[ISN] Secunia Weekly Summary - Issue: 2006-43

From: InfoSec News (alerts@private)
Date: Fri Oct 27 2006 - 00:05:35 PDT


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2006-10-19 - 2006-10-26                        

                       This week: 69 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

To improve our services to our customers, we have made a number of
additions to the Secunia Advisories and have started translating the
advisories to German.

The improvements will help our customers to get a better understanding
of how we reached our conclusions, how it was rated, our thoughts on
exploitation, attack vectors, and scenarios.

This includes:
* Reason for rating
* Extended description
* Extended solution
* Exploit code or links to exploit code
* Deep links

Read the full description:
http://corporate.secunia.com/products/48/?r=s

========================================================================
2) This Week in Brief:

Yesterday, another issue was reported in Internet Explorer 7, which can
be exploited by a malicious website to spoof the address bar of
popup-windows.

Secunia has constructed a demonstration, which is available at:
http://secunia.com/internet_explorer_7_popup_address_bar_spoofing_test/

For additional information please see the referenced Secunia advisory.

Reference:
http://secunia.com/SA22542

 --
 
Two vulnerabilities have been reported in Winamp, which can be
exploited by malicious people to compromise a user's system.

The vendor has issued an updated version.

Reference:
http://secunia.com/SA22580

 --

VIRUS ALERTS:

During the past week Secunia collected 200 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA22477] Internet Explorer 7 "mhtml:" Redirection Information
              Disclosure
2.  [SA19738] Internet Explorer "mhtml:" Redirection Disclosure of
              Sensitive Information
3.  [SA22542] Internet Explorer 7 Popup Address Bar Spoofing Weakness
4.  [SA21906] Mozilla Firefox Multiple Vulnerabilities
5.  [SA22218] Opera Web Browser URL Handling Buffer Overflow
              Vulnerability
6.  [SA20153] Microsoft Word Malformed Object Pointer Vulnerability
7.  [SA22396] Oracle Products Multiple Vulnerabilities
8.  [SA12580] Mozilla / Mozilla Firefox Cross-Domain Cookie Injection
              Vulnerability
9.  [SA20442] Firefox File Upload Form Keystroke Event Cancel
              Vulnerability
10. [SA12403] Mozilla / Mozilla Firefox Apple Java Plugin Tab
              Spoofing Vulnerability

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA22580] Winamp Lyrics3 and Ultravox Processing Buffer Overflows
[SA22567] AOL YGPPDownload ActiveX Control Buffer Overflows
[SA22563] QK SMTP Server "RCPT TO:" Buffer Overflow Vulnerability
[SA22559] RevilloC MailServer "RCPT TO:" Buffer Overflow Vulnerability
[SA22571] Zwahlen Online Shop Cross-Site Scripting Vulnerabilities
[SA22542] Internet Explorer 7 Popup Address Bar Spoofing Weakness
[SA22540] FtpXQ Server "MKD" Denial of Service Vulnerability
[SA22536] Symantec Products SAVRT.SYS Device Driver Privilege
Escalation
[SA22510] Yahoo! Messenger Conference Invite Denial of Service

UNIX/Linux:
[SA22556] Debian update for webmin
[SA22551] Gentoo update for clamav
[SA22549] Gentoo update for mod_tcl
[SA22544] Gentoo update for openssl
[SA22538] Avaya Products PHP Multiple Vulnerabilites
[SA22537] Debian update for clamav
[SA22517] Gentoo update for libmusicbrainz
[SA22509] SUSE update for opera
[SA22589] Slackware update for Qt
[SA22581] Avaya CMS Sun Solaris IPv6 Denial of Service
[SA22579] Mandriva update for Qt
[SA22575] Sun Java System Messaging Server Webmail Script Insertion
[SA22574] Cisco Security Agent for Linux Port Scan Denial of Service
[SA22572] ImageMagick PALM and DCM Buffer Overflows
[SA22569] GraphicsMagick PALM and DCM Buffer Overflows
[SA22545] Blue Coat Products RSA Signature Vulnerability
[SA22533] Avaya Products PHP "_ecalloc" Integer Overflow Vulnerability
[SA22531] Debian update for python2.3
[SA22520] Ubuntu update for Qt
[SA22512] Debian update for python2.4
[SA22518] Debian update for maxdb-7.5.00
[SA22583] GNU Screen UTF-8 Character Handling Vulnerabilities
[SA22515] Gentoo update for cscope
[SA22560] Avaya Products XFree86 Integer Overflow Vulnerabilities
[SA22528] HP Tru64 Unix dtmail Privilege Escalation Vulnerability
[SA22584] Ubuntu update for postgresql
[SA22562] PostgreSQL Denial of Service Vulnerabilities
[SA22587] Avaya CMS / IR Sun Solaris "syslog" Denial of Service
[SA22543] FreeBSD "/dev/crypto" Local Denial of Service Vulnerability

Other:
[SA22523] IBM HMC Apache2 / OpenSSL Vulnerabilities
[SA22524] D-Link DSL-G624T Directory Traversal and Cross-Site
Scripting

Cross Platform:
[SA22577] OTSCMS "OTCMS.php" File Inclusion Vulnerability
[SA22565] UeberProject Management System "cfg[homepath]" File Inclusion
Vulnerability
[SA22554] Ascended Guestbook "CONFIG[path]" File Inclusion
Vulnerability
[SA22552] Imageview "user_settings" File Inclusion Vulnerability
[SA22548] OTSCMS "OTCMS.php" File Inclusion Vulnerability
[SA22547] Wiclear "path" File Inclusion Vulnerabilities
[SA22546] Der Dirigent "cfg_dedi[dedi_path]" File Inclusion
Vulnerabilities
[SA22527] castor "rootpath" File Inclusion Vulnerabilities
[SA22525] Trawler Web CMS Multiple File Inclusion Vulnerabilities
[SA22522] Net_DNS "phpdns_basedir" File Inclusion Vulnerability
[SA22521] Mambo MambWeather Module "mosConfig_absolute_path" File
Inclusion
[SA22516] Virtual Law Office "phpc_root_path" File Inclusion
Vulnerabilities
[SA22508] EPNadmin "language" File Inclusion Vulnerability
[SA22505] pandaBB displayCategory.php File Inclusion Vulnerabilities
[SA22503] Open Meetings Filing Application "PROJECT_ROOT" File
Inclusion
[SA22530] 2BGal "path" Local File Inclusion Vulnerabilities
[SA22529] phpPgAds "lib-history.php.inc" Cross-Site Scripting and
Script Insertion
[SA22526] phpAdsNew "lib-history.inc.php" Cross-Site Scripting and
Script Insertion
[SA22514] Segue CMS SQL Injection Vulnerabilities
[SA22511] PHP-Nuke "eid" SQL Injection Vulnerability
[SA22504] PH Pexplorer "Language" File Inclusion Vulnerability
[SA22502] GeoNetwork opensource SQL Injection Vulnerability
[SA22519] Novell eDirectory iMonitor HTTP Protocol Stack Buffer
Overflow
[SA22506] Novell eDirectory Multiple Vulnerabilities
[SA22564] MAXdev MD-Pro Cross-Site Scripting and HTTP Response
Splitting
[SA22558] WikiNi "name" and "email" Cross-Site Scripting
Vulnerabilities
[SA22555] cPanel Multiple Cross-Site Scripting Vulnerabilities
[SA22535] Simpnews Cross-Site Scripting Vulnerabilities
[SA22532] ProgSys URL Cross-Site Scripting Vulnerability

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA22580] Winamp Lyrics3 and Ultravox Processing Buffer Overflows

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-25

Two vulnerabilities have been reported in Winamp, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/22580/

 --

[SA22567] AOL YGPPDownload ActiveX Control Buffer Overflows

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-26

Two vulnerabilities have been reported in AOL, which can be exploited
by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/22567/

 --

[SA22563] QK SMTP Server "RCPT TO:" Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-24

Greg Linares has discovered a vulnerability in QK SMTP Server, which
potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/22563/

 --

[SA22559] RevilloC MailServer "RCPT TO:" Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-25

Greg Linares has discovered a vulnerability in RevilloC MailServer,
which potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/22559/

 --

[SA22571] Zwahlen Online Shop Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-10-24

MC Iglo has reported some vulnerabilities in Zwahlen Online Shop, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/22571/

 --

[SA22542] Internet Explorer 7 Popup Address Bar Spoofing Weakness

Critical:    Less critical
Where:       From remote
Impact:      Spoofing
Released:    2006-10-25

A weakness has been discovered in Internet Explorer, which can be
exploited by malicious people to conduct phishing attacks.

Full Advisory:
http://secunia.com/advisories/22542/

 --

[SA22540] FtpXQ Server "MKD" Denial of Service Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2006-10-25

Greg Linares has discovered a vulnerability in FTPXQ Server, which can
be exploited by malicious users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22540/

 --

[SA22536] Symantec Products SAVRT.SYS Device Driver Privilege
Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-10-24

A vulnerability has been reported in various Symantec products, which
can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/22536/

 --

[SA22510] Yahoo! Messenger Conference Invite Denial of Service

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2006-10-25

Gianni Amato has discovered a weakness in Yahoo! Messenger, which can
be exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22510/


UNIX/Linux:--

[SA22556] Debian update for webmin

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of system information,
Exposure of sensitive information, DoS, System access
Released:    2006-10-24

Debian has issued an update for webmin. This fixes some
vulnerabilities, which can be exploited by malicious people to disclose
potentially sensitive information, conduct cross-site scripting attacks,
cause a DoS (Denial of Service), and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22556/

 --

[SA22551] Gentoo update for clamav

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-24

Gentoo has issued an update for clamav. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22551/

 --

[SA22549] Gentoo update for mod_tcl

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-24

Gentoo has issued an update for mod_tcl. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22549/

 --

[SA22544] Gentoo update for openssl

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-24

Gentoo has issued an update for openssl. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22544/

 --

[SA22538] Avaya Products PHP Multiple Vulnerabilites

Critical:    Highly critical
Where:       From remote
Impact:      Unknown, Security Bypass, DoS, System access
Released:    2006-10-23

Avaya has acknowledged some vulnerabilities in PHP included in various
Avaya products, where some have unknown impacts, and others can be
exploited by malicious, local users to bypass certain security
restrictions and by malicious people to cause a DoS (Denial of Service)
or potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22538/

 --

[SA22537] Debian update for clamav

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-23

Debian has issued an update for clamav. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22537/

 --

[SA22517] Gentoo update for libmusicbrainz

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-23

Gentoo has issued an update for libmusicbrainz. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22517/

 --

[SA22509] SUSE update for opera

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Spoofing, System access
Released:    2006-10-20

SUSE has issued an update for opera. This fixes some vulnerabilities,
which can be exploited by malicious people to bypass certain security
restrictions and compromise a user's system.

Full Advisory:
http://secunia.com/advisories/22509/

 --

[SA22589] Slackware update for Qt

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-26

Slackware has issued an update for Qt. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or potentially compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/22589/

 --

[SA22581] Avaya CMS Sun Solaris IPv6 Denial of Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-10-26

Avaya has acknowledged a vulnerability in CMS, which can be exploited
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22581/

 --

[SA22579] Mandriva update for Qt

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-25

Mandriva has issued an update for Qt. This fixes a vulnerability, which
can be exploited by malicious people to cause a DoS (Denial of Service)
and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22579/

 --

[SA22575] Sun Java System Messaging Server Webmail Script Insertion

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-10-25

A vulnerability has been reported in Sun Java System Messaging Server,
which can be exploited by malicious people to conduct script insertion
attacks.

Full Advisory:
http://secunia.com/advisories/22575/

 --

[SA22574] Cisco Security Agent for Linux Port Scan Denial of Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-10-26

A vulnerability has been reported in Cisco Security Agent for Linux,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/22574/

 --

[SA22572] ImageMagick PALM and DCM Buffer Overflows

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-24

Some vulnerabilities have been reported in ImageMagick, which can be
exploited by malicious people to cause a DoS (Denial of Service) and
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22572/

 --

[SA22569] GraphicsMagick PALM and DCM Buffer Overflows

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-24

Some vulnerabilities have been reported in GraphicsMagick, which can be
exploited by malicious people to cause a DoS (Denial of Service) and
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22569/

 --

[SA22545] Blue Coat Products RSA Signature Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-10-26

Blue Coat has acknowledged a vulnerability in some products, which can
be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/22545/

 --

[SA22533] Avaya Products PHP "_ecalloc" Integer Overflow Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-23

Avaya has acknowledged a vulnerability in PHP included in various Avaya
products, which can be exploited by malicious people to cause a DoS
(Denial of Service) and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22533/

 --

[SA22531] Debian update for python2.3

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-24

Debian has issued an update for python 2.3. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22531/

 --

[SA22520] Ubuntu update for Qt

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-24

Ubuntu has issued an update for Qt. This fixes a vulnerability, which
can be exploited by malicious people to cause a DoS (Denial of Service)
and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22520/

 --

[SA22512] Debian update for python2.4

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-23

Debian has issued an update for python2.4. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22512/

 --

[SA22518] Debian update for maxdb-7.5.00

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2006-10-23

Debian has issued an update for maxdb-7.5.00. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22518/

 --

[SA22583] GNU Screen UTF-8 Character Handling Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-10-25

Some vulnerabilities have been reported in GNU Screen, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22583/

 --

[SA22515] Gentoo update for cscope

Critical:    Less critical
Where:       From remote
Impact:      System access, DoS
Released:    2006-10-20

Gentoo has issued an update for cscope. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22515/

 --

[SA22560] Avaya Products XFree86 Integer Overflow Vulnerabilities

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-10-24

Avaya has acknowledged some vulnerabilities in XFree86 included in
various Avaya products, which can be exploited by malicious, local
users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/22560/

 --

[SA22528] HP Tru64 Unix dtmail Privilege Escalation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-10-23

Netragard has reported a vulnerability in HP Tru64 Unix, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/22528/

 --

[SA22584] Ubuntu update for postgresql

Critical:    Not critical
Where:       From local network
Impact:      DoS
Released:    2006-10-25

Ubuntu has issued an update for postgresql. This fixes some
vulnerabilities, which can be exploited by malicious users to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22584/

 --

[SA22562] PostgreSQL Denial of Service Vulnerabilities

Critical:    Not critical
Where:       From local network
Impact:      DoS
Released:    2006-10-25

Some vulnerabilities have been reported in PostgreSQL, which can be
exploited by malicious users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/22562/

 --

[SA22587] Avaya CMS / IR Sun Solaris "syslog" Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-10-26

Avaya has acknowledged a vulnerability in CMS / IR, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/22587/

 --

[SA22543] FreeBSD "/dev/crypto" Local Denial of Service Vulnerability

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-10-25

Evgeny Legerov has reported a vulnerability in FreeBSD, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/22543/


Other:--

[SA22523] IBM HMC Apache2 / OpenSSL Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, DoS, System access
Released:    2006-10-26

IBM has acknowledged some vulnerabilities in HMC, which can be
exploited by malicious people to conduct cross-site scripting attacks
and to cause a DoS (Denial of Service), and potentially to bypass
certain security restrictions or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22523/

 --

[SA22524] D-Link DSL-G624T Directory Traversal and Cross-Site
Scripting

Critical:    Less critical
Where:       From local network
Impact:      Cross Site Scripting, Exposure of sensitive information
Released:    2006-10-25

Jose Ramon Palanco has reported some vulnerabilities in D-Link
DSL-G624T, which can be exploited by malicious people to conduct
cross-site scripting attacks or to disclose certain sensitive
information.

Full Advisory:
http://secunia.com/advisories/22524/


Cross Platform:--

[SA22577] OTSCMS "OTCMS.php" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-25

GregStar has reported a vulnerability in OTSCMS, which can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22577/

 --

[SA22565] UeberProject Management System "cfg[homepath]" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-25

xoron has reported  a vulnerability in UeberProject Management System,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22565/

 --

[SA22554] Ascended Guestbook "CONFIG[path]" File Inclusion
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-25

Kacper has discovered a vulnerability in Ascended Guestbook, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22554/

 --

[SA22552] Imageview "user_settings" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of sensitive information, System access
Released:    2006-10-25

Kacper has discovered a vulnerability in Imageview, which can be
exploited by malicious people to disclose sensitive information or
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22552/

 --

[SA22548] OTSCMS "OTCMS.php" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-25

GregStar has reported a vulnerability in OTSCMS, which can be exploited
by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22548/

 --

[SA22547] Wiclear "path" File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-24

the master has discovered some vulnerabilities in Wiclear, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22547/

 --

[SA22546] Der Dirigent "cfg_dedi[dedi_path]" File Inclusion
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-24

Drago84 has discovered some vulnerabilities in Der Dirigent, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22546/

 --

[SA22527] castor "rootpath" File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-23

Some vulnerabilities have been reported in castor, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22527/

 --

[SA22525] Trawler Web CMS Multiple File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-23

k1tk4t has reported some vulnerabilities in Trawler Web CMS, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22525/

 --

[SA22522] Net_DNS "phpdns_basedir" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-25

Drago84 has discovered a vulnerability in Net_DNS, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22522/

 --

[SA22521] Mambo MambWeather Module "mosConfig_absolute_path" File
Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-23

h4ntu has discovered a vulnerability in the MambWeather module for
Mambo, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/22521/

 --

[SA22516] Virtual Law Office "phpc_root_path" File Inclusion
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-23

xoron has reported some vulnerabilities in Virtual Law Office, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/22516/

 --

[SA22508] EPNadmin "language" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-24

Kw3[R]Ln has reported a vulnerability in EPNadmin, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22508/

 --

[SA22505] pandaBB displayCategory.php File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-20

nukedclx has discovered some vulnerabilities in pandaBB, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22505/

 --

[SA22503] Open Meetings Filing Application "PROJECT_ROOT" File
Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-10-23

xoron has reported some vulnerabilities in Open Meetings Filing
Application, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/22503/

 --

[SA22530] 2BGal "path" Local File Inclusion Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-10-24

Kw3[R]Ln has discovered some vulnerabilities in 2BGal, which can be
exploited by malicious people to disclose potentially sensitive
information.

Full Advisory:
http://secunia.com/advisories/22530/

 --

[SA22529] phpPgAds "lib-history.php.inc" Cross-Site Scripting and
Script Insertion

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-10-23

A vulnerability has been reported in phpPgAds, which can be exploited
by malicious people to conduct script insertion and cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/22529/

 --

[SA22526] phpAdsNew "lib-history.inc.php" Cross-Site Scripting and
Script Insertion

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-10-23

A vulnerability has been reported in phpAdsNew, which can be exploited
by malicious people to conduct script insertion and cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/22526/

 --

[SA22514] Segue CMS SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-10-20

Some vulnerabilities have been reported in Segue CMS, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/22514/

 --

[SA22511] PHP-Nuke "eid" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-10-23

Paisterist has discovered a vulnerability in PHP-Nuke, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/22511/

 --

[SA22504] PH Pexplorer "Language" File Inclusion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, System access
Released:    2006-10-20

Kacper has discovered a vulnerability in PH Pexplorer, which can be
exploited by malicious users to disclose sensitive information or
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22504/

 --

[SA22502] GeoNetwork opensource SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-10-23

A vulnerability has been reported in GeoNetwork opensource, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/22502/

 --

[SA22519] Novell eDirectory iMonitor HTTP Protocol Stack Buffer
Overflow

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2006-10-23

Michael Ligh and Ryan Smith have reported a vulnerability in Novell
eDirectory, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/22519/

 --

[SA22506] Novell eDirectory Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2006-10-23

Multiple vulnerabilities have been reported in Novell eDirectory, which
can be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/22506/

 --

[SA22564] MAXdev MD-Pro Cross-Site Scripting and HTTP Response
Splitting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-10-25

R00T[ATI] has reported some vulnerabilities in MAXdev MD-Pro, which can
be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/22564/

 --

[SA22558] WikiNi "name" and "email" Cross-Site Scripting
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-10-24

Raphael HUCK has reported some vulnerabilities in WikiNi, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/22558/

 --

[SA22555] cPanel Multiple Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-10-25

Crackers_Child has reported some vulnerabilities in cPanel, which can
be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/22555/

 --

[SA22535] Simpnews Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-10-24

Moran Zavdi has reported a vulnerability in Simpnews, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/22535/

 --

[SA22532] ProgSys URL Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-10-25

Moran Zavdi has discovered a vulnerability in ProgSys, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/22532/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


_________________________________
Visit the InfoSec News store!
http://www.shopinfosecnews.org 



This archive was generated by hypermail 2.1.3 : Fri Oct 27 2006 - 00:12:47 PDT