[ISN] Secunia Weekly Summary - Issue: 2007-27

From: InfoSec News (alerts@private)
Date: Thu Jul 05 2007 - 23:28:13 PDT


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2007-06-28 - 2007-07-05                        

                       This week: 55 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.

The Full Featured Secunia Network Software Inspector (NSI) is now
available:
http://secunia.com/network_software_inspector/

The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications.

========================================================================
2) This Week in Brief:

HP Instant Support Driver Check was found to contain a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

A boundary error can occur when processing the "queryHub()" function
in sdd.dll, which can be exploited to cause a buffer overflow via an
overly long string passed to the affected function when a user visits
a malicious web page.

Successful exploitation allows an attacker to execute arbitrary code. 

Users are advised to upgrade to version 1.5.0.3, which fixes this
vulnerability.

For more information:
http://secunia.com/advisories/25918/

 --

Secunia Research has discovered a vulnerability in Gimp, which can be
exploited by malicious people to compromise a user's system.

An integer overflow within the "seek_to_and_unpack_pixeldata()"
function in plug-ins/common/psd.c can be exploited to cause 
heap-based buffer overflow by tricking a user into opening a specially
crafted PSD file with large width or height values.

Successful exploitation allows an attacker to execute arbitrary code.

The vulnerability is confirmed in version 2.2.15n and other versions
may also be affected. The vendor has fixed this vulnerability in the
SVN repository.

For more information:
http://secunia.com/advisories/25677/

 --

Sun Java Web Start contains a vulnerability, which can be exploited
by malicious people to bypass certain security restrictions.

The vulnerability is caused due to an unspecified error in Java Web
Start. This can be exploited by an untrusted application to grant
itself permissions to overwrite any file that is writable by the user
running the application. This can further be exploited to overwrite
the user's ".java.policy" file, allowing the application to invoke
applets or Java Web Start applications.

The vendor has released updates for both Java Web Start in JDK and
JRE 5.0, and Java Web Start in SDK and JRE for the Windows platform.
Users are advised to update their systems immediately.

For more information:
http://secunia.com/advisories/25823/

 --

VIRUS ALERTS:

During the past week Secunia collected 227 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA25823] Sun Java Web Start Untrusted Application Arbitrary File
              Overwrite
2.  [SA25891] AMX VNC ActiveX Control Buffer Overflow Vulnerabilities
3.  [SA25845] EVA-Web index.php3 Two File Inclusion Vulnerabilities
4.  [SA25889] Xerox ESS/ Network Controller OpenSSL Vulnerabilities
5.  [SA25846] Coppermine Photo Gallery Two SQL Injection
              Vulnerabilities
6.  [SA25869] HP PSC All-in-One Series XMLData ActiveX Control Two
              Insecure Methods
7.  [SA25875] Sun Solaris/SEAM kadmind Buffer Overflow Vulnerability
8.  [SA25866] SAP Products Cross-Site Scripting Vulnerabilities
9.  [SA25883] 3Com IntelliJack Switch NJ220 Loopback Packet Processing
              Denial of Service
10. [SA25885] IBM OS/400 TCP Packet Processing Security Bypass Issue

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA25918] HP Instant Support Driver Check sdd.dll Buffer Overflow
[SA25891] AMX VNC ActiveX Control Buffer Overflow Vulnerabilities
[SA25908] Gorki Online Santrac Sitesi Script Insertion Vulnerabilities
[SA25930] Oliver Library Management System Cross-Site Scripting
Vulnerabilities
[SA25917] Efendy Blog "ara" Cross-Site Scripting

UNIX/Linux:
[SA25911] SUSE update for krb5
[SA25905] Gentoo update for openoffice and openoffice-bin
[SA25903] Wheatblog File Inclusion and SQL Injection Vulnerabilities
[SA25894] SGI Advanced Linux Environment Multiple Updates
[SA25890] Debian update for krb5
[SA25888] Trustix update for kerberos5
[SA25949] Ubuntu update for gimp
[SA25933] Mandriva update for kdebase
[SA25932] SUSE update for libexif
[SA25925] Girlserv Ads "idnew" SQL Injection Vulnerability
[SA25923] Knowledgeroot Knowledgebase FCKeditor ADS File Upload
Vulnerability
[SA25944] ServerView DBAsciiAccess Command Execution Vulnerability
[SA25946] Mandriva update for mysql
[SA25935] Avaya Products util-linux Security Issue
[SA25934] Avaya Products GDB "DWARF" Buffer Overflow Vulnerabilities
[SA25931] SUSE update for file
[SA25906] Gentoo update for evolution-data-server
[SA25914] Debian update for gsambad
[SA25913] Debian update for fireflier-server
[SA25912] Debian update for unicon-imc2
[SA25910] UNICON "HOME" Environment Variable Buffer Overflow
Vulnerability
[SA25909] GSAMBAD "populate_conns()" Insecure Temporary Files
[SA25900] FireFlier Insecure Use of Temporary Files
[SA25896] Avaya Products Shadow "useradd.c" Insecure Mailbox File
Permissions
[SA25920] Mandriva update for apache
[SA25936] Avaya CMS / IR Solaris scp Command Line Shell Command
Injection
[SA25895] Linux Kernel USBLCD Driver Out of Memory Denial of Service

Other:
[SA25902] Yoggie Pico Pro Shell Command Injection Vulnerability
[SA25889] Xerox ESS/ Network Controller OpenSSL Vulnerabilities
[SA25943] Fujitsu PRIMERGY BX300 Web Interface Authentication Bypass

Cross Platform:
[SA25898] Ripe Website Manager File Inclusion and Information Exposure
[SA25928] PHP Director "id" SQL Injection Vulnerability
[SA25927] AV Arcade "id" SQL Injection Vulnerability
[SA25926] Elite Bulletin Board Two Vulnerabilities
[SA25924] bbs100 Multiple Denial of Service Vulnerabilities
[SA25922] Youtube Script "id" SQL Injection Vulnerability
[SA25921] SuperCali PHP Event Calendar "o" SQL Injection
[SA25916] ArcadeBuilder Game Portal Manager SQL Injection
[SA25915] phpEventCalendar "id" SQL Injection Vulnerability
[SA25901] 1-2-3 Music Store "CategoryID" SQL Injection
[SA25899] TotalCalendar "id" SQL Injection Vulnerability
[SA25893] GL-SH Deaf Forum Two Local File Inclusion Vulnerabilities
[SA25892] WebChat "rid" SQL Injection Vulnerability
[SA25947] ManageEngine NetFlow Analyzer Multiple Cross-Site Scripting
Vulnerabilities
[SA25942] Zen Cart Session Fixation Vulnerability
[SA25929] Moodle "search" Cross-Site Scripting Vulnerability
[SA25919] Oracle Rapid Install Cross-Site Scripting Vulnerability
[SA25907] PHP-Fusion "FUSION_QUERY" Cross-Site Scripting Vulnerability
[SA25887] Claroline "$_SERVER['PHP_SELF']" Cross-Site Scripting
Vulnerability
[SA25904] Firefox "OnKeyDown" Event Focus Weakness

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA25918] HP Instant Support Driver Check sdd.dll Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-03

A vulnerability has been reported in HP Instant Support Driver Check,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/25918/

 --

[SA25891] AMX VNC ActiveX Control Buffer Overflow Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-06-29

rgod has discovered some vulnerabilities in AMX VNC ActiveX Control,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/25891/

 --

[SA25908] Gorki Online Santrac Sitesi Script Insertion Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-02

GeFORC3 has reported some vulnerabilities in Gorki Online Santrac
Sitesi, which can be exploited by malicious people to conduct script
insertion attacks.

Full Advisory:
http://secunia.com/advisories/25908/

 --

[SA25930] Oliver Library Management System Cross-Site Scripting
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-04

A. R. has reported some vulnerabilities in Oliver Library Management
System, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25930/

 --

[SA25917] Efendy Blog "ara" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-02

GeFORC3 has reported a vulnerability in Efendy Blog, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25917/


UNIX/Linux:--

[SA25911] SUSE update for krb5

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-07-04

SUSE has issued an update for krb5. This fixes some vulnerabilities,
which can be exploited by malicious users and malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25911/

 --

[SA25905] Gentoo update for openoffice and openoffice-bin

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-07-03

Gentoo has issued an update for openoffice and openoffice-bin. This
fixes some vulnerabilities, which can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25905/

 --

[SA25903] Wheatblog File Inclusion and SQL Injection Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Manipulation of data, Exposure of system information,
Exposure of sensitive information, System access
Released:    2007-07-02

E.Minaev has discovered two vulnerabilities in Wheatblog, which can be
exploited by malicious people to conduct SQL injection attacks,
disclose sensitive information, or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25903/

 --

[SA25894] SGI Advanced Linux Environment Multiple Updates

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information,
Privilege escalation, DoS, System access
Released:    2007-06-29

SGI has issued multiple updates for SGI Advanced Linux Environment.
These fix some vulnerabilities, which can be exploited by malicious,
local users to bypass certain security restrictions or to perform
certain actions with escalated privileges, by malicious users to bypass
certain security restrictions or to compromise a vulnerable system, and
by malicious people to disclose potentially sensitive information, to
cause a DoS (Denial of Service), or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25894/

 --

[SA25890] Debian update for krb5

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-29

Debian has issued an update for krb5. This fixes some vulnerabilities,
which can be exploited by malicious users and malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25890/

 --

[SA25888] Trustix update for kerberos5

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-06-29

Trustix has issued an update for kerberos5. This fixes some
vulnerabilities, which can be exploited by malicious users and
malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25888/

 --

[SA25949] Ubuntu update for gimp

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-07-05

Ubuntu has issued an update for gimp. This fixes a vulnerability, which
can be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/25949/

 --

[SA25933] Mandriva update for kdebase

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-07-04

Mandriva has issued an update for kdebase. This fixes a vulnerability,
which can be exploited by malicious people to disclose potentially
sensitive information.

Full Advisory:
http://secunia.com/advisories/25933/

 --

[SA25932] SUSE update for libexif

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-07-04

SUSE has issued an update for libexif. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25932/

 --

[SA25925] Girlserv Ads "idnew" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-07-04

Cold z3ro has discovered a vulnerability in Girlserv Ads, which can be
exploited by malicious people to conduct SQL Injection attacks.

Full Advisory:
http://secunia.com/advisories/25925/

 --

[SA25923] Knowledgeroot Knowledgebase FCKeditor ADS File Upload
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-07-02

A vulnerability has been acknowledged in Knowledgeroot Knowledgebase,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/25923/

 --

[SA25944] ServerView DBAsciiAccess Command Execution Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-07-05

RedTeam Pentesting has reported a vulnerability in ServerView, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/25944/

 --

[SA25946] Mandriva update for mysql

Critical:    Less critical
Where:       From remote
Impact:      Privilege escalation, DoS
Released:    2007-07-05

Mandriva has issued an update for mysql. This fixes some
vulnerabilities and a security issue, which can be exploited by
malicious users to cause a DoS (Denial of Service) or gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/25946/

 --

[SA25935] Avaya Products util-linux Security Issue

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-07-04

Avaya has acknowledged a security issue in various Avaya products,
which can be exploited by malicious users to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/25935/

 --

[SA25934] Avaya Products GDB "DWARF" Buffer Overflow Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-07-04

Avaya has acknowledged some vulnerabilities in various Avaya products,
which potentially can be exploited by malicious, local users to gain
escalated privileges or malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/25934/

 --

[SA25931] SUSE update for file

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-07-04

SUSE has issued an update for file. This fixes a vulnerability, which
potentially can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/25931/

 --

[SA25906] Gentoo update for evolution-data-server

Critical:    Less critical
Where:       From remote
Impact:      System access, DoS
Released:    2007-07-03

Gentoo has issued an update for evolution-data-server. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a user's system.

Full Advisory:
http://secunia.com/advisories/25906/

 --

[SA25914] Debian update for gsambad

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-07-02

Debian has issued an update for gsambad. This fixes a security issue,
which can be exploited by malicious, local users to perform certain
actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/25914/

 --

[SA25913] Debian update for fireflier-server

Critical:    Less critical
Where:       Local system
Impact:      Manipulation of data
Released:    2007-07-02

Debian has issued an update for fireflier-server. This fixes a security
issue, which can be exploited by malicious, local users to delete
arbitrary files.

Full Advisory:
http://secunia.com/advisories/25913/

 --

[SA25912] Debian update for unicon-imc2

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-07-02

Debian has issued an update for unicon-imc2. This fixes a
vulnerability, which potentially can be exploited by malicious, local
users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/25912/

 --

[SA25910] UNICON "HOME" Environment Variable Buffer Overflow
Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-07-02

Steve Kemp has reported a vulnerability in UNICON, which potentially
can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/25910/

 --

[SA25909] GSAMBAD "populate_conns()" Insecure Temporary Files

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-07-02

Steve Kemp has reported a security issue in GSAMBAD, which can be
exploited by malicious, local users to perform certain actions with
escalated privileges.

Full Advisory:
http://secunia.com/advisories/25909/

 --

[SA25900] FireFlier Insecure Use of Temporary Files

Critical:    Less critical
Where:       Local system
Impact:      Manipulation of data
Released:    2007-07-02

Steve Kemp has reported a security issue in FireFlier, which can be
exploited by malicious, local users to delete arbitrary files.

Full Advisory:
http://secunia.com/advisories/25900/

 --

[SA25896] Avaya Products Shadow "useradd.c" Insecure Mailbox File
Permissions

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-06-29

Avaya has acknowledged a security issue in various Avaya products,
which potentially can be exploited by malicious, local users to perform
certain actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/25896/

 --

[SA25920] Mandriva update for apache

Critical:    Not critical
Where:       From remote
Impact:      Cross Site Scripting, DoS
Released:    2007-07-05

Mandriva has issued an update for apache. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service) and malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25920/

 --

[SA25936] Avaya CMS / IR Solaris scp Command Line Shell Command
Injection

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-07-04

Avaya has acknowledged a weakness in Avaya CMS and IR, which can be
exploited by malicious, local users to perform certain actions with
escalated privileges.

Full Advisory:
http://secunia.com/advisories/25936/

 --

[SA25895] Linux Kernel USBLCD Driver Out of Memory Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-07-02

A security issue has been reported in the Linux Kernel, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/25895/


Other:--

[SA25902] Yoggie Pico Pro Shell Command Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-07-03

Cody Brocious has reported a vulnerability in Yoggie Pico Pro, which
can be exploited by malicious people to compromise a vulnerable
device.

Full Advisory:
http://secunia.com/advisories/25902/

 --

[SA25889] Xerox ESS/ Network Controller OpenSSL Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2007-06-29

Some vulnerabilities have been reported in Xerox ESS/ Network
Controller, which can be exploited by malicious people to cause a DoS
(Denial of Service) and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25889/

 --

[SA25943] Fujitsu PRIMERGY BX300 Web Interface Authentication Bypass

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass
Released:    2007-07-05

RedTeam Pentesting has reported a security issue in PRIMERGY BX300,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/25943/


Cross Platform:--

[SA25898] Ripe Website Manager File Inclusion and Information Exposure

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-07-02

Some vulnerabilities have been reported in Ripe Website Manager, which
can be exploited by malicious people to disclose sensitive information
or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/25898/

 --

[SA25928] PHP Director "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-07-03

Kw3rLn has discovered a vulnerability in PHP Director, which can be
exploited by malicious people to conduct SQL Injection attacks.

Full Advisory:
http://secunia.com/advisories/25928/

 --

[SA25927] AV Arcade "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, Manipulation of data
Released:    2007-07-03

Kw3rLn has discovered a vulnerability in AV Arcade, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25927/

 --

[SA25926] Elite Bulletin Board Two Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-07-04

Two vulnerabilities have been reported in Elite Bulletin Board, which
can be exploited by malicious users and malicious people to manipulate
certain data.

Full Advisory:
http://secunia.com/advisories/25926/

 --

[SA25924] bbs100 Multiple Denial of Service Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2007-07-03

Some vulnerabilities have been reported in bbs100, which potentially
can be exploited by malicious users or malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://secunia.com/advisories/25924/

 --

[SA25922] Youtube Script "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-07-02

t0pP8uZz & xprog has reported a vulnerability in Youtube Script, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25922/

 --

[SA25921] SuperCali PHP Event Calendar "o" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-07-04

A vulnerability has been discovered in SuperCali PHP Event Calendar,
which can be exploited by malicious people to conduct SQL Injection
attacks.

Full Advisory:
http://secunia.com/advisories/25921/

 --

[SA25916] ArcadeBuilder Game Portal Manager SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2007-07-04

A vulnerability has been reported in ArcadeBuilder Game Portal Manager,
which can be exploited by malicious people to conduct SQL Injection
attacks.

Full Advisory:
http://secunia.com/advisories/25916/

 --

[SA25915] phpEventCalendar "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-07-02

Iron has discovered a vulnerability in phpEventCalendar, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25915/

 --

[SA25901] 1-2-3 Music Store "CategoryID" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-07-03

A vulnerability has been reported in 1-2-3 Music Store, which can be
exploited by malicious people to conduct SQL Injection attacks.

Full Advisory:
http://secunia.com/advisories/25901/

 --

[SA25899] TotalCalendar "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-07-02

t0pP8uZz & xprog have reported a vulnerability in TotalCalendar, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25899/

 --

[SA25893] GL-SH Deaf Forum Two Local File Inclusion Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-06-29

Katatafish has discovered two vulnerabilities in GL-SH Deaf Forum,
which can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/25893/

 --

[SA25892] WebChat "rid" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-06-29

R00T[ATI] has discovered a vulnerability in WebChat, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/25892/

 --

[SA25947] ManageEngine NetFlow Analyzer Multiple Cross-Site Scripting
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-05

Lostmon has discovered some vulnerabilities in ManageEngine NetFlow
Analyzer, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25947/

 --

[SA25942] Zen Cart Session Fixation Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Hijacking
Released:    2007-07-05

Tomaz Bratusa has discovered a vulnerability in Zen Cart, which can be
exploited by malicious people to conduct session fixation attacks.

Full Advisory:
http://secunia.com/advisories/25942/

 --

[SA25929] Moodle "search" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-05

MustLive has discovered a vulnerability in Moodle, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25929/

 --

[SA25919] Oracle Rapid Install Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-05

A vulnerability has been reported in Oracle Rapid Install, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25919/

 --

[SA25907] PHP-Fusion "FUSION_QUERY" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-02

nights_shadow has discovered a vulnerability in PHP-Fusion, which can
be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/25907/

 --

[SA25887] Claroline "$_SERVER['PHP_SELF']" Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-07-02

munozferna has reported a vulnerability in Claroline, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/25887/

 --

[SA25904] Firefox "OnKeyDown" Event Focus Weakness

Critical:    Not critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-07-02

Carl Hardwick has discovered a weakness in Firefox, which potentially
can be exploited by malicious people to disclose sensitive
information.

Full Advisory:
http://secunia.com/advisories/25904/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support@private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


_____________________________________________________
Attend Black Hat USA, July 28-August 2 in Las Vegas, 
the world's premier technical event for ICT security 
experts. Featuring 30 hands-on training courses and 
90 Briefings presentations with lots of new content 
and new tools. Network with 4,000 delegates from 
70 nations.   Visit product displays by 30 top
sponsors in a relaxed setting. Rates increase on 
June 1 so register today. http://www.blackhat.com



This archive was generated by hypermail 2.1.3 : Thu Jul 05 2007 - 23:38:37 PDT