======================================================================== The Secunia Weekly Advisory Summary 2008-11-13 - 2008-11-20 This week: 70 advisories ======================================================================== Table of Contents: 1.....................................................Word From Secunia 2....................................................This Week In Brief 3...............................This Weeks Top Ten Most Read Advisories 4.......................................Vulnerabilities Summary Listing 5.......................................Vulnerabilities Content Listing ======================================================================== 1) Word From Secunia: Would you like to be notified when a vendor patch is released? The Secunia Vulnerability Intelligence solutions allow you to be notified via E-mail/XML/SMS whenever a major update to a vulnerability advisory occurs. A change in our assessment rating, exploit code availability, or if an updated patch is released by the vendor. Through our commercial solutions you have access to most detailed intelligence on workarounds, access to deep links, and to the Secunia research team when additional investigation is required. This intelligence is not part of the mailing-list or the weekly summary from Secunia. Click here to learn more: http://secunia.com/advisories/business_solutions/ ======================================================================== 2) This Week in Brief: Some vulnerabilities have been reported in Apple Safari, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose sensitive information or compromise a user's system. For more information, refer to: http://secunia.com/advisories/32706/ -- Some vulnerabilities have been reported in Symantec Backup Exec for Windows Servers, which can be exploited by malicious people to bypass certain security restrictions and by malicious users to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. For more information, refer to: http://secunia.com/advisories/32810/ -- Some vulnerabilities have been reported in Adobe AIR, which can be exploited by malicious people to compromise a user's system. For more information, refer to: http://secunia.com/advisories/32772/ ======================================================================== 3) This Weeks Top Ten Most Read Advisories: 1. [SA32713] Mozilla Firefox 3 Multiple Vulnerabilities 2. [SA31010] Sun Java JDK / JRE Multiple Vulnerabilities 3. [SA32270] Adobe Flash Player Multiple Security Issues and Vulnerabilities 4. [SA32706] Apple Safari Multiple Vulnerabilities 5. [SA32719] Linux Kernel "hfs_cat_find_brec()" Buffer Overflow Vulnerability 6. [SA32693] Mozilla Firefox 2 Multiple Vulnerabilities 7. [SA32670] Sun Java System Messaging Server Cross-Site Scripting Vulnerability 8. [SA32760] OpenSSH CBC Mode Plaintext Recovery Vulnerability 9. [SA32697] Ubuntu vm-builder Root Password Vulnerability 10. [SA32676] Sun StarOffice/StarSuite Multiple Vulnerabilities ======================================================================== 4) Vulnerabilities Summary Listing Windows: [SA32772] Adobe AIR Multiple Vulnerabilities [SA32743] GungHo LoadPrgAx ActiveX Control Vulnerability [SA32729] Exodus Improper "im://" URI Handling Vulnerability [SA32725] VeryDOC PDF Viewer ActiveX Control "OpenPDF()" Buffer Overflow [SA32785] Pre ASP Job Board "Username" and "Password" SQL Injection [SA32750] Openasp "idpage" SQL Injection Vulnerability [SA32810] Symantec Backup Exec for Windows Servers Multiple Vulnerabilities [SA32771] Flash Media Server Video Stream Capture Security Issue [SA32738] Chilkat Socket ActiveX Component "SaveLastError()" Insecure Method UNIX/Linux: [SA32798] Red Hat update for thunderbird [SA32796] imlib2 XPM Processing Buffer Overflow Vulnerability [SA32778] Ubuntu update for firefox, firefox-3.0, and xulrunner-1.9 [SA32766] Red Hat update for libxml2 [SA32764] Ubuntu update for libxml2 [SA32762] Debian update for libxml2 [SA32749] Slackware update for mozilla-firefox [SA32748] Slackware update for seamonkey [SA32721] Fedora update for firefox and xulrunner [SA32811] Slackware update for libxml2 [SA32807] rPath update for libxml2 [SA32802] Fedora update for libxml2 [SA32793] Debian update for python2.4 [SA32773] Libxml2 Two Integer Overflow Vulnerabilities [SA32765] Ubuntu update for clamav [SA32759] SUSE Update for Multiple Packages [SA32753] rPath update for enscript [SA32746] Gentoo update for php [SA32720] Astaro update for libspf2 [SA32805] Fedora update for roundup [SA32803] Fedora update for grip [SA32800] HP OpenView Network Node Manager Cross-Site Scripting Vulnerabilities [SA32768] Dovecot ManageSieve Directory Traversal Security Issue [SA32761] No-IP Linux Dynamic Update Client Buffer Overflow Vulnerability [SA32719] Linux Kernel "hfs_cat_find_brec()" Buffer Overflow Vulnerability [SA32769] Ubuntu update for mysql-dfsg-5.0 [SA32760] OpenSSH CBC Mode Plaintext Recovery Vulnerability [SA32820] SystemImager "si_mkbootserver" Insecure Temporary Files [SA32780] pam_mount "passwdehd" Insecure Temporary Files [SA32774] Citrix XenServer Ext2/Ext3 Processing Security Bypass Vulnerability [SA32730] MailScanner "trend-autoupdate" Insecure Temporary Files [SA32804] Fedora update for cobbler [SA32737] Cobbler Web Interface Privilege Escalation Vulnerability [SA32818] P3nfs Insecure Temporary Files [SA32799] Red Hat update for kernel [SA32792] Ubuntu update for hplip Other: [SA32716] Netgear WGR614 Web Interface Request Denial of Service Cross Platform: [SA32745] Free Directory Script "API_HOME_DIR" File Inclusion Vulnerability [SA32734] phpFan "includepath" File Inclusion Vulnerability [SA32783] W3matter Multiple Products "f[password]" SQL Injection Vulnerability [SA32751] mxCamArchive Information Disclosure and PHP Code Execution [SA32747] E-topbiz AdManager "group" SQL Injection Vulnerability [SA32744] ScriptsEz FREEze Greetings "pwd.txt" Information Disclosure [SA32741] PHPStore Wholesales "id" SQL Injection Vulnerability [SA32736] Pluck "g_pcltar_lib_dir" Local File Inclusion Vulnerability [SA32733] Jadu Galaxies "categoryID" SQL Injection Vulnerability [SA32732] TurnkeyForms Text Link Sales SQL Injection and Security Bypass [SA32727] Simple Customer "email" and "password" SQL Injection Vulnerabilities [SA32726] SaturnCMS Multiple SQL Injection Vulnerabilities [SA32724] Ultrastats "serverid" SQL Injection Vulnerability [SA32718] VideoScript "admin/cp.php" Security Bypass Vulnerability [SA32717] PHPStore Yahoo Answers "id" SQL Injection Vulnerability [SA32815] refbase "headerMsg" Cross-Site Scripting Vulnerability [SA32788] MyTopix "send" SQL Injection Vulnerability [SA32779] KimsON Cross-Site Scripting Vulnerability [SA32757] BoutikOne CMS "search_query" Cross-Site Scripting [SA32739] Streber Unspecified Cross-Site Request Forgery Vulnerabilities [SA32740] SSH Tectia Products CBC Mode Plaintext Recovery Vulnerability [SA32775] vBulletin SQL Injection Vulnerabilities [SA32752] Opera "file://" URI Handling Buffer Overflow Vulnerability [SA32735] vBulletin Calender SQL Injection Vulnerability ======================================================================== 5) Vulnerabilities Content Listing Windows:-- [SA32772] Adobe AIR Multiple Vulnerabilities Critical: Highly critical Where: From remote Impact: System access Released: 2008-11-18 Some vulnerabilities have been reported in Adobe AIR, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/32772/ -- [SA32743] GungHo LoadPrgAx ActiveX Control Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2008-11-17 A vulnerability has been reported in the GungHo LoadPrgAx ActiveX control, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/32743/ -- [SA32729] Exodus Improper "im://" URI Handling Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2008-11-18 strawdog has discovered a vulnerability in Exodus, which can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/32729/ -- [SA32725] VeryDOC PDF Viewer ActiveX Control "OpenPDF()" Buffer Overflow Critical: Highly critical Where: From remote Impact: System access Released: 2008-11-17 r0ut3r has discovered a vulnerability in the VeryDOC PDF Viewer ActiveX control, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/32725/ -- [SA32785] Pre ASP Job Board "Username" and "Password" SQL Injection Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data Released: 2008-11-20 R3d-D3v!L has reported some vulnerabilities in Pre ASP Job Board, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/32785/ -- [SA32750] Openasp "idpage" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-11-18 athos has discovered a vulnerability in Openasp, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/32750/ -- [SA32810] Symantec Backup Exec for Windows Servers Multiple Vulnerabilities Critical: Moderately critical Where: From local network Impact: Security Bypass, DoS, System access Released: 2008-11-20 Some vulnerabilities have been reported in Symantec Backup Exec for Windows Servers, which can be exploited by malicious people to bypass certain security restrictions and by malicious users to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/32810/ -- [SA32771] Flash Media Server Video Stream Capture Security Issue Critical: Less critical Where: From remote Impact: Security Bypass Released: 2008-11-18 A security issue has been reported in Flash Media Server, which can be exploited by malicious people to capture content. Full Advisory: http://secunia.com/advisories/32771/ -- [SA32738] Chilkat Socket ActiveX Component "SaveLastError()" Insecure Method Critical: Less critical Where: From remote Impact: Manipulation of data Released: 2008-11-18 Zigma has discovered a vulnerability in Chilkat Socket ActiveX Component, which can be exploited by malicious people to overwrite arbitrary files. Full Advisory: http://secunia.com/advisories/32738/ UNIX/Linux:-- [SA32798] Red Hat update for thunderbird Critical: Highly critical Where: From remote Impact: Security Bypass, Exposure of system information, Exposure of sensitive information, System access Released: 2008-11-20 Red Hat has issued an update for thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or compromise a user's system. Full Advisory: http://secunia.com/advisories/32798/ -- [SA32796] imlib2 XPM Processing Buffer Overflow Vulnerability Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2008-11-20 A vulnerability has been discovered in imlib2, which can be exploited by malicious people to potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/32796/ -- [SA32778] Ubuntu update for firefox, firefox-3.0, and xulrunner-1.9 Critical: Highly critical Where: From remote Impact: Security Bypass, Exposure of system information, Exposure of sensitive information, System access Released: 2008-11-19 Ubuntu has issued an update for firefox, firefox-3.0, and xulrunner-1.9. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or compromise a user's system. Full Advisory: http://secunia.com/advisories/32778/ -- [SA32766] Red Hat update for libxml2 Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2008-11-18 Red Hat has issued an update for libxml2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/32766/ -- [SA32764] Ubuntu update for libxml2 Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2008-11-19 Ubuntu has issued an update for libxml2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/32764/ -- [SA32762] Debian update for libxml2 Critical: Highly critical Where: From remote Impact: DoS, System access Released: 2008-11-18 Debian has issued an update for libxml2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/32762/ -- [SA32749] Slackware update for mozilla-firefox Critical: Highly critical Where: From remote Impact: System access, Exposure of sensitive information, Exposure of system information, Security Bypass Released: 2008-11-17 Slackware has issued an update for mozilla-firefox. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or compromise a user's system. Full Advisory: http://secunia.com/advisories/32749/ -- [SA32748] Slackware update for seamonkey Critical: Highly critical Where: From remote Impact: Security Bypass, Exposure of system information, Exposure of sensitive information, System access Released: 2008-11-17 Slackware has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or compromise a user's system. Full Advisory: http://secunia.com/advisories/32748/ -- [SA32721] Fedora update for firefox and xulrunner Critical: Highly critical Where: From remote Impact: Security Bypass, Exposure of system information, Exposure of sensitive information, System access Released: 2008-11-14 Fedora has issued an update for firefox and xulrunner. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or compromise a user's system. Full Advisory: http://secunia.com/advisories/32721/ -- [SA32811] Slackware update for libxml2 Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2008-11-20 Slackware has issued an update for libxml2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/32811/ -- [SA32807] rPath update for libxml2 Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2008-11-20 rPath has issued an update for libxml2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/32807/ -- [SA32802] Fedora update for libxml2 Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2008-11-20 Fedora has issued an update for libxml2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/32802/ -- [SA32793] Debian update for python2.4 Critical: Moderately critical Where: From remote Impact: Unknown, DoS, System access Released: 2008-11-20 Debian has issued an update for python2.4. This fixes some vulnerabilities, where some have unknown impact and others can potentially be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/32793/ -- [SA32773] Libxml2 Two Integer Overflow Vulnerabilities Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2008-11-18 Two vulnerabilities have been reported in Libxml2, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/32773/ -- [SA32765] Ubuntu update for clamav Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2008-11-18 Ubuntu has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/32765/ -- [SA32759] SUSE Update for Multiple Packages Critical: Moderately critical Where: From remote Impact: Security Bypass, DoS, System access Released: 2008-11-17 SUSE has issued an update for multiple packages. This fixes some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions, disclose potentially sensitive information, or potentially gain escalated privileges, by malicious users to cause a DoS (Denial of Service), and by malicious people to bypass certain security restrictions, disclose potentially sensitive information, cause a DoS, or potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/32759/ -- [SA32753] rPath update for enscript Critical: Moderately critical Where: From remote Impact: System access Released: 2008-11-18 rPath has issued an update for enscript. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/32753/ -- [SA32746] Gentoo update for php Critical: Moderately critical Where: From remote Impact: Unknown, Security Bypass, Exposure of sensitive information, DoS, System access Released: 2008-11-17 Gentoo has issued an update for php. This fixes some vulnerabilities, where some have unknown impacts and others can be exploited by malicious users to bypass certain security restrictions, and potentially by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), or to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/32746/ -- [SA32720] Astaro update for libspf2 Critical: Moderately critical Where: From remote Impact: DoS, System access Released: 2008-11-14 Astaro has issued an update for libspf2. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise an application using the library. Full Advisory: http://secunia.com/advisories/32720/ -- [SA32805] Fedora update for roundup Critical: Less critical Where: From remote Impact: Security Bypass Released: 2008-11-20 Fedora has issued an update for roundup. This fixes a security issue, which can be exploited by malicious users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/32805/ -- [SA32803] Fedora update for grip Critical: Less critical Where: From remote Impact: System access Released: 2008-11-20 Fedora has issued an update for grip. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/32803/ -- [SA32800] HP OpenView Network Node Manager Cross-Site Scripting Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-11-20 HP has acknowledged some vulnerabilities in OpenView Network Node Manager, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/32800/ -- [SA32768] Dovecot ManageSieve Directory Traversal Security Issue Critical: Less critical Where: From remote Impact: Security Bypass Released: 2008-11-18 A security issue has been reported in Dovecot ManageSieve, which can be exploited by malicious users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/32768/ -- [SA32761] No-IP Linux Dynamic Update Client Buffer Overflow Vulnerability Critical: Less critical Where: From remote Impact: System access Released: 2008-11-19 xenomuta has reported a vulnerability in No-IP Linux Dynamic Update Client (DUC), which potentially can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/32761/ -- [SA32719] Linux Kernel "hfs_cat_find_brec()" Buffer Overflow Vulnerability Critical: Less critical Where: From remote Impact: DoS, System access Released: 2008-11-14 A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/32719/ -- [SA32769] Ubuntu update for mysql-dfsg-5.0 Critical: Less critical Where: From local network Impact: Security Bypass, DoS Released: 2008-11-18 Ubuntu has issued an update for mysql-dfsg-5.0. This fixes a security issue and a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions and malicious users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/32769/ -- [SA32760] OpenSSH CBC Mode Plaintext Recovery Vulnerability Critical: Less critical Where: From local network Impact: Exposure of sensitive information Released: 2008-11-17 A vulnerability has been reported in OpenSSH, which potentially can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/32760/ -- [SA32820] SystemImager "si_mkbootserver" Insecure Temporary Files Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2008-11-20 A security issue has been reported in SystemImager, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/32820/ -- [SA32780] pam_mount "passwdehd" Insecure Temporary Files Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2008-11-20 A security issue has been reported in pam_mount, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/32780/ -- [SA32774] Citrix XenServer Ext2/Ext3 Processing Security Bypass Vulnerability Critical: Less critical Where: Local system Impact: Security Bypass Released: 2008-11-19 A vulnerability has been reported in Citrix XenServer, which can be exploited by malicious, local users to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/32774/ -- [SA32730] MailScanner "trend-autoupdate" Insecure Temporary Files Critical: Less critical Where: Local system Impact: Privilege escalation Released: 2008-11-20 A security issue has been reported in MailScanner, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/32730/ -- [SA32804] Fedora update for cobbler Critical: Not critical Where: From remote Impact: Privilege escalation Released: 2008-11-20 Fedora has issued an update for cobbler. This fixes a vulnerability, which can be exploited by malicious users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/32804/ -- [SA32737] Cobbler Web Interface Privilege Escalation Vulnerability Critical: Not critical Where: From remote Impact: Privilege escalation Released: 2008-11-17 A vulnerability has been reported in Cobbler, which can be exploited by malicious users to gain escalated privileges. Full Advisory: http://secunia.com/advisories/32737/ -- [SA32818] P3nfs Insecure Temporary Files Critical: Not critical Where: Local system Impact: Privilege escalation Released: 2008-11-20 A security issue has been reported in P3nfs, which can be exploited by malicious, local users to perform certain actions with escalated privileges. Full Advisory: http://secunia.com/advisories/32818/ -- [SA32799] Red Hat update for kernel Critical: Not critical Where: Local system Impact: Privilege escalation, DoS Released: 2008-11-20 Red Hat has issued an update for the kernel. This fixes a security issue and some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges. Full Advisory: http://secunia.com/advisories/32799/ -- [SA32792] Ubuntu update for hplip Critical: Not critical Where: Local system Impact: DoS Released: 2008-11-20 Ubuntu has issued an update for hplip. This fixes a security issue, which can be exploited by malicious, local users to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/32792/ Other:-- [SA32716] Netgear WGR614 Web Interface Request Denial of Service Critical: Less critical Where: From local network Impact: DoS Released: 2008-11-18 sr. has reported a vulnerability in Netgear WGR614v9, which can be exploited by malicious people to cause a DoS (Denial of Service). Full Advisory: http://secunia.com/advisories/32716/ Cross Platform:-- [SA32745] Free Directory Script "API_HOME_DIR" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2008-11-19 Ghost Hacker has discovered a vulnerability in Free Directory Script, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/32745/ -- [SA32734] phpFan "includepath" File Inclusion Vulnerability Critical: Highly critical Where: From remote Impact: System access Released: 2008-11-18 Ahmadbady has reported a vulnerability in phpFan, which can be exploited by malicious people to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/32734/ -- [SA32783] W3matter Multiple Products "f[password]" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data Released: 2008-11-20 Some vulnerabilities have been reported in multiple W3matter products, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/32783/ -- [SA32751] mxCamArchive Information Disclosure and PHP Code Execution Critical: Moderately critical Where: From remote Impact: Exposure of sensitive information, System access Released: 2008-11-18 Ahmadbady has discovered some vulnerabilities in mxCamArchive, which can be exploited by malicious people to disclose sensitive information and malicious users to compromise a vulnerable system. Full Advisory: http://secunia.com/advisories/32751/ -- [SA32747] E-topbiz AdManager "group" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-11-18 Hussin X has reported a vulnerability in E-topbiz AdManager, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/32747/ -- [SA32744] ScriptsEz FREEze Greetings "pwd.txt" Information Disclosure Critical: Moderately critical Where: From remote Impact: Security Bypass, Exposure of sensitive information Released: 2008-11-18 cOndemned has discovered a security issue in ScriptsEz FREEze Greetings, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/32744/ -- [SA32741] PHPStore Wholesales "id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-11-17 Hussin X has reported a vulnerability in PHPStore Wholesales, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/32741/ -- [SA32736] Pluck "g_pcltar_lib_dir" Local File Inclusion Vulnerability Critical: Moderately critical Where: From remote Impact: Exposure of system information, Exposure of sensitive information Released: 2008-11-18 Digital Security Research Group have reported a vulnerability in Pluck, which can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/32736/ -- [SA32733] Jadu Galaxies "categoryID" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-11-18 ZoRLu has reported a vulnerability in Jadu Galaxies, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/32733/ -- [SA32732] TurnkeyForms Text Link Sales SQL Injection and Security Bypass Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data Released: 2008-11-17 Some vulnerabilities have been reported in TurnkeyForms Text Link Sales, which can be exploited by malicious people to bypass certain security restrictions and by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/32732/ -- [SA32727] Simple Customer "email" and "password" SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-11-18 d3b4g has discovered some vulnerabilities in Simple Customer, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/32727/ -- [SA32726] SaturnCMS Multiple SQL Injection Vulnerabilities Critical: Moderately critical Where: From remote Impact: Security Bypass, Manipulation of data Released: 2008-11-18 Hussin X has reported some vulnerabilities in SaturnCMS, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/32726/ -- [SA32724] Ultrastats "serverid" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-11-18 eek has discovered a vulnerability in Ultrastats, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/32724/ -- [SA32718] VideoScript "admin/cp.php" Security Bypass Vulnerability Critical: Moderately critical Where: From remote Impact: Security Bypass Released: 2008-11-18 G4N0K has reported a vulnerability in VideoScript, which can be exploited by malicious people to bypass certain security restrictions. Full Advisory: http://secunia.com/advisories/32718/ -- [SA32717] PHPStore Yahoo Answers "id" SQL Injection Vulnerability Critical: Moderately critical Where: From remote Impact: Manipulation of data Released: 2008-11-17 Snakespc has reported a vulnerability in PHPStore Yahoo Answers, which can be exploited by malicious people to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/32717/ -- [SA32815] refbase "headerMsg" Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-11-20 A vulnerability has been reported in refbase, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/32815/ -- [SA32788] MyTopix "send" SQL Injection Vulnerability Critical: Less critical Where: From remote Impact: Manipulation of data, Exposure of sensitive information Released: 2008-11-20 cOndemned has discovered a vulnerability in MyTopix, which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/32788/ -- [SA32779] KimsON Cross-Site Scripting Vulnerability Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-11-19 md.r00t has reported a vulnerability in KimsON, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/32779/ -- [SA32757] BoutikOne CMS "search_query" Cross-Site Scripting Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-11-17 d3v1l has reported a vulnerability in BoutikOne CMS, which can be exploited by malicious people to conduct cross-site scripting attacks. Full Advisory: http://secunia.com/advisories/32757/ -- [SA32739] Streber Unspecified Cross-Site Request Forgery Vulnerabilities Critical: Less critical Where: From remote Impact: Cross Site Scripting Released: 2008-11-18 Some vulnerabilities have been reported in Streber, which can be exploited by malicious people to conduct cross-site request forgery attacks. Full Advisory: http://secunia.com/advisories/32739/ -- [SA32740] SSH Tectia Products CBC Mode Plaintext Recovery Vulnerability Critical: Less critical Where: From local network Impact: Exposure of sensitive information Released: 2008-11-17 A vulnerability has been reported in multiple SSH Tectia products, which potentially can be exploited by malicious people to disclose sensitive information. Full Advisory: http://secunia.com/advisories/32740/ -- [SA32775] vBulletin SQL Injection Vulnerabilities Critical: Not critical Where: From remote Impact: Manipulation of data Released: 2008-11-18 Janek Vind has reported some vulnerabilities in vBulletin, which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/32775/ -- [SA32752] Opera "file://" URI Handling Buffer Overflow Vulnerability Critical: Not critical Where: From remote Impact: System access Released: 2008-11-18 send9 has discovered a vulnerability in Opera, which potentially can be exploited by malicious people to compromise a user's system. Full Advisory: http://secunia.com/advisories/32752/ -- [SA32735] vBulletin Calender SQL Injection Vulnerability Critical: Not critical Where: From remote Impact: Manipulation of data Released: 2008-11-18 Janek Vind has reported some vulnerabilities in vBulletin, which can be exploited by malicious users to conduct SQL injection attacks. Full Advisory: http://secunia.com/advisories/32735/ ======================================================================== Secunia recommends that you verify all advisories you receive, by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Subscribe: http://secunia.com/advisories/weekly_summary/ Contact details: Web : http://secunia.com/ E-mail : support_at_private Tel : +45 70 20 51 44 Fax : +45 70 20 51 45 ______________________________________________ Visit the InfoSec News Security Bookstore Best Selling Security Books and More! http://www.shopinfosecnews.orgReceived on Fri Nov 21 2008 - 00:21:18 PST
This archive was generated by hypermail 2.2.0 : Fri Nov 21 2008 - 00:28:57 PST