and cause a DoS. Full Advisory: http://secunia.com/advisories/20671/ -- [SA20667] Avaya Products LibTIFF Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-06-14 Avaya has acknowledged some vulnerabilities in various Avaya products, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/20667/ -- [SA20665] wvWare wv2 Library Integer Overflow Vulnerability Critical: Moderately critical Where: From remote Impact: System access Released: 2006-06-15 A vulnerability has been reported in wvWare wv2 Library, which potentially can be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/20665/ -- [SA20654] SUSE update for sendmail Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-06-15 SUSE has issued an update for sendmail. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20654/ -- [SA20653] Avaya Products PostgreSQL Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data Released: 2006-06-14 Avaya has acknowledged two vulnerabilities and a weakness in various Avaya products, which potentially can be exploited by malicious, local users to bypass certain security restrictions, and by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20653/ -- [SA20651] FreeBSD update for sendmail Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-06-15 FreeBSD has issued an update for sendmail. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20651/ -- [SA20650] Solaris update for sendmail Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-06-15 Sun has acknowledged an update for sendmail. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20650/ -- [SA20641] Red Hat update for sendmail Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-06-15 Red Hat has issued an update for sendmail. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20641/ -- [SA20638] Mandriva update for freetype2 Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-06-13 Mandriva has issued an update for freetype2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20638/ -- [SA20625] Red Hat update for mysql Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data, Exposure of sensitive information Released: 2006-06-12 Red Hat has issued an update for mysql. This fixes a security issue and some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and to disclose potentially sensitive information, and potentially by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20625/ -- [SA20624] Red Hat update for mailman Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-06-12 Red Hat has issued an update for mailman. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20624/ -- [SA20608] Gentoo update for wordpress Critical: Moderately critical Where: From remote Impact: System access Released: 2006-06-12 Gentoo has issued an update for wordpress. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20608/ -- [SA20591] Debian update for freetype Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-06-12 Debian has issued an update for freetype. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20591/ -- [SA20564] Gentoo update for cscope Critical: Moderately critical Where: From remote Impact: System access Released: 2006-06-12 Gentoo has issued an update for cscope. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/20564/ -- [SA20562] Gentoo update for mysql Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-06-12 Gentoo has issued an update for MySQL. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20562/ -- [SA20555] SUSE update for postgresql Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-06-12 SUSE has issued an update for postgresql. This fixes two vulnerabilities, which potentially can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20555/ -- [SA20551] 0verkill Denial of Service Vulnerability Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-06-09 Federico Fazzi has discovered a vulnerability in 0verkill, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20551/ -- [SA20550] Ubuntu update for binutils Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-06-09 Ubuntu has issued an update for binutils. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20550/ -- [SA20548] Ubuntu update for courier-mta Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-06-09 Ubuntu has issued an update for courier-mta. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20548/ -- [SA20542] Debian update for webcalendar Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of sensitive information Released: 2006-06-13 Debian has issued an update for webcalendar. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions and disclose sensitive information. Full Advisory: http://secunia.com/advisories/20542/ -- [SA20541] Debian update for mysql-dfsg-4.1 Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-06-09 Debian has issued an update for mysql-dfsg-4.1. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20541/ -- [SA20531] Trustix updates for binutils / mysql / spamassassin Critical: Moderately critical Where: From remote Impact: Manipulation of data, DoS, System access Released: 2006-06-09 Trustix has issued updates for binutils, mysql, and spamassassin. These fix some vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks, cause a DoS (Denial of Service), and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20531/ -- [SA20525] Ubuntu update for libfreetype6 Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-06-09 Ubuntu has issued an update for libfreetype6. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20525/ -- [SA20520] Debian update for tiff Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2006-06-08 Debian has issued an update for tiff. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20520/ -- [SA20519] Courier Mail Server Username Encoding Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-06-08 A vulnerability has been reported in Courier Mail Server, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20519/ -- [SA20658] Gentoo update for asterisk Critical: Moderately critical Where: From local network Impact: System access Released: 2006-06-15 Gentoo has issued an update for asterisk. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20658/ -- [SA20566] Gentoo update for Spamassassin Critical: Moderately critical Where: From local network Impact: System access Released: 2006-06-12 Gentoo has issued an update for spamassassin. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20566/ -- [SA20676] SUSE update for php4 / php5 Critical: Less critical Where: From remote Impact: DoS, System access Released: 2006-06-15 SUSE has issued an update for php. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20676/ -- [SA20672] Debian update for horde3 Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-15 Debian has issued an update for horde3. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20672/ -- [SA20627] SUSE Updates for Multiple Packages Critical: Less critical Where: From remote Impact: Security Bypass, Cross Site Scripting Released: 2006-06-12 SUSE has issued updates for multiple packages. These fix vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions and by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20627/ -- [SA20622] Debian update for gforge Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-12 Debian has issued an update for gforge. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20622/ -- [SA20601] P.A.I.D "read" Parameter Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-13 luny has reported a vulnerability in P.A.I.D, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20601/ -- [SA20571] Ubuntu update for libgd2 Critical: Less critical Where: From remote Impact: DoS Released: 2006-06-14 Ubuntu has issued an update for libgd2. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) against applications and services using libgd2. Full Advisory: http://secunia.com/advisories/20571/ -- [SA20563] Gentoo update for jpeg Critical: Less critical Where: From remote Impact: DoS Released: 2006-06-12 Gentoo has issued an update for jpeg. This fixes a security issue, which potentially can be malicious people to cause a DoS (Denial of Service) against applications and services using the jpeg library. Full Advisory: http://secunia.com/advisories/20563/ -- [SA20677] aRts "artswrapper" Helper Application setuid Security Issue Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-06-15 A security issue has been reported in aRts, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/20677/ -- [SA20674] Ubuntu update for kdm Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2006-06-15 Ubuntu has issued an update for kdm. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of sensitive information. Full Advisory: http://secunia.com/advisories/20674/ -- [SA20660] Red Hat update for kdebase Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2006-06-15 Red Hat has issued an update for kdm. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of sensitive information. Full Advisory: http://secunia.com/advisories/20660/ -- [SA20636] Gentoo update for gdm Critical: Less critical Where: Local system Impact: Security Bypass Released: 2006-06-13 Gentoo has issued an update for gdm. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/20636/ -- [SA20616] Gentoo update for vixie-cron Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2006-06-12 Gentoo has issued an update for vixie-cron. This fixes a security issue, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/20616/ -- [SA20602] KDE KDM Arbitrary File Reading Vulnerability Critical: Less critical Where: Local system Impact: Exposure of sensitive information Released: 2006-06-15 A vulnerability has been reported in KDE, which can be exploited by malicious, local users to gain knowledge of sensitive information. Full Advisory: http://secunia.com/advisories/20602/ -- [SA20587] Mandriva update for gdm Critical: Less critical Where: Local system Impact: Security Bypass Released: 2006-06-14 Mandriva has issued an update for gdm. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/20587/ -- [SA20552] Ubuntu update for gdm Critical: Less critical Where: Local system Impact: Security Bypass Released: 2006-06-09 Ubuntu has issued an update for gdm. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/20552/ -- [SA20532] GNOME Display Manager Configuration GUI Access Vulnerability Critical: Less critical Where: Local system Impact: Security Bypass Released: 2006-06-09 Victor Daniel has reported a vulnerability in GNOME Display Manager (GDM), which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/20532/ -- [SA20549] Ubuntu update for xine-lib Critical: Not critical Where: From remote Impact: DoS Released: 2006-06-09 Ubuntu has issued an update for xine-lib. This fixes a weakness, which can be exploited by malicious people to crash certain applications on a user's system. Full Advisory: http://secunia.com/advisories/20549/ -- [SA20666] Avaya Products vixie-cron Exposure of Arbitrary Cron Files Critical: Not critical Where: Local system Impact: Exposure of system information Released: 2006-06-14 Avaya has acknowledged a vulnerability in various products, which can be exploited by malicious, local users to read arbitrary cron files. Full Advisory: http://secunia.com/advisories/20666/ Other:-- [SA20618] FAST360 Appliance DNS Analysis Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2006-06-12 A vulnerability has been reported in FAST360 Appliance, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20618/ -- [SA20570] FAST360 Appliance HTTP Analysis Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2006-06-12 A vulnerability has been reported in FAST360 Appliance, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/20570/ -- [SA20644] Cisco WebVPN Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-14 A vulnerability has been reported in Cisco WebVPN, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20644/ -- [SA20647] Symantec Security Information Manager Authentication Bypass Critical: Less critical Where: Local system Impact: Security Bypass Released: 2006-06-14 A vulnerability has been reported in Symantec Security Information Manager, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/20647/ Cross Platform:-- [SA20656] PictureDis Products "lang" Parameter File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-06-15 spykids has discovered some vulnerabilities in PictureDis products, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20656/ -- [SA20633] Microsoft PowerPoint Malformed Record Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-06-13 A vulnerability has been reported in Microsoft PowerPoint, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/20633/ -- [SA20632] Flipper Poll "root_path" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-06-15 SpC-x has reported a vulnerability in Flipper Poll, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20632/ -- [SA20588] aePartner "dir[data]" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-06-12 Kacper has discovered a vulnerability in aePartner, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20588/ -- [SA20573] phpCMS "PHPCMS_INCLUDEPATH" File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2006-06-13 Federico Fazzi has discovered some vulnerabilities in phpCMS, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20573/ -- [SA20568] webprojectdb "INCDIR" Parameter File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2006-06-12 Kacper has discovered two vulnerabilities in webprojectdb, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20568/ -- [SA20558] AWF CMS "spaw_root" Parameter File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-06-12 Federico Fazzi has discovered a vulnerability in AWF CMS, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20558/ -- [SA20557] Content*Builder File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2006-06-12 Some vulnerabilities have been reported in Content*Builder, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20557/ -- [SA20536] Minerva "phpbb_root_path" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2006-06-13 Kacper has discovered a vulnerability in Minerva, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20536/ -- [SA20522] Enterprise Payroll Systems "absolutepath" File Inclusion Critical: Highly critical Where: From remote Impact: System access Released: 2006-06-09 Kacper has discovered two vulnerabilities in Enterprise Payroll Systems, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20522/ -- [SA20687] phpBannerExchange "email" Parameter SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-06-15 RedTeam has reported a vulnerability in phpBannerExchange, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20687/ -- [SA20648] TikiWiki Unspecified Cross-Site Scripting and SQL Injection Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2006-06-14 securitynews has reported some vulnerabilities in TikiWiki, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. Full Advisory: http://secunia.com/advisories/20648/ -- [SA20646] blur6ex "ID" Parameter SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-06-14 rgod has reported a vulnerability in blue6ex, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20646/ -- [SA20642] PhpMyFactures Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Manipulation of data Released: 2006-06-14 DarkFig has discovered some vulnerabilities in PhpMyFactures, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks, and to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/20642/ -- [SA20613] Five Star Review Script Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-14 luny has reported some vulnerabilities in Five Star Review Script, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20613/ -- [SA20611] Mobile Space Community Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data, Exposure of sensitive information Released: 2006-06-13 luny has reported some vulnerabilities in Mobile Space Community, which can be exploited by malicious people to conduct script insertion and SQL injection attacks, and potentially disclose sensitive information. Full Advisory: http://secunia.com/advisories/20611/ -- [SA20607] tinyMuw "comment" Script Insertion Vulnerability Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-13 luny has reported a vulnerability in tinyMuw, which can be exploited by malicious users to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/20607/ -- [SA20599] MyScrapbook Script Insertion Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-13 luny has reported two vulnerabilities in MyScrapbook, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/20599/ -- [SA20598] ST AdManager Lite Article Submission Script Insertion Vulnerability Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-12 luny has reported a vulnerability in ST AdManager Lite, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/20598/ -- [SA20597] Coppermine Photo Gallery "add_hit()" SQL Injection Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-06-13 imei addmimistrator has discovered two vulnerabilities in Coppermine Photo Gallery, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20597/ -- [SA20581] Fast Menu Restaurant Ordering Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data Released: 2006-06-14 luny has reported some vulnerabilities in Fast Menu Restaurant Ordering, which can be exploited by malicious people to conduct cross-site scripting attacks and SQL injection attacks. Full Advisory: http://secunia.com/advisories/20581/ -- [SA20576] Adobe Reader Unspecified Vulnerabilities Critical: Moderately critical Where: From remote Impact: Unknown Released: 2006-06-15 Some vulnerabilities with unknown impacts have been reported in Adobe Reader. Full Advisory: http://secunia.com/advisories/20576/ -- [SA20547] i.List Cross-Site Scripting and Script Insertion Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-09 David 'Aesthetico' Vieira-Kurz has discovered some vulnerabilities in i.List, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks. Full Advisory: http://secunia.com/advisories/20547/ -- [SA20535] E-Dating System Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Exposure of system information, Exposure of sensitive information Released: 2006-06-09 luny has reported some vulnerabilities and a security issue in E-Dating System, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks, and disclose sensitive information. Full Advisory: http://secunia.com/advisories/20535/ -- [SA20534] CS-Forum Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data, Exposure of system information, Security Bypass Released: 2006-06-13 DarkFig has reported some vulnerabilities in CS-Forum, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks, and use it as an open mail relay. Full Advisory: http://secunia.com/advisories/20534/ -- [SA20529] Mafia Moblog "img" Parameter SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2006-06-09 Simo64 has discovered a vulnerability in Mafia Moblog, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/20529/ -- [SA20526] PBL Guestbook Script Insertion Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-09 luny has discovered some vulnerabilities in PBL Guestbook, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/20526/ -- [SA20523] NPDS Local File Inclusion and Cross-Site Scripting Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Exposure of system information, Exposure of sensitive information Released: 2006-06-09 DarkFig has discovered some vulnerabilities in NPDS, which can be exploited by malicious people to conduct cross-site scripting attacks and to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/20523/ -- [SA20521] KAPhotoservice Cross-Site Scripting and Script Insertion Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-09 r0t has reported some vulnerabilities in KAPhotoservice, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks. Full Advisory: http://secunia.com/advisories/20521/ -- [SA20623] iaxComm iaxclient Buffer Overflow Vulnerability Critical: Moderately critical Where: From local network Impact: DoS, System access Released: 2006-06-12 Two vulnerabilities have been reported in iaxComm, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20623/ -- [SA20567] Kiax iaxclient Buffer Overflow Vulnerability Critical: Moderately critical Where: From local network Impact: System access, DoS Released: 2006-06-12 Two vulnerabilities have been reported in Kiax, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20567/ -- [SA20560] IDE FISK iaxclient Buffer Overflow Vulnerability Critical: Moderately critical Where: From local network Impact: DoS, System access Released: 2006-06-12 Two vulnerabilities have been reported in IDE FISK (IDEFISK), which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/20560/ -- [SA20661] Horde Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-15 Some vulnerabilities have been reported in Horde, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20661/ -- [SA20652] 35mm Slide Gallery Multiple Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-15 black-code has reported some vulnerabilities in 35mm Slide Gallery, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20652/ -- [SA20640] Event Registration Multiple Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-14 luny has reported some vulnerabilities in Event Registration, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20640/ -- [SA20621] OkMall "search.php" Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-12 luny has reported some vulnerabilities in OkMall, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20621/ -- [SA20619] iFoto "file" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-12 luny has discovered a vulnerability in iFoto, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20619/ -- [SA20612] Mole Group Ticket Booking Script Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-13 luny has reported a vulnerability Mole Group Ticket Booking Script, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20612/ -- [SA20594] QuickLinks "q" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-12 luny has reported a vulnerability in QuickLinks, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20594/ -- [SA20593] OkArticles "q" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-12 luny has reported a vulnerability in OkArticles, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20593/ -- [SA20590] Ringlink "ringid" Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-12 luny has reported some vulnerabilities in Ringlink, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20590/ -- [SA20586] Realty Room Rent "sel_menu" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-14 luny has reported a vulnerability in Realty Room Rent, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20586/ -- [SA20585] ZMS "raw" Parameter Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-12 David "Aesthetico" Vieira-Kurz has discovered a vulnerability in ZMS, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20585/ -- [SA20584] Realty Home Rent "sel_menu" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-14 luny has reported a vulnerability in Realty Home Rent, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20584/ -- [SA20580] SubText MultiBlog Admin Logon Security Issue Critical: Less critical Where: From remote Impact: Security Bypass Released: 2006-06-12 A security issue has been reported in SubText, which can be exploited by malicious users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/20580/ -- [SA20577] Sylpheed URI Check Bypass Security Issue Critical: Less critical Where: From remote Impact: Security Bypass Released: 2006-06-12 A security issue has been reported in Sylpheed, which potentially can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/20577/ -- [SA20572] myPHP Guestbook "lang" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-13 x0r_1 has discovered a vulnerability in myPHP Guestbook, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20572/ -- [SA20565] Car Classifieds "make_id" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-14 luny has reported a vulnerability in Car Classifieds, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20565/ -- [SA20546] EvGenius Counter "page" Parameter Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-13 r0t has reported two vulnerabilities in EvGenius Counter, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20546/ -- [SA20540] Chemical Directory Search Functionality Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-09 luny has reported a vulnerability in Chemical Directory, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20540/ -- [SA20539] Easy Ad-Manager "mbid" Parameter Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-09 luny has reported a vulnerability in Easy Ad-Manager, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20539/ -- [SA20538] ViArt Shop Free Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-09 John Cobb has discovered two vulnerabilities in ViArt Shop Free, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20538/ -- [SA20533] vSCAL / vsREAL Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-09 luny has reported two vulnerabilities in vSCAL and vsREAL, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20533/ -- [SA20530] Ez Ringtone Manager Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-09 luny has reported two vulnerabilities in Ez Ringtone Manager, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20530/ -- [SA20528] IntegraMOD "STYLE_URL" Parameter Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-09 ahwaz has discovered a vulnerability in IntegraMOD, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/20528/ -- [SA20524] SHOUTcast Server DJ Script Insertion Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2006-06-09 UZUZZ has discovered some vulnerabilities in SHOUTcast, which can be exploited by malicious users to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/20524/ -- [SA20579] DB2 Universal Database Multiple Denial of Service Vulnerabilities Critical: Less critical Where: From local network Impact: DoS Released: 2006-06-14 Some vulnerabilities has been reported in DB2, which can be exploited by malicious people and users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/20579/ -- [SA20518] Sun Grid Engine CSP Mode Authentication Security Issue Critical: Less critical Where: Local system Impact: Security Bypass Released: 2006-06-08 A security issue has been reported in Sun Grid Engine, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/20518/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _________________________________ Attend the Black Hat Briefings and Training, Las Vegas July 29 - August 3 2,500+ international security experts from 40 nations, 10 tracks, no vendor pitches. www.blackhat.com
This archive was generated by hypermail 2.1.3 : Fri Jun 16 2006 - 02:03:01 PDT