[ISN] Secunia Weekly Summary - Issue: 2006-37

From: InfoSec News (alerts@private)
Date: Sun Sep 17 2006 - 22:28:35 PDT


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2006-09-08 - 2006-09-15                        

                       This week: 133 advisories                       

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Secunia Corporate Website has been Released

Learn more about what Secunia can offer you and your company, see and
download detailed product descriptions, and view comprehensive flash
presentations of both our products and corporate profile.

Visit the Secunia Corporate Website:
http://corporate.secunia.com/


Secunia Vulnerability and Advisory Portal has been Updated

Our publicly available Vulnerability and Advisory Portal
secunia.com has been updated with improved accessibility and usability,
enhanced features, and improved search capabilities along with
availability of extensive product reports.

Over the years, the Secunia brand has become synonymous with credible,
accurate, and reliable vulnerability intelligence and our services
are used by more than 5 million unique users every year at secunia.com.

Visit the Secunia Vulnerability and Advisory Portal:
http://secunia.com/

========================================================================
2) This Week in Brief:

A new vulnerability has been identified in Internet Explorer.

The vulnerability is in the daxctle.ocx ActiveX component and allows
malicious people to compromise a vulnerable system.

Secunia has successfully created an exploit which works on fully 
patched Windows XP SP2 systems. The exploit will not be released to
the public, only Secunia Exploit Code customers will have access to
the exploit.

http://corporate.secunia.com/security_vendors/46/

Additional details about the vulnerability can be found in the
referenced Secunia advisory below.

Reference:
http://secunia.com/SA21910

 --

VIRUS ALERTS:

During the past week Secunia collected 224 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA21735] Microsoft Word 2000 Unspecified Code Execution
              Vulnerability
2.  [SA21910] Internet Explorer daxctle.ocx "KeyFrame()" Method
              Vulnerability
3.  [SA21865] Adobe Flash Player Multiple Vulnerabilities
4.  [SA21893] Apple QuickTime Multiple Vulnerabilities
5.  [SA21906] Mozilla Firefox Multiple Vulnerabilities
6.  [SA21794] avast! LHA Archive Processing Buffer Overflow
              Vulnerability
7.  [SA21884] Symantec Products Alert Notification Two Vulnerabilities
8.  [SA21851] Microsoft Windows Pragmatic General Multicast Code 
              Execution
9.  [SA20153] Microsoft Word Malformed Object Pointer Vulnerability
10. [SA21795] Ipswitch IMail Server SMTP Service Buffer Overflow
              Vulnerability

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA21910] Internet Explorer daxctle.ocx "KeyFrame()" Method
Vulnerability
[SA21893] Apple QuickTime Multiple Vulnerabilities
[SA21863] Microsoft Publisher Font Parsing Buffer Overflow
Vulnerability
[SA21834] ICQ Pro 2003b "MCRegEx__Search" Buffer Overflow
Vulnerability
[SA21833] RaidenHTTPD "SoftParserFileXml" File Inclusion Vulnerability
[SA21918] TualBLOG "icerikno" Parameter SQL Injection Vulnerability
[SA21862] vCAP Multiple Vulnerabilities
[SA21851] Microsoft Windows Pragmatic General Multicast Code Execution
[SA21844] TFTP Server MT Absolute Path Construction Buffer Overflow
[SA21946] Snitz Forums 2000 "sortorder" Parameter Cross-Site Scripting
[SA21861] Microsoft Windows Indexing Service Cross-Site Scripting
[SA21846] OpenVPN OpenSSL RSA Signature Forgery
[SA21809] ICQ Toolbar RSS Feeds Script Insertion Vulnerabilities
[SA21884] Symantec Products Alert Notification Two Vulnerabilities
[SA21938] Symantec Norton Personal Firewall Denial of Service

UNIX/Linux:
[SA21950] rPath updates for firefox and thunderbird
[SA21949] Red Hat update for firefox
[SA21936] Gentoo update for dokuwiki
[SA21920] Shadowed Portal "root" File Inclusion Vulnerabilities
[SA21916] Red Hat update for thunderbird
[SA21915] Red Hat update for seamonkey
[SA21901] Red Hat update for flash-plugin
[SA21885] Red Hat update for wireshark
[SA21842] Mandriva update for php
[SA21813] Debian update for ethereal
[SA21934] Ubuntu update for kernel
[SA21926] Slackware update for bind
[SA21921] Gentoo update for ffmpeg
[SA21912] Gentoo update for bind
[SA21905] Debian update for isakmpd
[SA21880] Red Hat update for ncompress
[SA21879] Ubuntu update for mailman
[SA21872] iodine Unspecified Security Problems
[SA21869] Gentoo update for adplug
[SA21847] SUSE Update for Multiple Packages
[SA21838] rPath update for bind
[SA21835] OpenBSD update for BIND
[SA21832] SUSE update for ImageMagick
[SA21828] Debian update for bind9
[SA21818] Mandriva update for bind
[SA21816] Ubuntu update for bind9
[SA21942] Red Hat update for gnutls
[SA21937] GnuTLS RSA Signature Forgery Vulnerability
[SA21927] Slackware update for openssl
[SA21900] Red Hat update for XFree86
[SA21873] Debian update for openssl096
[SA21852] Debian update for openssl
[SA21848] SUSE update for apache2
[SA21837] rPath update for mailman
[SA21823] Gentoo update for openssl
[SA21820] Linux Kernel ULE Packet Handling Denial of Service
[SA21812] OpenBSD update for OpenSSL
[SA21924] Mandriva update for xorg-x11
[SA21908] Gentoo update for libXfont
[SA21904] rPath update for xorg-x11
[SA21894] Ubuntu updates for libxfont / xorg
[SA21890] XFree86 CID Encoded Fonts Integer Overflows
[SA21889] Red Hat update for xorg-x11
[SA21871] AlphaMail Password Disclosure Security Issue
[SA21864] X11 libXfont CID Encoded Fonts Integer Overflows
[SA21856] Unixware libX11 Buffer Overflow Vulnerability
[SA21845] X11 "_XKB_CHARSET" Buffer Overflow Vulnerability
[SA21815] Sun Solaris libX11 Buffer Overflow Vulnerability
[SA21919] Gentoo update for xine-lib
[SA21928] HP-UX X.25 Denial of Service Vulnerability
[SA21909] HP-UX ARPA Transport Software Denial of Service
[SA21867] Roxio Toast Titanium Insecure Temporary File Creation

Other:
[SA21876] NetPerformer Products Denial of Service Vulnerabilities
[SA21836] Avaya Products XFree86 Vulnerability
[SA21896] Cisco IOS VTP Multiple Vulnerabilities
[SA21930] Ingate Firewall and SIParator OpenSSL Vulnerability
[SA21870] Avaya Products OpenSSL Vulnerability
[SA21902] Cisco CatOS VTP Configuration Revision Handling
Vulnerability
[SA21898] Avaya PDS HP-UX LP Subsystem Denial of Service
[SA21925] Sun StorEdge 6130 Array Denial of Service Security Issue

Cross Platform:
[SA21948] Dokeos "extAuthSource['newUser']" File Inclusion
Vulnerability
[SA21943] Mambo Serverstat Component File Inclusion Vulnerability
[SA21940] Mozilla SeaMonkey Multiple Vulnerabilities
[SA21939] Mozilla Thunderbird Multiple Vulnerabilities
[SA21933] TeamCal "tc_config[app_root]" File Inclusion Vulnerability
[SA21931] Claroline "extAuthSource['newUser']" File Inclusion
Vulnerability
[SA21914] Downstat "art" File Inclusion Vulnerability
[SA21906] Mozilla Firefox Multiple Vulnerabilities
[SA21897] phpunity.postcard "gallery_path" Parameter File Inclusion
[SA21892] Quicksilver Forums "set[include_path]" File Inclusion
Vulnerability
[SA21891] p4CMS "abs_pfad" File Inclusion Vulnerability
[SA21887] Magic News Pro "script_path" File Inclusion Vulnerability
[SA21886] SQL-Ledger "terminal" Parameter Perl Code Execution
[SA21882] Vitrax Premodded "phpbb_root_path" File Inclusion
Vulnerability
[SA21878] signkorn Guestbook "dir_path" File Inclusion Vulnerability
[SA21874] OPENi-CMS "config[openi_dir]" Parameter File Inclusion
[SA21868] PayProCart Multiple File Inclusion Vulnerabilities
[SA21865] Adobe Flash Player Multiple Vulnerabilities
[SA21857] Socketwiz Bookmarks "root_dir" File Inclusion Vulnerability
[SA21855] Vivvo Article Management CMS SQL Injection and File
Inclusion
[SA21850] mcGalleryPRO "path_to_folder" File Inclusion Vulnerability
[SA21841] phpBB XS "phpbb_root_path" File Inclusion Vulnerability
[SA21826] Stefan E. Newsscript Multiple Vulnerabilities
[SA21825] Somery "skindir" File Inclusion Vulnerability
[SA21824] LedgerSMB "terminal" Parameter Perl Code Execution
[SA21819] DokuWiki "TARGET_FN" Directory Traversal Vulnerability
[SA21817] MyABraCaDaWeb "base" File Inclusion Vulnerabilities
[SA21922] NX5Linx Multiple Vulnerabilities
[SA21899] Moodle Multiple Vulnerabilities
[SA21881] webSPELL Authentication Bypass and SQL Injection
[SA21875] phpMyDirectory "letter" Cross-Site Scripting and SQL
Injection
[SA21866] ColdFusion Denial of Service and Sandbox Bypass
[SA21860] CMS.R Login SQL Injection Vulnerabilities
[SA21853] KorviBlog "livre_or.php" Script Insertion Vulnerabilities
[SA21849] PHProg Multiple Vulnerabilities
[SA21843] CCleague Pro "language" Parameter Local File Inclusion
[SA21840] XSP Directory Traversal Vulnerability
[SA21831] Timesheet PHP "username" Parameter SQL Injection
[SA21830] PHP-Fusion "maincore.php" SQL Injection Vulnerability
[SA21829] TWiki "filename" Parameter Disclosure of Sensitive
Information
[SA21822] ccHost File ID SQL Injection Vulnerability
[SA21814] Runcms SQL Injection Vulnerabilities
[SA21811] Drupal Pubcookie Module Login Security Bypass
[SA21808] BLOG:CMS SQL Injection Vulnerabilities
[SA21917] HP OpenView Operations Apache Chunked Encoding Vulnerability
[SA21935] Blojsom Multiple Script Insertion Vulnerabilities
[SA21913] Nuked-Klan Cross-Site Scripting and Cross-Site Request
Forgery
[SA21907] Drupal Userreview Module Cross-Site Scripting Vulnerability
[SA21903] Network Security Services (NSS) Signature Forgery
Vulnerability
[SA21895] PHP Event Calendar Add Event Script Insertion
Vulnerabilities
[SA21883] emuCMS "query" and "page" Cross-Site Scripting
Vulnerabilities
[SA21877] XHP CMS "errcode" Cross-Site Scripting Vulnerability
[SA21858] ColdFusion Error Page Cross-Site Scripting Vulnerability
[SA21839] Firefox Sage Extension RSS Feed Script Insertion
Vulnerability
[SA21821] MKPortal "index.php" Cross-Site Scripting Vulnerability
[SA21810] ackerTodo "task_id" Cross-Site Scripting Vulnerability
[SA21888] Novell Identity Manager Shell Scripts Command Injection
[SA21827] IBM Director OpenSSL Potential SSL 2.0 Rollback
Vulnerability

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA21910] Internet Explorer daxctle.ocx "KeyFrame()" Method
Vulnerability

Critical:    Extremely critical
Where:       From remote
Impact:      System access
Released:    2006-09-14

nop has discovered a vulnerability in Internet Explorer, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21910/

 --

[SA21893] Apple QuickTime Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-13

Multiple vulnerabilities have been reported in Apple QuickTime, which
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21893/

 --

[SA21863] Microsoft Publisher Font Parsing Buffer Overflow
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-12

Stuart Pearson has reported a vulnerability in Microsoft Publisher,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/21863/

 --

[SA21834] ICQ Pro 2003b "MCRegEx__Search" Buffer Overflow
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-08

Core Security Technologies has reported a vulnerability in ICQ Pro
2003b, which can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/21834/

 --

[SA21833] RaidenHTTPD "SoftParserFileXml" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-11

rgod has discovered a vulnerability in RaidenHTTPD, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21833/

 --

[SA21918] TualBLOG "icerikno" Parameter SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-09-14

Dj ReMix has discovered a vulnerability in TualBLOG, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/21918/

 --

[SA21862] vCAP Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of system information,
Exposure of sensitive information, DoS
Released:    2006-09-12

Some vulnerabilities have been discovered in vCAP, which can be
exploited by malicious people to disclose sensitive information,
conduct cross-site scripting attacks, or cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/21862/

 --

[SA21851] Microsoft Windows Pragmatic General Multicast Code Execution

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2006-09-12

A vulnerability has been reported in Microsoft Windows XP, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21851/

 --

[SA21844] TFTP Server MT Absolute Path Construction Buffer Overflow

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2006-09-12

n00b has discovered a vulnerability in TFTP Server MT, which
potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/21844/

 --

[SA21946] Snitz Forums 2000 "sortorder" Parameter Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-15

ajann has reported a vulnerability in Snitz Forums 2000, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/21946/

 --

[SA21861] Microsoft Windows Indexing Service Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-12

A vulnerability has been reported in Microsoft Windows, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/21861/

 --

[SA21846] OpenVPN OpenSSL RSA Signature Forgery

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-09-12

A vulnerability has been reported in OpenVPN, which potentially can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/21846/

 --

[SA21809] ICQ Toolbar RSS Feeds Script Insertion Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-08

Core Security Technologies has discovered two vulnerabilities in ICQ
Toolbar, which can be exploited by malicious people to conduct script
insertion attacks.

Full Advisory:
http://secunia.com/advisories/21809/

 --

[SA21884] Symantec Products Alert Notification Two Vulnerabilities

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation, DoS
Released:    2006-09-14

Some vulnerabilities have been reported in Symantec Client Security and
Symantec AntiVirus Corporate Edition, which can be exploited by
malicious, local users to cause a DoS (Denial of Service) or gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/21884/

 --

[SA21938] Symantec Norton Personal Firewall Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-09-15

David Matousek has discovered a vulnerability in Symantec Norton
Personal Firewall, which can be exploited by malicious, local users to
cause a Denial of Service.

Full Advisory:
http://secunia.com/advisories/21938/


UNIX/Linux:--

[SA21950] rPath updates for firefox and thunderbird

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Spoofing, DoS,
System access
Released:    2006-09-15

rPath has issued updates for firefox and thunderbird. These fix some
vulnerabilities, which can be exploited by malicious people to conduct
man-in-the-middle, spoofing, and cross-site scripting attacks, and
potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21950/

 --

[SA21949] Red Hat update for firefox

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Spoofing, DoS,
System access
Released:    2006-09-15

Red Hat has issued an update for firefox. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
man-in-the-middle, spoofing, and cross-site scripting attacks, and
potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21949/

 --

[SA21936] Gentoo update for dokuwiki

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-15

Gentoo has issued an update for dokuwiki. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/21936/

 --

[SA21920] Shadowed Portal "root" File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-15

mad_hacker has discovered some vulnerabilities in Shadowed Portal,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/21920/

 --

[SA21916] Red Hat update for thunderbird

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2006-09-15

Red Hat has issued an update for thunderbird. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
man-in-the-middle attacks, bypass certain security restrictions, and
potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21916/

 --

[SA21915] Red Hat update for seamonkey

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Spoofing, DoS, System access
Released:    2006-09-15

Red Hat has issued an update for seamonkey. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
spoofing attacks, bypass certain security restrictions, and potentially
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21915/

 --

[SA21901] Red Hat update for flash-plugin

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, DoS, System access
Released:    2006-09-13

Red Hat has issued an update for flash-plugin. This fixes some
vulnerabilities, which can be exploited by malicious people to bypass
certain security restrictions and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/21901/

 --

[SA21885] Red Hat update for wireshark

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-09-13

Red Hat has issued an update for wireshark. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/21885/

 --

[SA21842] Mandriva update for php

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, System access
Released:    2006-09-11

Mandriva has issued an update for php. This fixes some vulnerabilities,
which can be exploited by malicious, local users to bypass certain
security restrictions, or by malicious people to potentially compromise
a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21842/

 --

[SA21813] Debian update for ethereal

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-09-08

Debian has issued an update for ethereal. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21813/

 --

[SA21934] Ubuntu update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, Privilege escalation, DoS
Released:    2006-09-15

Ubuntu has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
disclose potentially sensitive information, cause a DoS (Denial of
Service), and to gain escalated privileges, and by malicious users and
malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/21934/

 --

[SA21926] Slackware update for bind

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-09-15

Slackware has issued an update for bind. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/21926/

 --

[SA21921] Gentoo update for ffmpeg

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-09-14

Gentoo has issued an update for ffmpeg. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21921/

 --

[SA21912] Gentoo update for bind

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-09-15

Gentoo has issued an update for bind. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/21912/

 --

[SA21905] Debian update for isakmpd

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-09-14

Debian has issued an update for isakmpd. This fixes a vulnerability,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/21905/

 --

[SA21880] Red Hat update for ncompress

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-09-13

Red Hat has issued an update for ncompress. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21880/

 --

[SA21879] Ubuntu update for mailman

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Spoofing, DoS
Released:    2006-09-13

Ubuntu has issued an update for mailman. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting and phishing attacks, and cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/21879/

 --

[SA21872] iodine Unspecified Security Problems

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown
Released:    2006-09-14

Some potential security problems with unknown impacts have been
reported in iodine.

Full Advisory:
http://secunia.com/advisories/21872/

 --

[SA21869] Gentoo update for adplug

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-09-13

Gentoo has issued an update for adplug. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise applications using
the library.

Full Advisory:
http://secunia.com/advisories/21869/

 --

[SA21847] SUSE Update for Multiple Packages

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, Privilege escalation
Released:    2006-09-11

SUSE has issued an update for multiple packages. These fix some
vulnerabilities, which can be exploited by malicious, local users to
perform certain actions with escalated privileges or by malicious
people to disclose potentially sensitive information.

Full Advisory:
http://secunia.com/advisories/21847/

 --

[SA21838] rPath update for bind

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-09-11

rPath has issued an update for bind. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/21838/

 --

[SA21835] OpenBSD update for BIND

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-09-11

OpenBSD has issued an update for BIND. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/21835/

 --

[SA21832] SUSE update for ImageMagick

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-09-11

SUSE has issued an update for ImageMagick. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21832/

 --

[SA21828] Debian update for bind9

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-09-11

Debian has issued an update for bind9. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/21828/

 --

[SA21818] Mandriva update for bind

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-09-11

Mandriva has issued an update for bind. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/21818/

 --

[SA21816] Ubuntu update for bind9

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-09-08

Ubuntu has issued an update for bind9. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/21816/

 --

[SA21942] Red Hat update for gnutls

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-09-15

Red Hat has issued an update for gnutls. This fixes a vulnerability,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/21942/

 --

[SA21937] GnuTLS RSA Signature Forgery Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-09-15

A vulnerability has been reported in GnuTLS, which can be exploited by
malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/21937/

 --

[SA21927] Slackware update for openssl

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-09-15

Slackware has issued an update for openssl. This fixes a vulnerability,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/21927/

 --

[SA21900] Red Hat update for XFree86

Critical:    Less critical
Where:       From remote
Impact:      Privilege escalation
Released:    2006-09-13

Red Hat has issued an update for XFree86. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/21900/

 --

[SA21873] Debian update for openssl096

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-09-12

Debian has issued an update for openssl096. This fixes a vulnerability,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/21873/

 --

[SA21852] Debian update for openssl

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-09-11

Debian has issued an update for openssl. This fixes a vulnerability,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/21852/

 --

[SA21848] SUSE update for apache2

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-11

SUSE has issued an update for apache2. This fixes a vulnerability,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/21848/

 --

[SA21837] rPath update for mailman

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting, Spoofing
Released:    2006-09-11

rPath has issued an update for mailman. This fixes a vulnerability,
which can be exploited by malicious people to conduct cross-site
scripting and phishing attacks.

Full Advisory:
http://secunia.com/advisories/21837/

 --

[SA21823] Gentoo update for openssl

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-09-08

Gentoo has issued an update for openssl. This fixes a vulnerability,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/21823/

 --

[SA21820] Linux Kernel ULE Packet Handling Denial of Service

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2006-09-11

Ang Way Chuang has reported a vulnerability in Linux Kernel, which can
be exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/21820/

 --

[SA21812] OpenBSD update for OpenSSL

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-09-11

OpenBSD has issued an update for OpenSSL. This fixes a vulnerability,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/21812/

 --

[SA21924] Mandriva update for xorg-x11

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-09-15

Mandriva has issued an update for xorg-x11. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/21924/

 --

[SA21908] Gentoo update for libXfont

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-09-14

Gentoo has issued an update for libXfont. This fixes a vulnerability,
which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/21908/

 --

[SA21904] rPath update for xorg-x11

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-09-13

rPath has issued an update for xorg-x11. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/21904/

 --

[SA21894] Ubuntu updates for libxfont / xorg

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-09-13

Ubuntu has issued updates for libxfont / xorg. These fix some
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/21894/

 --

[SA21890] XFree86 CID Encoded Fonts Integer Overflows

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-09-13

Some vulnerabilities have been reported in XFree86, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/21890/

 --

[SA21889] Red Hat update for xorg-x11

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-09-13

Red Hat has issued an update for xorg-x11. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/21889/

 --

[SA21871] AlphaMail Password Disclosure Security Issue

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2006-09-13

A security issue has been reported in AlphaMail, which can be exploited
by malicious, local users to disclose certain sensitive information.

Full Advisory:
http://secunia.com/advisories/21871/

 --

[SA21864] X11 libXfont CID Encoded Fonts Integer Overflows

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-09-13

Some vulnerabilities have been reported in libXfont, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/21864/

 --

[SA21856] Unixware libX11 Buffer Overflow Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-09-11

RISE Security has reported a vulnerability in libX11 included in
Unixware, which can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/21856/

 --

[SA21845] X11 "_XKB_CHARSET" Buffer Overflow Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-09-11

RISE Security has reported a vulnerability in libX11, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/21845/

 --

[SA21815] Sun Solaris libX11 Buffer Overflow Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-09-08

A vulnerability has been reported in Sun Solaris, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/21815/

 --

[SA21919] Gentoo update for xine-lib

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2006-09-14

Gentoo has issued an update for xine-lib. This fixes a weakness, which
can be exploited by malicious people to crash certain applications on a
user's system.

Full Advisory:
http://secunia.com/advisories/21919/

 --

[SA21928] HP-UX X.25 Denial of Service Vulnerability

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-09-15

A vulnerability has been reported in HP-UX, which can be exploited by
malicious, local users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/21928/

 --

[SA21909] HP-UX ARPA Transport Software Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-09-14

A vulnerability has been reported in HP-UX, which potentially can be
exploited by a malicious, local user to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/21909/

 --

[SA21867] Roxio Toast Titanium Insecure Temporary File Creation

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-09-14

Netragard has reported a vulnerability in Roxio Toast Titanium, which
can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/21867/


Other:--

[SA21876] NetPerformer Products Denial of Service Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-09-14

Arif Jatmoko has reported two vulnerabilities in various NetPerformer
products, which can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/21876/

 --

[SA21836] Avaya Products XFree86 Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-09-12

Avaya has acknowledged a vulnerability in XFree86 included in various
Avaya products, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/21836/

 --

[SA21896] Cisco IOS VTP Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      Manipulation of data, DoS, System access
Released:    2006-09-14

FX has reported some vulnerabilities in Cisco IOS, which can be
exploited by malicious people to cause a DoS (Denial of Service) and
potentially to compromise a vulnerable network device.

Full Advisory:
http://secunia.com/advisories/21896/

 --

[SA21930] Ingate Firewall and SIParator OpenSSL Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-09-15

Ingate has acknowledged a vulnerability in their Ingate Firewall and
SIParator products, which can be exploited by malicious people to
bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/21930/

 --

[SA21870] Avaya Products OpenSSL Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-09-12

Avaya has acknowledged a vulnerability in OpenSSL included in various
Avaya products, which potentially can be exploited by malicious people
to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/21870/

 --

[SA21902] Cisco CatOS VTP Configuration Revision Handling
Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      Manipulation of data, DoS
Released:    2006-09-14

FX has reported a vulnerability in Cisco CatOS, which can be exploited
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/21902/

 --

[SA21898] Avaya PDS HP-UX LP Subsystem Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2006-09-13

Avaya has acknowledged a vulnerability in Avaya Predictive Dialing
System (PDS), which potentially can be exploited by malicious users to
cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/21898/

 --

[SA21925] Sun StorEdge 6130 Array Denial of Service Security Issue

Critical:    Not critical
Where:       From local network
Impact:      DoS
Released:    2006-09-15

A security issue has been reported in Sun StorEdge 6130 Array, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/21925/


Cross Platform:--

[SA21948] Dokeos "extAuthSource['newUser']" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-15

James Bercegay has reported a vulnerability in Dokeos, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21948/

 --

[SA21943] Mambo Serverstat Component File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-15

xoron has discovered a vulnerability in the Serverstat component for
Mambo, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/21943/

 --

[SA21940] Mozilla SeaMonkey Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Spoofing, DoS, System access
Released:    2006-09-15

Some vulnerabilities have been reported in Mozilla SeaMonkey, which can
be exploited by malicious people to conduct spoofing attacks, bypass
certain security restrictions, and potentially compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/21940/

 --

[SA21939] Mozilla Thunderbird Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, DoS, System access
Released:    2006-09-15

Some vulnerabilities have been reported in Mozilla Thunderbird, which
can be exploited by malicious people to conduct man-in-the-middle
attacks, bypass certain security restrictions, and potentially
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21939/

 --

[SA21933] TeamCal "tc_config[app_root]" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-15

PSYCH@ has reported a vulnerability in TeamCal Pro, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21933/

 --

[SA21931] Claroline "extAuthSource['newUser']" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-15

James Bercegay has reported a vulnerability in Caroline, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21931/

 --

[SA21914] Downstat "art" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-14

sZ has discovered some vulnerabilities in Downstat, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21914/

 --

[SA21906] Mozilla Firefox Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Spoofing, DoS,
System access
Released:    2006-09-15

Some vulnerabilities have been reported in Mozilla Firefox, which can
be exploited by malicious people to conduct man-in-the-middle,
spoofing, and cross-site scripting attacks, and potentially compromise
a user's system.

Full Advisory:
http://secunia.com/advisories/21906/

 --

[SA21897] phpunity.postcard "gallery_path" Parameter File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-14

Rivertam has discovered a vulnerability in phpunity.postcard, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21897/

 --

[SA21892] Quicksilver Forums "set[include_path]" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-14

mdx has reported a vulnerability in Quicksilver Forums, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21892/

 --

[SA21891] p4CMS "abs_pfad" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-13

SHiKaA has reported a vulnerability in p4CMS, which can be exploited by
malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21891/

 --

[SA21887] Magic News Pro "script_path" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-14

A vulnerability has been reported in Magic News Pro, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21887/

 --

[SA21886] SQL-Ledger "terminal" Parameter Perl Code Execution

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-12

A vulnerability has been reported in SQL-Ledger, which potentially can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21886/

 --

[SA21882] Vitrax Premodded "phpbb_root_path" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-13

CeNGiZ-HaN has reported a vulnerability in Vitrax Premodded, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21882/

 --

[SA21878] signkorn Guestbook "dir_path" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-13

SHiKaA has reported a vulnerability in signkorn Guestbook, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21878/

 --

[SA21874] OPENi-CMS "config[openi_dir]" Parameter File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-12

basher13 has discovered a vulnerability in OPENi-CMS, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21874/

 --

[SA21868] PayProCart Multiple File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-12

Eddy_BAck0o has reported some vulnerabilities in PayProCart, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21868/

 --

[SA21865] Adobe Flash Player Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, System access
Released:    2006-09-12

Multiple vulnerabilities have been reported in Adobe Flash Player,
which can be exploited by malicious people to bypass certain security
restrictions or compromise a user's system.

Full Advisory:
http://secunia.com/advisories/21865/

 --

[SA21857] Socketwiz Bookmarks "root_dir" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-11

Kacper has reported a vulnerability in Socketwiz Bookmarks, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21857/

 --

[SA21855] Vivvo Article Management CMS SQL Injection and File
Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      Manipulation of data, System access
Released:    2006-09-11

MercilessTurk has reported some vulnerabilities in Vivvo Article
Management CMS, which can be exploited by malicious people to conduct
SQL injection attacks and to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21855/

 --

[SA21850] mcGalleryPRO "path_to_folder" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-11

Solpot has reported a vulnerability in mcGalleryPRO, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21850/

 --

[SA21841] phpBB XS "phpbb_root_path" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-12

AzzCoder has discovered a vulnerability in phpBB XS, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21841/

 --

[SA21826] Stefan E. Newsscript Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Manipulation of data, Exposure of system information,
Exposure of sensitive information, System access
Released:    2006-09-12

Some vulnerabilities have been reported in Stefan E. Newsscript, which
can be exploited by malicious people to disclose potentially sensitive
information or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21826/

 --

[SA21825] Somery "skindir" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-08

basher13 has reported a vulnerability in Somery, which can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21825/

 --

[SA21824] LedgerSMB "terminal" Parameter Perl Code Execution

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-12

A vulnerability has been reported in LedgerSMB, which potentially can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21824/

 --

[SA21819] DokuWiki "TARGET_FN" Directory Traversal Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-08

rgod has discovered a vulnerability in DokuWiki, which can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21819/

 --

[SA21817] MyABraCaDaWeb "base" File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-09-11

ERNE has reported some vulnerabilities in MyABraCaDaWeb, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21817/

 --

[SA21922] NX5Linx Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Spoofing, Manipulation of data, Exposure of system
information, Exposure of sensitive information
Released:    2006-09-15

Aliaksandr Hartsuyeu has reported some vulnerabilities within NX5Linx,
which can be exploited by malicious people to disclose potentially
sensitive information or conduct SQL injection and HTTP
response-splitting attacks.

Full Advisory:
http://secunia.com/advisories/21922/

 --

[SA21899] Moodle Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
sensitive information
Released:    2006-09-13

Some vulnerabilities have been reported in Moodle, which can be
exploited by malicious people to disclose potentially sensitive
information, and conduct cross-site scripting and SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/21899/

 --

[SA21881] webSPELL Authentication Bypass and SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data, Exposure of
sensitive information
Released:    2006-09-13

Some vulnerabilities have been discovered in webSPELL, which can be
exploited to by malicious people to disclose certain sensitive
information and conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/21881/

 --

[SA21875] phpMyDirectory "letter" Cross-Site Scripting and SQL
Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2006-09-12

eric basher has reported some vulnerabilities in phpMyDirectory, which
can be exploited by malicious people to conduct SQL injection or
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/21875/

 --

[SA21866] ColdFusion Denial of Service and Sandbox Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, DoS
Released:    2006-09-13

Two vulnerabilities have been reported in ColdFusion, which can be
exploited by malicious, local users to bypass certain security
restrictions and by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/21866/

 --

[SA21860] CMS.R Login SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2006-09-12

HACKERS PAL has discovered two vulnerabilities in CMS.R, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/21860/

 --

[SA21853] KorviBlog "livre_or.php" Script Insertion Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-11

cdg393 has discovered some vulnerabilities in KorviBlog, which can be
exploited by malicious people to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/21853/

 --

[SA21849] PHProg Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2006-09-11

cdg393 has discovered some vulnerabilities in PHProg, which can be
exploited by malicious people to conduct cross-site scripting attacks,
disclose potentially sensitive information, and potentially compromise
a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21849/

 --

[SA21843] CCleague Pro "language" Parameter Local File Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, System access
Released:    2006-09-11

Kacper has discovered a vulnerability in CCleague Pro, which can be
exploited by malicious people to disclose sensitive information and
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/21843/

 --

[SA21840] XSP Directory Traversal Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2006-09-11

A vulnerability has been reported in XSP, which can be exploited by
malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/21840/

 --

[SA21831] Timesheet PHP "username" Parameter SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-09-11

Secaware Research has discovered a vulnerability in Timesheet PHP,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/21831/

 --

[SA21830] PHP-Fusion "maincore.php" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-09-08

A vulnerability has been reported in PHP-Fusion, which can be exploited
by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/21830/

 --

[SA21829] TWiki "filename" Parameter Disclosure of Sensitive
Information

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-09-08

A vulnerability has been reported in TWiki, which can be exploited by
malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/21829/

 --

[SA21822] ccHost File ID SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-09-12

A vulnerability has been reported in ccHost, which can be exploited by
malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/21822/

 --

[SA21814] Runcms SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-09-08

Omid has reported some vulnerabilities in Runcms, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/21814/

 --

[SA21811] Drupal Pubcookie Module Login Security Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-09-08

A vulnerability has been reported in the Pubcookie module for Drupal,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/21811/

 --

[SA21808] BLOG:CMS SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-09-08

Omid has discovered some vulnerabilities in BLOG:CMS, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/21808/

 --

[SA21917] HP OpenView Operations Apache Chunked Encoding Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2006-09-14

HP has acknowledged a vulnerability in HP OpenView Operations and HP
OpenView Operations for Windows, which can be exploited by malicious
people to cause a DoS (Denial of Service) and potentially compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/21917/

 --

[SA21935] Blojsom Multiple Script Insertion Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-15

Avinash Shenoi has discovered some vulnerabilities in Blojsom, which
can be exploited by malicious users to conduct script insertion
attacks.

Full Advisory:
http://secunia.com/advisories/21935/

 --

[SA21913] Nuked-Klan Cross-Site Scripting and Cross-Site Request
Forgery

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2006-09-15

Blwood has discovered two vulnerabilities in Nuked-Klan, which can be
exploited by malicious people to conduct cross-site scripting and
cross-site request forgery attacks.

Full Advisory:
http://secunia.com/advisories/21913/

 --

[SA21907] Drupal Userreview Module Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-14

A vulnerability has been reported in the Userreview module for Drupal,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/21907/

 --

[SA21903] Network Security Services (NSS) Signature Forgery
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-09-15

A vulnerability has been reported in Network Security Services (NSS),
which potentially can be exploited by malicious people to bypass
certain security restrictions.

Full Advisory:
http://secunia.com/advisories/21903/

 --

[SA21895] PHP Event Calendar Add Event Script Insertion
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-13

NR Nandini has reported some vulnerabilities in PHP Event Calendar,
which can be exploited by certain malicious users to conduct script
insertion attacks.

Full Advisory:
http://secunia.com/advisories/21895/

 --

[SA21883] emuCMS "query" and "page" Cross-Site Scripting
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-14

Ivan Markovic has discovered some vulnerabilities in emuCMS, which can
be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/21883/

 --

[SA21877] XHP CMS "errcode" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-12

HACKERS PAL has discovered a vulnerability in XHP CMS, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/21877/

 --

[SA21858] ColdFusion Error Page Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-13

A vulnerability has been reported in ColdFusion, which can be exploited
by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/21858/

 --

[SA21839] Firefox Sage Extension RSS Feed Script Insertion
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-11

pdp has discovered a vulnerability in the Sage extension for Firefox,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/21839/

 --

[SA21821] MKPortal "index.php" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-08

Crack_man has discovered a vulnerability in MKPortal, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/21821/

 --

[SA21810] ackerTodo "task_id" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-09-08

viz.security has reported a vulnerability in ackerTodo, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/21810/

 --

[SA21888] Novell Identity Manager Shell Scripts Command Injection

Critical:    Less critical
Where:       From local network
Impact:      System access
Released:    2006-09-14

A vulnerability has been reported in Novell Identity Manager, which can
be exploited by certain malicious users to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/21888/

 --

[SA21827] IBM Director OpenSSL Potential SSL 2.0 Rollback
Vulnerability

Critical:    Not critical
Where:       From local network
Impact:      Security Bypass
Released:    2006-09-08

IBM has acknowledged a vulnerability in IBM Director, which potentially
can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/21827/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45



_________________________________
HITBSecConf2006 - Malaysia 
The largest network security event in Asia 
32 internationally renowned speakers 
7 tracks of hands-on technical training sessions. 
Register now: http://conference.hitb.org/hitbsecconf2006kl/



This archive was generated by hypermail 2.1.3 : Sun Sep 17 2006 - 22:42:22 PDT