[ISN] Secunia Weekly Summary - Issue: 2008-45

From: InfoSec News <alerts_at_private>
Date: Fri, 7 Nov 2008 03:02:41 -0600 (CST)
========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2008-10-30 - 2008-11-06                        

                       This week: 77 advisories                        

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

Would you like to be notified when the vendor patch gets issued?

The Secunia Vulnerability Intelligence solutions allow you to be
notified via email & SMS as soon as any major update to the
vulnerability occurs. That could be a change in criticality rating,
exploit-code appeared in the wild, patch is issued by the vendor etc.
With the professional solutions you also get access to more detailed
information for work arounds, deep links and support from Secunia
Research.  This is intelligence not part of the mailing list or weekly
summary.

http://secunia.com/advisories/business_solutions/

========================================================================
2) This Week in Brief:

Multiple vulnerabilities have been reported in Adobe Reader/Acrobat,
which can be exploited by malicious, local users to gain escalated
privileges or by malicious people to compromise a user's system.

For more information, refer to:
http://secunia.com/advisories/29773/

 --

Two vulnerabilities have been reported in VLC Media Player, which
potentially can be exploited by malicious people to compromise a user's
system.

For more information, refer to:
http://secunia.com/advisories/32569/

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA29773] Adobe Acrobat/Reader Multiple Vulnerabilities
2.  [SA28083] Adobe Flash Player Multiple Vulnerabilities
3.  [SA31010] Sun Java JDK / JRE Multiple Vulnerabilities
4.  [SA21044] Mambo / Joomla perForms "mosConfig_absolute_path"
              File Inclusion
5.  [SA29106] Joomla! "mosConfig_absolute_path" File Inclusion
6.  [SA32326] Microsoft Windows Path Canonicalisation Vulnerability
7.  [SA32452] Opera Command Execution and Cross-Site Scripting
8.  [SA32361] Snoopy "_httpsrequest()" Shell Command Execution
              Vulnerability
9.  [SA32488] VMware ESX Server update for libxml2
10. [SA32419] OpenOffice Multiple Vulnerabilties and Security Issue

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA32546] NOS Microsystems getPlus ActiveX Control Buffer Overflow
[SA32513] Chilkat Crypt ActiveX Component "WriteFile()" Insecure
Method

UNIX/Linux:
[SA32538] Gentoo update for opera
[SA32514] Dns2tcp "dns_decode()" Buffer Overflow Vulnerability
[SA32493] Mahara Multiple Command Execution Vulnerabilities
[SA32489] Fedora update for openoffice.org
[SA32530] Ubuntu update for enscript
[SA32521] Fedora update for enscript
[SA32518] Fedora update for ktorrent
[SA32512] Fedora update for uw-imap
[SA32509] Ubuntu update for kernel
[SA32496] Gentoo update for libspf2
[SA32488] VMware ESX Server update for libxml2
[SA32483] UW-imapd "tmail" and "dmail" Buffer Overflow Vulnerabilities
[SA32545] HP-UX Xserver Multiple Vulnerabilities
[SA32553] PTK Command Execution Vulnerability
[SA32543] Nagios Cross-Site Request Forgery Vulnerability
[SA32482] Fedora update for phpMyAdmin
[SA32560] Net-snmp GETBULK Integer Overflow Denial of Service
[SA32539] Red Hat update for net-snmp
[SA32531] Fedora update for net-snmp
[SA32578] Debian update for mysql-dfsg-5.0
[SA32554] Novell Access Manger Identity Server X509 Session Improper
Termination
[SA32544] HP System Management Homepage Unspecified Privilege
Escalation
[SA32485] Red hat update for kernel
[SA32566] Ubuntu update for system-tools-backends
[SA32510] Linux Kernel "hfsplus_find_cat()" and
"hfsplus_block_allocate()" Denial of Service
[SA32487] CrossFire Map Pack combine.pl Insecure Temporary Files

Other:
[SA32498] SonicWALL Products Content Filtering Service Cross-Site
Scripting
[SA32573] Cisco IOS / CatOS VLAN Trunking Protocol Vulnerability

Cross Platform:
[SA32569] VLC Media Player CUE and RealText Processing Buffer
Overflows
[SA32551] Joomla Dada Mail Manager Component "mosConfig_absolute_path"
File Inclusion
[SA32533] Joomla VirtueMart Google Base Component
"mosConfig_absolute_path" File Inclusion
[SA32520] Joomla Flash Tree Gallery Component "mosConfig_live_site"
File Inclusion
[SA32516] Simple Machines Forum Multiple Vulnerabilities
[SA32515] Way Of The Warrior "plancia" File Inclusion Vulnerabilities
[SA32579] Five Dollar Scripts Drinks Script "recid" SQL Injection
Vulnerability
[SA32564] PHPX "news_id" SQL Injection Vulnerability
[SA32563] Pre Podcast Portal "id" SQL Injection Vulnerability
[SA32559] GeSHi Unspecified Code Execution Vulnerability
[SA32558] SFS Multiple Products "cat_id" SQL Injection
[SA32557] PreProjects Products Cookie Security Bypass Vulnerability
[SA32556] nicLOR Sito Includefile "page_file" Local File Inclusion
[SA32552] SFS EZ BIZ PRO "id" SQL Injection Vulnerability
[SA32550] SFS EZ Webring "cat" SQL Injection Vulnerability
[SA32548] Tribiq CMS "template_path" Cross-Site Scripting and Local
File Inclusion
[SA32547] PHP Auto Listings "itemno" SQL Injection Vulnerability
[SA32542] Logz CMS "art" SQL Injection and Cross-Site Scripting
[SA32540] U-Mail "edit.php" Arbitrary File Creation Vulnerability
[SA32536] SFS EZ Hotscripts-like Site Multiple SQL Injection
Vulnerabilities
[SA32532] SFS EZ Hot ot Not "phid" SQL Injection Vulnerability
[SA32528] SFS EZ Auction "cat" SQL Injection Vulnerability
[SA32527] SFS EZ Career "topic" SQL Injection Vulnerability
[SA32526] SFS EZ Top Sites "ts" SQL Injection Vulnerability
[SA32525] SFS EZ e-store "where" SQL Injection Vulnerability
[SA32524] SFS EZ Pub Site "cat" SQL Injection Vulnerability
[SA32523] Joomla Pro Desk Component "include_file" Local File Inclusion
Vulnerability
[SA32522] SFS EZ Gaming Cheats "id" SQL Injection Vulnerability
[SA32519] Article Publisher Pro SQL Injection Vulnerabilities
[SA32517] Acc Scripts Products "username_cookie" Cookie Security
Bypass
[SA32507] Acc PHP eMail "NEWSLETTERLOGIN" Cookie Security Bypass
Vulnerability
[SA32504] YourFreeWorld Products "id" SQL Injection Vulnerability
[SA32503] ToursManager "cityid" SQL Injection Vulnerability
[SA32502] Simple Document Management System "login" and "pass" SQL
Injection
[SA32500] PHP-Nuke BookCatalog Module "catid" SQL Injection
Vulnerability
[SA32497] Apache Struts Security Bypass and Directory Traversal
[SA32495] XWork "ParameterInterceptor" Security Bypass Vulnerability
[SA32492] YourFreeWorld Shopping Cart Script "c" SQL Injection
Vulnerability
[SA32491] Joovili Multiple Cookie Security Bypass Vulnerability
[SA32484] NetRisk Cross-Site Scripting and SQL Injection
Vulnerabilities
[SA32572] Drupal Content Construction Kit Script Insertion
Vulnerabilities
[SA32555] DHCart "order.php" Two Cross-Site Scripting Vulnerabilities
[SA32549] firmCHANNEL Digital Signage "action" Cross-Site Scripting
Vulnerability
[SA32511] RateMe Cross-Site Scripting and Cross-Site Request Forgery
[SA32506] SignMe "hash" Cross-Site Scripting Vulnerability
[SA32505] MyGallery "mghash" Cross-Site Scripting Vulnerability
[SA32567] Adobe ColdFusion Sandbox Security Bypass Vulnerability

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA32546] NOS Microsystems getPlus ActiveX Control Buffer Overflow

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-11-05

A vulnerability has been reported in the NOS Microsystems getPlus
ActiveX control, which can be exploited by malicious people to
compromise a user's system.

Full Advisory:
http://secunia.com/advisories/32546/

 --

[SA32513] Chilkat Crypt ActiveX Component "WriteFile()" Insecure
Method

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-11-04

shinnai has discovered a vulnerability in Chilkat Crypt ActiveX
Component, which can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/32513/


UNIX/Linux:--

[SA32538] Gentoo update for opera

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Cross Site Scripting, Spoofing, Exposure
of system information, Exposure of sensitive information, DoS, System
access
Released:    2008-11-04

Gentoo has issued an update for opera. This fixes some vulnerabilities,
which can be exploited by malicious people to disclose system and
potentially sensitive information, conduct spoofing and cross-site
scripting attacks,  bypass certain security restrictions, and
potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/32538/

 --

[SA32514] Dns2tcp "dns_decode()" Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-11-03

A vulnerability has been reported in Dns2tcp, which can be exploited by
malicious people to cause a DoS (Denial of Service) and potentially
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/32514/

 --

[SA32493] Mahara Multiple Command Execution Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-11-05

Some vulnerabilities have been reported in Mahara, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/32493/

 --

[SA32489] Fedora update for openoffice.org

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-10-31

Fedora has issued an update for openoffice.org. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/32489/

 --

[SA32530] Ubuntu update for enscript

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2008-11-04

Ubuntu has issued an update for enscript. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/32530/

 --

[SA32521] Fedora update for enscript

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2008-11-06

Fedora has issued an update for enscript. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/32521/

 --

[SA32518] Fedora update for ktorrent

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, System access
Released:    2008-11-06

Fedora has issued an update for ktorrent. This fixes some
vulnerabilities, which can be exploited by malicious users to
compromise a vulnerable system and malicious people to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/32518/

 --

[SA32512] Fedora update for uw-imap

Critical:    Moderately critical
Where:       From remote
Impact:      Privilege escalation, System access
Released:    2008-11-06

Fedora has issued an update for uw-imap. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
potentially gain escalated privileges, and by malicious people to
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/32512/

 --

[SA32509] Ubuntu update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-11-05

Ubuntu has issued an update for the kernel. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or to potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/32509/

 --

[SA32496] Gentoo update for libspf2

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2008-10-31

Gentoo has issued an update for libspf2. This fixes a vulnerability,
which can be exploited by malicious people to potentially compromise an
application using the library.

Full Advisory:
http://secunia.com/advisories/32496/

 --

[SA32488] VMware ESX Server update for libxml2

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2008-10-31

VMware has issued an update for VMware ESX Server. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/32488/

 --

[SA32483] UW-imapd "tmail" and "dmail" Buffer Overflow Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Privilege escalation, System access
Released:    2008-11-03

Two vulnerabilities have been reported in UW-imapd, which can be
exploited by malicious, local users to potentially gain escalated
privileges, and by malicious people to potentially compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/32483/

 --

[SA32545] HP-UX Xserver Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      Privilege escalation, DoS, System access
Released:    2008-11-04

HP has acknowledged some vulnerabilities in HP-UX, which can be
exploited by malicious, local users to disclose potentially sensitive
information or gain escalated privileges, and by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/32545/

 --

[SA32553] PTK Command Execution Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      System access
Released:    2008-11-06

A vulnerability has been reported in PTK, which can be exploited by
malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/32553/

 --

[SA32543] Nagios Cross-Site Request Forgery Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-11-05

A vulnerability has been reported in Nagios, which can be exploited by
malicious people to conduct cross-site request forgery attacks.

Full Advisory:
http://secunia.com/advisories/32543/

 --

[SA32482] Fedora update for phpMyAdmin

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-10-31

Fedora has issued an update for phpMyAdmin. This fixes a vulnerability,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/32482/

 --

[SA32560] Net-snmp GETBULK Integer Overflow Denial of Service

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2008-11-03

A vulnerability has been reported in Net-snmp, which can be exploited
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/32560/

 --

[SA32539] Red Hat update for net-snmp

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2008-11-04

Red Hat has issued an update for net-snmp. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/32539/

 --

[SA32531] Fedora update for net-snmp

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2008-11-06

Fedora has issued an update for net-snmp. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/32531/

 --

[SA32578] Debian update for mysql-dfsg-5.0

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2008-11-06

Debian has issued an update for mysql-dfsg-5.0. This fixes a security
issue, which can be exploited by malicious, local users to bypass
certain security restrictions.

Full Advisory:
http://secunia.com/advisories/32578/

 --

[SA32554] Novell Access Manger Identity Server X509 Session Improper
Termination

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2008-11-05

A security issue has been reported in Novell Access Manager Identity
Server, which can be exploited by malicious, local users to bypass
certain security restrictions.

Full Advisory:
http://secunia.com/advisories/32554/

 --

[SA32544] HP System Management Homepage Unspecified Privilege
Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2008-11-04

A vulnerability has been reported in HP System Management Homepage
(SMH), which can be exploited by malicious, local users to perform
certain actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/32544/

 --

[SA32485] Red hat update for kernel

Critical:    Less critical
Where:       Local system
Impact:      DoS, Privilege escalation, Exposure of sensitive
information
Released:    2008-11-04

Red Hat has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service), to disclose potentially sensitive
information, or to potentially gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/32485/

 --

[SA32566] Ubuntu update for system-tools-backends

Critical:    Not critical
Where:       From remote
Impact:      Brute force
Released:    2008-11-06

Ubuntu has issued an update for system-tools-backend. This fixes a
weakness, which can be exploited by malicious people to conduct brute
force attacks.

Full Advisory:
http://secunia.com/advisories/32566/

 --

[SA32510] Linux Kernel "hfsplus_find_cat()" and
"hfsplus_block_allocate()" Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2008-11-04

Some vulnerabilities have been reported in the Linux Kernel, which can
be exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/32510/

 --

[SA32487] CrossFire Map Pack combine.pl Insecure Temporary Files

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2008-10-31

A security issue has been reported in CrossFire, which can be exploited
by malicious, local users to perform certain actions with escalated
privileges.

Full Advisory:
http://secunia.com/advisories/32487/


Other:--

[SA32498] SonicWALL Products Content Filtering Service Cross-Site
Scripting

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-10-31

A vulnerability has been reported in various SonicWALL products, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/32498/

 --

[SA32573] Cisco IOS / CatOS VLAN Trunking Protocol Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      DoS
Released:    2008-11-06

A vulnerability has been reported in Cisco IOS/CatOS, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/32573/


Cross Platform:--

[SA32569] VLC Media Player CUE and RealText Processing Buffer
Overflows

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-11-06

Two vulnerabilities have been reported in VLC Media Player, which
potentially can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/32569/

 --

[SA32551] Joomla Dada Mail Manager Component "mosConfig_absolute_path"
File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-11-06

NoGe has discovered a vulnerability in the Dada Mail Manager component
for Joomla, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/32551/

 --

[SA32533] Joomla VirtueMart Google Base Component
"mosConfig_absolute_path" File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-11-05

NoGe has discovered a vulnerability in the VirtueMart Google Base
component for Joomla, which can be exploited by malicious people to
compromise a vulnerable system

Full Advisory:
http://secunia.com/advisories/32533/

 --

[SA32520] Joomla Flash Tree Gallery Component "mosConfig_live_site"
File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2008-11-03

NoGe has reported a vulnerability in the Flash Tree Gallery component
for Joomla!, which can be exploited by malicious people to compromise a
vulnerable system.

Full Advisory:
http://secunia.com/advisories/32520/

 --

[SA32516] Simple Machines Forum Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of sensitive information,
System access
Released:    2008-11-05

Some vulnerabilities have been discovered in Simple Machines Forum,
which can be exploited by malicious people to conduct cross-site
request forgery attacks and by malicious users to disclose potentially
sensitive information and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/32516/

 --

[SA32515] Way Of The Warrior "plancia" File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of sensitive information, System access
Released:    2008-11-05

Some vulnerabilities have been discovered in Way Of The Warrior (WOTW),
which can be exploited by malicious people to disclose sensitive
information or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/32515/

 --

[SA32579] Five Dollar Scripts Drinks Script "recid" SQL Injection
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-11-06

Ex Tacy has reported a vulnerability in Five Dollar Scripts Drinks
script, which can be exploited by malicious people to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/32579/

 --

[SA32564] PHPX "news_id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-11-06

StAkeR has discovered a vulnerability in PHPX, which can be exploited
by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32564/

 --

[SA32563] Pre Podcast Portal "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-11-06

G4N0K has reported a vulnerability in Pre Podcast Portal, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32563/

 --

[SA32559] GeSHi Unspecified Code Execution Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2008-11-03

A vulnerability has been reported in GeSHI, which can potentially be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/32559/

 --

[SA32558] SFS Multiple Products "cat_id" SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-11-03

A vulnerability has been reported in multiple SFS products, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32558/

 --

[SA32557] PreProjects Products Cookie Security Bypass Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-11-06

G4N0K has reported a vulnerability in multiple PreProjects products,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/32557/

 --

[SA32556] nicLOR Sito Includefile "page_file" Local File Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2008-11-05

StAkeR has discovered a vulnerability in nicLOR Sito Includefile, which
can be exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/32556/

 --

[SA32552] SFS EZ BIZ PRO "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-11-03

d3b4g has reported a vulnerability in SFS EZ BIZ PRO, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32552/

 --

[SA32550] SFS EZ Webring "cat" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-11-03

d3b4g has reported a vulnerability in SFS EZ Webring, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32550/

 --

[SA32548] Tribiq CMS "template_path" Cross-Site Scripting and Local
File Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of system information,
Exposure of sensitive information
Released:    2008-11-03

Some vulnerabilities have been discovered in Tribiq CMS, which can be
exploited by malicious people to conduct cross-site scripting attacks
or to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/32548/

 --

[SA32547] PHP Auto Listings "itemno" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-11-06

G4N0K has reported a vulnerability in PHP Auto Listings, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32547/

 --

[SA32542] Logz CMS "art" SQL Injection and Cross-Site Scripting

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2008-11-03

Some vulnerabilities have been discovered in Logz CMS, which can be
exploited by malicious people to conduct cross-site scripting and SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/32542/

 --

[SA32540] U-Mail "edit.php" Arbitrary File Creation Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, System access
Released:    2008-11-05

Shennan Wang has reported a vulnerability in U-Mail, which can be
exploited by malicious users to bypass certain security restrictions
and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/32540/

 --

[SA32536] SFS EZ Hotscripts-like Site Multiple SQL Injection
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-11-03

Some vulnerabilities have been reported in SFS EZ Hotscripts-like Site,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/32536/

 --

[SA32532] SFS EZ Hot ot Not "phid" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-11-03

d3b4g has reported a vulnerability in SFS EZ Hot ot Not, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32532/

 --

[SA32528] SFS EZ Auction "cat" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, Manipulation of data
Released:    2008-11-03

Mountassif Moad has reported a vulnerability in SFS EZ Auction, which
can be exploited by malicious people to conduct SQL Injection attacks.

Full Advisory:
http://secunia.com/advisories/32528/

 --

[SA32527] SFS EZ Career "topic" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-11-03

Mountassif Moad has reported a vulnerability in SFS EZ Career, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32527/

 --

[SA32526] SFS EZ Top Sites "ts" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-11-03

Mountassif Moad has reported a vulnerability in SFS EZ Top Sites, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32526/

 --

[SA32525] SFS EZ e-store "where" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-11-03

ZoRLu has reported a vulnerability in SFS EZ e-store, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32525/

 --

[SA32524] SFS EZ Pub Site "cat" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-11-03

Hakxer has reported a vulnerability in SFS EZ Pub Site, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32524/

 --

[SA32523] Joomla Pro Desk Component "include_file" Local File Inclusion
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2008-11-05

d3v1l has reported a vulnerability in the Pro Desk component for
Joomla, which can be exploited by malicious people to disclose
sensitive information.

Full Advisory:
http://secunia.com/advisories/32523/

 --

[SA32522] SFS EZ Gaming Cheats "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-11-03

ZoRLu has reported a vulnerability in SFS EZ Gaming Cheats, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32522/

 --

[SA32519] Article Publisher Pro SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Manipulation of data
Released:    2008-11-03

Some vulnerabilities have been reported in Article Publisher Pro, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32519/

 --

[SA32517] Acc Scripts Products "username_cookie" Cookie Security
Bypass

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-11-04

Hakxer has reported a vulnerability in multiple Acc Scripts products,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/32517/

 --

[SA32507] Acc PHP eMail "NEWSLETTERLOGIN" Cookie Security Bypass
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-11-04

Hakxer has reported a vulnerability in Acc PHP eMail, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/32507/

 --

[SA32504] YourFreeWorld Products "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-11-03

Hussin X has reported a vulnerability in various YourFreeWorld
products, which can be exploited by malicious people to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/32504/

 --

[SA32503] ToursManager "cityid" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-11-05

G4N0K has reported a vulnerability in ToursManager, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32503/

 --

[SA32502] Simple Document Management System "login" and "pass" SQL
Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-11-05

Yuri has discovered a vulnerability in Simple Document Management
System (SDMS), which can be exploited by malicious people to conduct
SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32502/

 --

[SA32500] PHP-Nuke BookCatalog Module "catid" SQL Injection
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2008-10-31

Ehsan_Hp200 has reported a vulnerability in the BookCatalog module for
PHP-Nuke, which can be exploited by malicious people to conduct SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/32500/

 --

[SA32497] Apache Struts Security Bypass and Directory Traversal

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of system information, Exposure
of sensitive information
Released:    2008-11-04

Some vulnerabilities have been reported in Apache Struts, which can be
exploited by malicious people to bypass certain security restrictions
or to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/32497/

 --

[SA32495] XWork "ParameterInterceptor" Security Bypass Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-11-04

A vulnerability has been reported in XWork, which can be exploited by
malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/32495/

 --

[SA32492] YourFreeWorld Shopping Cart Script "c" SQL Injection
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2008-11-03

Hussin X has reported a vulnerability in YourFreeWorld Shopping Cart
Script with Affiliate Program, which can be exploited by malicious
people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/32492/

 --

[SA32491] Joovili Multiple Cookie Security Bypass Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2008-11-03

ZoRLu has reported a vulnerability in Joovili, which can be exploited
by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/32491/

 --

[SA32484] NetRisk Cross-Site Scripting and SQL Injection
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2008-11-03

StAkeR has discovered some vulnerabilities in NetRisk, which can be
exploited by malicious people to conduct cross-site scripting and SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/32484/

 --

[SA32572] Drupal Content Construction Kit Script Insertion
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-11-06

Some vulnerabilities have been reported in the Drupal Content
Construction Kit (CCK), which can be exploited by malicious users to
conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/32572/

 --

[SA32555] DHCart "order.php" Two Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-11-05

Lostmon has reported two vulnerabilities in DHCart, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/32555/

 --

[SA32549] firmCHANNEL Digital Signage "action" Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-11-05

Brad Antoniewicz has reported a vulnerability in firmCHANNEL Digital
Signage, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/32549/

 --

[SA32511] RateMe Cross-Site Scripting and Cross-Site Request Forgery

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-11-03

Russ McRee has reported some vulnerabilities in RateMe, which can be
exploited by malicious people to conduct cross-site request forgery and
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/32511/

 --

[SA32506] SignMe "hash" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-11-03

Russ McRee has discovered a vulnerability in SignMe, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/32506/

 --

[SA32505] MyGallery "mghash" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2008-11-03

Russ McRee has discovered a vulnerability in MyGallery, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/32505/

 --

[SA32567] Adobe ColdFusion Sandbox Security Bypass Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2008-11-06

A vulnerability has been reported in Adobe ColdFusion, which can be
exploited by malicious, local users to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/32567/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/

Subscribe:
http://secunia.com/advisories/weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support_at_private
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


______________________________________________      
Visit the InfoSec News Security Bookstore
Best Selling Security Books and More!
http://www.shopinfosecnews.org 
Received on Fri Nov 07 2008 - 01:02:41 PST

This archive was generated by hypermail 2.2.0 : Fri Nov 07 2008 - 01:08:30 PST