======================================================================== The Secunia Weekly Advisory Summary 2007-02-22 - 2007-03-01 This week: 63 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: Should you be interested in a career within Secunia, the current job openings are available right now: Security Sales Engineer: http://corporate.secunia.com/about_secunia/54/ German Key Account Manager: http://corporate.secunia.com/about_secunia/55/ International Account Manager - Enterprise Sales: http://corporate.secunia.com/about_secunia/52/ International Sales Manager - IT Security Partner: http://corporate.secunia.com/about_secunia/51/ Danish: Disassembling og Reversing http://secunia.com/Disassembling_og_Reversing/ ======================================================================== 2) This Week in Brief: Mozilla released a security update for Firefox this week, which fixed 32 vulnerabilities, with various impacts. Some vulnerabilities can be exploited to execute arbitrary code on a user's system, while others can be used to perform spoofing and cross-site scripting attacks, disclose sensitive information, or bypass security restrictions. This security update fixes the password disclosure vulnerability from November of last year, as well as the "locations.hostname" vulnerability from the middle of February 2007. Firefox users are encouraged to update their browsers to either version 2.0.0.2 or 1.5.0.10. Use the Secunia Software Inspector to help you determine if your system is up-to-date: http://secunia.com/software_inspector/ For more information, refer to: http://secunia.com/advisories/24205/ -- A spoofing vulnerability in Internet Explorer (IE) 7 discovered by Secunia Research was disclosed this week. The vulnerability is due to an error in IE7's handling of "onunload" events. It can be exploited by a malicious website to spoof the address bar if, for example, the user types a new address manually into the address bar, which is considered best practice. Spoofing attacks can be used for phishing activities, as well as installation vectors for malware and spyware. The vulnerability is currently unpatched. Secunia recommends that IE users close browsers after visiting untrusted web sites. For more information, refer to: http://secunia.com/secunia_research/2007-1/advisory/ http://secunia.com/advisories/23014/ -- The vulnerabilities reported in Mozilla Firefox also apply to Mozilla Seamonkey. They are reported to be patched in the upcoming version 1.0.8. For more information, refer to: http://secunia.com/advisories/24238/ Mozilla Thunderbird is also susceptible to vulnerabilities numbers 2 and 9, which can be exploited to execute arbitrary code on a target system. These vulnerabilities remain unpatched in Thunderbird, and will reportedly be fixed in version 1.5.0.10. For more information, refer to: http://secunia.com/advisories/24252/ Netscape is also susceptible to vulnerabilities 1, 2, 6, and 7 of the listed Firefox vulnerabilities. These vulnerabilities are reported in version 8.1.2. For more information, refer to: http://secunia.com/advisories/24264/ -- VIRUS ALERTS: During the past week Secunia collected 138 virus descriptions from the Antivirus vendors. However, none were deemed MEDIUM risk or higher according to the Secunia assessment scale. ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA24205] Mozilla Firefox Multiple Vulnerabilities 2. [SA23014] Internet Explorer 7 "onunload" Event Spoofing Vulnerability 3. [SA24156] Internet Explorer Multiple Vulnerabilities 4. [SA24252] Mozilla Thunderbird Multiple Vulnerabilities 5. [SA24283] IBM DB2 Authorisation Bypass Vulnerability 6. [SA24227] web-app.org WebAPP Unspecified Vulnerabilities 7. [SA24270] Macrovision FLEXnet Connect Update Service Agent Buffer Overflow 8. [SA24269] ZephyrSoft Toolbox ABC SQL Injection Vulnerabilities 9. [SA24274] Novell ZENworks Desktop Management Image Upload Security Bypass 10. [SA18787] Internet Explorer Drag-and-Drop Vulnerability ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA24350] Citrix Presentation Server Client Unspecified Code Execution [SA24330] XM Easy Personal FTP Server Format String Vulnerability [SA24289] Netscape Multiple Vulnerabilities [SA24285] InstallShield InstallFromTheWeb Multiple Buffer Overflows [SA24314] Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability [SA24309] CA eTrust Intrusion Detection Key Length Value Denial of Service UNIX/Linux: [SA24343] Mandriva update for firefox [SA24342] SGI update for seamonkey [SA24339] Gentoo update for mplayer [SA24333] Ubuntu update for firefox [SA24328] Fedora update for firefox [SA24327] Fedora update for seamonkey [SA24320] Fedora update for firefox [SA24293] rPath update for firefox [SA24290] Red Hat update for firefox [SA24287] Red Hat update for seamonkey [SA24277] Fedora update for nspr and nss [SA24335] Gentoo update for chmlib [SA24326] Fedora update for php [SA24322] rPath update for php, php-mysql, and php-pgsql [SA24319] SUSE update for clamav [SA24313] Gentoo update for nexuiz [SA24303] SUSE update for kernel [SA24298] Nexuiz Denial of Service and Command Injection [SA24297] Gentoo Multiple Vulnerabilities in ufo2000 [SA24296] SQLiteManager "SQLiteManager_currentTheme" Directory Traversal [SA24295] Red Hat Stronghold update for php [SA24288] Avaya Products Linux Kernel Denial of Service [SA24284] SGI Advanced Linux Environment 3 Multiple Updates [SA24282] Slackware update for php [SA24338] Mandriva update for snort [SA24315] Solaris PostgreSQL Denial of Service and Information Disclosure [SA24337] McAfee Virex VShieldExclude.txt Privilege Escalation [SA24324] Debian Apache Privilege Escalation [SA24317] Fedora update for gnucash [SA24345] Dropbear hostkey Mismatch Warning Weakness [SA24300] Red Hat update for kernel Other: [SA24344] Cisco Products NAM SNMP Spoofing Vulnerability [SA24348] Cisco Products MPLS Denial of Service Vulnerability Cross Platform: [SA24336] MPlayer RTSP Stream Buffer Overflow Vulnerability [SA24305] FCRing "s_fuss" File Inclusion Vulnerability [SA24291] CS-Gallery "album" File Inclusion Vulnerability [SA24280] STWC-Counter "stwc_counter_verzeichniss" File Inclusion Vulnerabilities [SA24275] ZPanel "body" and "page" File Inclusion Vulnerabilities [SA24323] SHOUTcast Logfile Script Insertion Vulnerability [SA24311] Stanford Conference And Research Forum "generaloptions.php" Security Bypass [SA24310] PhotoStand Cross-Site Scripting and Script Insertion [SA24301] xt:Commerce "template" Local File Inclusion [SA24299] Pagesetter "id" File Disclosure Vulnerability [SA24294] Pickle "file" Directory Traversal Vulnerability [SA24279] Shop Kit Plus "changetheme" Local File Inclusion [SA24278] LoveCMS Multiple Vulnerabilities [SA24276] Hitachi JP1/Cm2/Network Node Manager Unspecified Vulnerabilities [SA24325] MTCMS File Upload Vulnerability [SA24316] WordPress Multiple Cross-Site Scripting Vulnerabilities [SA24312] Opera Charset Inheritance Cross-Site Scripting Vulnerability [SA24308] PhpWebGallery register.php Cross-Site Scripting Vulnerabilities [SA24306] WordPress templates.php Cross-Site Scripting Vulnerability [SA24292] Simple one-file gallery "f" Cross-Site Scripting Vulnerability [SA24273] J-Web Pics Navigator "dir" Directory Traversal [SA24283] IBM DB2 Authorisation Bypass Vulnerability [SA24274] Novell ZENworks Desktop Management Image Upload Security Bypass [SA24321] Webmin / Usermin chooser.cgi Script Insertion Vulnerability ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA24350] Citrix Presentation Server Client Unspecified Code Execution Critical: Highly critical Where: From remote Impact: System access Released: 2007-03-01 A vulnerability has been reported in Citrix Presentation Server Client, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/24350/ -- [SA24330] XM Easy Personal FTP Server Format String Vulnerability Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2007-03-01 Umesh Wanve has discovered a vulnerability in XM Easy Personal FTP Server, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24330/ -- [SA24289] Netscape Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Exposure of sensitive information, System access Released: 2007-02-27 Multiple vulnerabilities have been reported in Netscape, which can be exploited by malicious people to bypass certain security restrictions, gain knowledge of sensitive information, conduct cross-site scripting attacks, or potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/24289/ -- [SA24285] InstallShield InstallFromTheWeb Multiple Buffer Overflows Critical: Highly critical Where: From remote Impact: System access Released: 2007-02-23 Will Dormann has reported some vulnerabilities in InstallShield InstallFromTheWeb, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/24285/ -- [SA24314] Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-02-26 Stefan Esser has discovered a vulnerability in Internet Explorer, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/24314/ -- [SA24309] CA eTrust Intrusion Detection Key Length Value Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2007-02-28 A vulnerability has been reported in CA eTrust Intrusion Detection, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24309/ UNIX/Linux:-- [SA24343] Mandriva update for firefox Critical: Highly critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Spoofing, Exposure of sensitive information, System access Released: 2007-03-01 Mandriva has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and spoofing attacks, gain knowledge of sensitive information, and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/24343/ -- [SA24342] SGI update for seamonkey Critical: Highly critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Spoofing, Exposure of sensitive information, System access Released: 2007-03-01 SGI has issued an update for SGI Advanced Linux Environment. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and spoofing attacks, gain knowledge of sensitive information, and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/24342/ -- [SA24339] Gentoo update for mplayer Critical: Highly critical Where: From remote Impact: System access Released: 2007-03-01 Gentoo has issued an update for mplayer. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/24339/ -- [SA24333] Ubuntu update for firefox Critical: Highly critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Spoofing, Exposure of sensitive information, System access Released: 2007-03-01 Ubuntu has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and spoofing attacks, gain knowledge of sensitive information, and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/24333/ -- [SA24328] Fedora update for firefox Critical: Highly critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Spoofing, Exposure of sensitive information, System access Released: 2007-02-27 Fedora has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and spoofing attacks, gain knowledge of sensitive information, and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/24328/ -- [SA24327] Fedora update for seamonkey Critical: Highly critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Spoofing, Exposure of sensitive information, System access Released: 2007-02-27 Fedora has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and spoofing attacks, gain knowledge of sensitive information, and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24327/ -- [SA24320] Fedora update for firefox Critical: Highly critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Spoofing, Exposure of sensitive information, System access Released: 2007-02-28 Fedora has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and spoofing attacks, gain knowledge of sensitive information, and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/24320/ -- [SA24293] rPath update for firefox Critical: Highly critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Spoofing, Exposure of sensitive information, System access Released: 2007-02-27 rPath has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and spoofing attacks, gain knowledge of sensitive information, and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24293/ -- [SA24290] Red Hat update for firefox Critical: Highly critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Spoofing, Exposure of sensitive information, System access Released: 2007-02-26 Red Hat has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and spoofing attacks, gain knowledge of sensitive information, and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/24290/ -- [SA24287] Red Hat update for seamonkey Critical: Highly critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Spoofing, Exposure of sensitive information, System access Released: 2007-02-26 Red Hat has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and spoofing attacks, gain knowledge of sensitive information, and potentially compromise a user's system. Full Advisory: http://secunia.com/advisories/24287/ -- [SA24277] Fedora update for nspr and nss Critical: Highly critical Where: From remote Impact: System access Released: 2007-02-27 Fedora has issued an update for nspr and nss. This fixes two vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24277/ -- [SA24335] Gentoo update for chmlib Critical: Moderately critical Where: From remote Impact: System access Released: 2007-02-28 Gentoo has issued an update for chmlib. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise an application using the library. Full Advisory: http://secunia.com/advisories/24335/ -- [SA24326] Fedora update for php Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of sensitive information, DoS, System access Released: 2007-02-27 Fedora has issued an update for php. This fixes some vulnerabilities and a weakness, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24326/ -- [SA24322] rPath update for php, php-mysql, and php-pgsql Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of sensitive information, DoS, System access Released: 2007-02-28 rPath has issued an update for php, php-mysql, and php-pgsql. This fixes some vulnerabilities and a weakness, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24322/ -- [SA24319] SUSE update for clamav Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-02-27 SUSE has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24319/ -- [SA24313] Gentoo update for nexuiz Critical: Moderately critical Where: From remote Impact: Security Bypass, DoS Released: 2007-02-27 Gentoo has issued an update for nexuiz. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24313/ -- [SA24303] SUSE update for kernel Critical: Moderately critical Where: From remote Impact: Unknown, Privilege escalation, DoS Released: 2007-02-27 SUSE has issued an update for the kernel. This fixes some vulnerabilities, where one has unknown impacts and others can be exploited by malicious, local users to gain escalated privileges and cause a DoS (Denial of Service), or by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24303/ -- [SA24298] Nexuiz Denial of Service and Command Injection Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data, DoS Released: 2007-02-27 Some vulnerabilities have been reported in Nexuiz, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24298/ -- [SA24297] Gentoo Multiple Vulnerabilities in ufo2000 Critical: Moderately critical Where: From remote Impact: Manipulation of data, DoS, System access Released: 2007-02-26 Gentoo has acknowledged some vulnerabilities in UFO2000, which can be exploited by malicious people to conduct SQL injection attacks, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24297/ -- [SA24296] SQLiteManager "SQLiteManager_currentTheme" Directory Traversal Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-02-28 Simon Bonnard has discovered a vulnerability in SQLiteManager, which can be exploited by malicious people to disclose sensitive data. Full Advisory: http://secunia.com/advisories/24296/ -- [SA24295] Red Hat Stronghold update for php Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of sensitive information, DoS, System access Released: 2007-02-26 Red Hat has issued an update for php. This fixes some vulnerabilities and a weakness, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24295/ -- [SA24288] Avaya Products Linux Kernel Denial of Service Critical: Moderately critical Where: From remote Impact: DoS Released: 2007-02-27 Avaya has acknowledged a vulnerability in various Avaya products, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24288/ -- [SA24284] SGI Advanced Linux Environment 3 Multiple Updates Critical: Moderately critical Where: From remote Impact: Security Bypass, Cross Site Scripting, Exposure of sensitive information, DoS, System access Released: 2007-02-23 SGI has issued an update for SGI Advanced Linux Environment. This fixes some vulnerabilities, a security issue, and a weakness, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, conduct cross-site scripting attacks, cause a DoS (Denial of Service), or compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24284/ -- [SA24282] Slackware update for php Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of sensitive information, DoS, System access Released: 2007-02-23 Slackware has issued an update for php. This fixes some vulnerabilities and a weakness, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service) and potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24282/ -- [SA24338] Mandriva update for snort Critical: Less critical Where: From remote Impact: DoS Released: 2007-03-01 Mandriva has issued an update for snort. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24338/ -- [SA24315] Solaris PostgreSQL Denial of Service and Information Disclosure Critical: Less critical Where: From local network Impact: Exposure of sensitive information, DoS Released: 2007-02-28 Sun has acknowledged two vulnerabilities in PostgreSQL, which can be exploited by malicious users to gain knowledge of potentially sensitive information and cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24315/ -- [SA24337] McAfee Virex VShieldExclude.txt Privilege Escalation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-02-28 Kevin Finisterre has reported a vulnerability in McAfee Virex, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/24337/ -- [SA24324] Debian Apache Privilege Escalation Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-02-27 A vulnerability has been discovered in Debian, which can be exploited by malicious, local users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/24324/ -- [SA24317] Fedora update for gnucash Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2007-02-28 Fedora has issued an update for gnucash. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/24317/ -- [SA24345] Dropbear hostkey Mismatch Warning Weakness Critical: Not critical Where: From remote Impact: Hijacking, Security Bypass Released: 2007-03-01 A weakness has been reported in Dropbear, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/24345/ -- [SA24300] Red Hat update for kernel Critical: Not critical Where: Local system Impact: DoS Released: 2007-02-27 Red Hat has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24300/ Other:-- [SA24344] Cisco Products NAM SNMP Spoofing Vulnerability Critical: Moderately critical Where: From local network Impact: System access Released: 2007-03-01 A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24344/ -- [SA24348] Cisco Products MPLS Denial of Service Vulnerability Critical: Less critical Where: From local network Impact: DoS Released: 2007-03-01 A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/24348/ Cross Platform:-- [SA24336] MPlayer RTSP Stream Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-03-01 A vulnerability has been reported in MPlayer, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/24336/ -- [SA24305] FCRing "s_fuss" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-03-01 kezzap66345 has reported a vulnerability in FCRing, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24305/ -- [SA24291] CS-Gallery "album" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2007-02-26 burncycle has discovered a vulnerability in CS-Gallery, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24291/ -- [SA24280] STWC-Counter "stwc_counter_verzeichniss" File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2007-02-27 burncycle has discovered some vulnerabilities in STWC-Counter, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24280/ -- [SA24275] ZPanel "body" and "page" File Inclusion Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2007-02-23 Hamid Ebadi has discovered two vulnerabilities in ZPanel, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24275/ -- [SA24323] SHOUTcast Logfile Script Insertion Vulnerability Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2007-02-28 Muschiemann has discovered a vulnerability in SHOUTcast, which can be exploited by malicious people to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/24323/ -- [SA24311] Stanford Conference And Research Forum "generaloptions.php" Security Bypass Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2007-02-27 A vulnerability has been reported in Stanford Conference And Research Forum, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/24311/ -- [SA24310] PhotoStand Cross-Site Scripting and Script Insertion Critical: Moderately critical Where: From remote Impact: Cross Site Scripting Released: 2007-02-26 Simon Bonnard has discovered some vulnerabilities in PhotoStand, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks. Full Advisory: http://secunia.com/advisories/24310/ -- [SA24301] xt:Commerce "template" Local File Inclusion Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-02-26 laurent gaffi has reported a vulnerability in xt:Commerce, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/24301/ -- [SA24299] Pagesetter "id" File Disclosure Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information Released: 2007-02-27 A vulnerability has been reported in Pagesetter, which can be exploited by malicious people to disclose potentially sensitive information. Full Advisory: http://secunia.com/advisories/24299/ -- [SA24294] Pickle "file" Directory Traversal Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-02-26 laurent gaffi has reported a vulnerability in Pickle, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/24294/ -- [SA24279] Shop Kit Plus "changetheme" Local File Inclusion Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-02-26 laurent gaffi has reported a vulnerability in Shop Kit Plus, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/24279/ -- [SA24278] LoveCMS Multiple Vulnerabilities Critical: Moderately critical Where: From remote Impact: Cross Site Scripting, Manipulation of data, Exposure of sensitive information Released: 2007-02-23 Laurent Gaffi has discovered some vulnerabilities in LoveCMS, which can be exploited by malicious people to disclose sensitive information, and conduct SQL injection and cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/24278/ -- [SA24276] Hitachi JP1/Cm2/Network Node Manager Unspecified Vulnerabilities Critical: Moderately critical Where: From local network Impact: DoS, System access Released: 2007-02-23 Some vulnerabilities have been reported in Hitachi JP1/Cm2/Network Node Manager, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24276/ -- [SA24325] MTCMS File Upload Vulnerability Critical: Less critical Where: From remote Impact: System access Released: 2007-02-27 laurent gaffi has discovered a vulnerability in MTCMS, which potentially can be exploited by malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/24325/ -- [SA24316] WordPress Multiple Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-02-27 Some vulnerabilities have been discovered in WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/24316/ -- [SA24312] Opera Charset Inheritance Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-02-26 Stefan Esser has discovered a vulnerability in Opera, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/24312/ -- [SA24308] PhpWebGallery register.php Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-02-26 Simon Bonnard has discovered some vulnerabilities in PhpWebGallery, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/24308/ -- [SA24306] WordPress templates.php Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-02-26 PsychoGun has discovered a vulnerability in WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/24306/ -- [SA24292] Simple one-file gallery "f" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2007-02-26 Laurent Gaffi has discovered a vulnerability in Simple one-file gallery, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/24292/ -- [SA24273] J-Web Pics Navigator "dir" Directory Traversal Critical: Less critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2007-02-23 sn0oPy has discovered a vulnerability in J-Web Pics Navigator, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/24273/ -- [SA24283] IBM DB2 Authorisation Bypass Vulnerability Critical: Less critical Where: From local network Impact: Security Bypass Released: 2007-02-23 A vulnerability has been reported in IBM DB2, which can be exploited by malicious users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/24283/ -- [SA24274] Novell ZENworks Desktop Management Image Upload Security Bypass Critical: Less critical Where: From local network Impact: Security Bypass Released: 2007-02-23 A vulnerability has been reported in Novell ZENworks Desktop Management, which can be exploited by malicious users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/24274/ -- [SA24321] Webmin / Usermin chooser.cgi Script Insertion Vulnerability Critical: Less critical Where: Local system Impact: Cross Site Scripting Released: 2007-03-01 A vulnerability has been reported in Webmin and Usermin, which can be exploited by malicious, local users to conduct script insertion attacks. Full Advisory: http://secunia.com/advisories/24321/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Subscribe: http://secunia.com/secunia_weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support@private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 _________________________________________ Visit the InfoSec News Security Bookstore http://www.shopinfosecnews.org
This archive was generated by hypermail 2.1.3 : Thu Mar 01 2007 - 23:10:23 PST