[ISN] Secunia Weekly Summary - Issue: 2005-20
InfoSec News
isn at c4i.org
Fri May 20 01:13:26 EDT 2005
========================================================================
The Secunia Weekly Advisory Summary
2005-05-12 - 2005-05-19
This week : 57 advisories
========================================================================
Table of Contents:
1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing
========================================================================
1) Word From Secunia:
The Secunia staff is spending hours every day to assure you the best
and most reliable source for vulnerability information. Every single
vulnerability report is being validated and verified before a Secunia
advisory is written.
Secunia validates and verifies vulnerability reports in many different
ways e.g. by downloading the software and performing comprehensive
tests, by reviewing source code, or by validating the credibility of
the source from which the vulnerability report was issued.
As a result, Secunia's database is the most correct and complete source
for recent vulnerability information available on the Internet.
Secunia Online Vulnerability Database:
http://secunia.com/
========================================================================
2) This Week in Brief:
Colin Percival has reported a vulnerability in various operating
systems supporting Intel's Hyper-Threading Technology (HTT), which can
be exploited by malicious, local users to gain knowledge of sensitive
information.
More information can be found in referenced Secunia advisories below.
Reference:
http://secunia.com/SA15348
http://secunia.com/SA15342
VIRUS ALERTS:
Secunia has not issued any virus alerts during the week.
========================================================================
3) This Weeks Top Ten Most Read Advisories:
1. [SA15292] Mozilla Firefox Two Vulnerabilities
2. [SA12979] Mozilla Firefox Download Dialog Spoofing Vulnerabilities
3. [SA15310] iTunes MPEG-4 File Parsing Buffer Overflow Vulnerability
4. [SA14820] Mozilla Firefox JavaScript Engine Information Disclosure
Vulnerability
5. [SA15348] FreeBSD Hyper-Threading Support Information Disclosure
6. [SA15341] Linux Kernel ELF Core Dump Privilege Escalation
Vulnerability
7. [SA12758] Microsoft Word Document Parsing Buffer Overflow
Vulnerabilities
8. [SA15340] EnCase Device Configuration Overlay Data Acquisition
Weakness
9. [SA15017] Microsoft Windows Explorer Web View Script Insertion
Vulnerability
10. [SA15327] phpBB Attachment Mod Module Unspecified Realname
Vulnerability
========================================================================
4) Vulnerabilities Summary Listing
Windows:
[SA15397] DotNetNuke Script Insertion Vulnerabilities
[SA15379] Sigma ISP Manager SQL Injection Vulnerabilities
[SA15363] War Times Nickname Handling Denial of Service Vulnerability
[SA15362] ImageGallery system Exposure of User Credentials
[SA15394] Fastream NETFile FTP/Web Server FTP Bounce Vulnerability
[SA15374] Ultimate Forum Exposure of Encrypted User Credentials
[SA15373] GA's Guest Book Exposure of Sensitive Information
UNIX/Linux:
[SA15407] Red Hat update for kdelibs
[SA15387] Pico Server Multiple Vulnerabilities
[SA15376] Gentoo update for Mozilla / Mozilla Firefox
[SA15370] Conectiva update for kde
[SA15367] Mandriva update for mozilla
[SA15358] Mandriva update for kdelibs
[SA15357] Mandriva update for gaim
[SA15350] Red Hat update for openmotif
[SA15408] Red Hat update for cyrus-imapd
[SA15399] iControl Services Manager Multiple Vulnerabilities
[SA15398] SCO OpenServer update for telnet
[SA15389] Slackware update for mozilla
[SA15388] ignitionServer Access Entry Deletion and Channel Locking
Vulnerabilities
[SA15381] Fedora update for squid
[SA15359] Mandriva update for gnutls
[SA15351] Ubuntu update for gnutls
[SA15380] Trustix update for postgresql
[SA15375] Gentoo update for postgresql
[SA15404] Gentoo update for freeradius
[SA15403] Ubuntu update for nasm
[SA15390] Slackware update for ncftp
[SA15378] Gentoo update for phpBB
[SA15364] Slackware update for gaim
[SA15361] FreeRADIUS Potential SQL Injection and Buffer Overflow
Vulnerabilities
[SA15356] Mandriva update for tcpdump
[SA15352] NASM "ieee_putascii()" Buffer Overflow Vulnerability
[SA15383] Trustix update for squid
[SA15406] Red Hat update for ncpfs
[SA15392] Linux Kernel pktcdvd and raw device Block Device
Vulnerabilities
[SA15386] Cheetah Insecure Module Importing Vulnerability
[SA15384] Avaya CMS/IR Network Port Hijacking Vulnerability
[SA15382] Trustix update for kernel
[SA15366] Avaya CMS/IR Xsun and Xprt Server Font Handling
Vulnerabilities
[SA15365] IBM HTTP Server "mod_include" Vulnerability
[SA15354] cdrdao Unspecified Privilege Escalation Vulnerability
[SA15348] FreeBSD Hyper-Threading Support Information Disclosure
Other:
[SA15349] Cisco Firewall Services Module TCP Packet URL Filtering
Bypass
Cross Platform:
[SA15410] eDMS Multiple Unspecified Vulnerabilities
[SA15405] Serendipity File Upload and Cross-Site Scripting
Vulnerabilities
[SA15401] Help Center Live Multiple Vulnerabilities
[SA15396] Woltlab Burning Board JGS-Portal SQL Injection
Vulnerabilities
[SA15395] Woltlab Burning Board "email" SQL Injection Vulnerability
[SA15391] PostNuke "func" Local File Inclusion Vulnerability
[SA15385] NPDS Cross-Site Scripting and SQL Injection Vulnerabilities
[SA15377] Skull-Splitter's PHP Guestbook Script Insertion
Vulnerability
[SA15371] SafeHTML "_writeAttrs()" Quote Handling Security Bypass
[SA15360] Kerio MailServer Two Denial of Service Vulnerabilities
[SA15355] Bug Report Script Insertion Vulnerability
[SA15353] Direct Topics Script Insertion and SQL Injection
[SA15400] Shop-Script FREE "categoryID" and "productID" SQL Injection
========================================================================
5) Vulnerabilities Content Listing
Windows:--
[SA15397] DotNetNuke Script Insertion Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting
Released: 2005-05-17
Mark Woan has reported some vulnerabilities in DotNetNuke, which can be
exploited by malicious people to conduct script insertion attacks.
Full Advisory:
http://secunia.com/advisories/15397/
--
[SA15379] Sigma ISP Manager SQL Injection Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: Manipulation of data
Released: 2005-05-17
last samurai has reported some vulnerabilities in Sigma ISP Manager,
which can be exploited by malicious people to conduct SQL injection
attacks.
Full Advisory:
http://secunia.com/advisories/15379/
--
[SA15363] War Times Nickname Handling Denial of Service Vulnerability
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2005-05-17
Luigi Auriemma has reported a vulnerability in War Times, which can be
exploited by malicious users to cause a DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/15363/
--
[SA15362] ImageGallery system Exposure of User Credentials
Critical: Moderately critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2005-05-17
g0rellazz G0r has reported a security issue in ImageGallery system,
which can be exploited by malicious people to disclose sensitive
information.
Full Advisory:
http://secunia.com/advisories/15362/
--
[SA15394] Fastream NETFile FTP/Web Server FTP Bounce Vulnerability
Critical: Less critical
Where: From remote
Impact: Security Bypass
Released: 2005-05-17
Tan Chew Keong has reported a vulnerability in Fastream NETFile FTP/Web
Server, which potentially can be exploited by malicious users to bypass
certain security restrictions.
Full Advisory:
http://secunia.com/advisories/15394/
--
[SA15374] Ultimate Forum Exposure of Encrypted User Credentials
Critical: Less critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2005-05-17
eric basher has reported a security issue in Ultimate Forum, which can
be exploited by malicious people to disclose sensitive information.
Full Advisory:
http://secunia.com/advisories/15374/
--
[SA15373] GA's Guest Book Exposure of Sensitive Information
Critical: Less critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2005-05-17
eric basher has reported a security issue in GA's Guest Book, which can
be exploited by malicious people to disclose sensitive information.
Full Advisory:
http://secunia.com/advisories/15373/
UNIX/Linux:--
[SA15407] Red Hat update for kdelibs
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-05-18
Red Hat has issued an update for kdelibs. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/15407/
--
[SA15387] Pico Server Multiple Vulnerabilities
Critical: Highly critical
Where: From remote
Impact: Exposure of sensitive information, System access
Released: 2005-05-17
RedTeam has reported some vulnerabilities Pico Server, which can be
exploited by malicious, local users to gain knowledge of sensitive
information, or by malicious people to gain knowledge of potentially
sensitive information or compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/15387/
--
[SA15376] Gentoo update for Mozilla / Mozilla Firefox
Critical: Highly critical
Where: From remote
Impact: Cross Site Scripting, System access
Released: 2005-05-16
Gentoo has issued an update for Mozilla / Mozilla Firefox. This fixes
two vulnerabilities, which can be exploited by malicious people to
conduct cross-site scripting attacks and compromise a user's system.
Full Advisory:
http://secunia.com/advisories/15376/
--
[SA15370] Conectiva update for kde
Critical: Highly critical
Where: From remote
Impact: Spoofing, Privilege escalation, DoS, System access
Released: 2005-05-17
Conectiva has issued an update for kde. This fixes multiple
vulnerabilities, which can be exploited to cause a DoS (Denial of
Service), gain escalated privileges, spoof the URL displayed in the
address bar and status bar, or compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/15370/
--
[SA15367] Mandriva update for mozilla
Critical: Highly critical
Where: From remote
Impact: Security Bypass, Cross Site Scripting, Manipulation of
data, Exposure of sensitive information, System access
Released: 2005-05-16
Mandriva has issued updates for mozilla. These fix some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting attacks, bypass certain security restrictions,
gain knowledge of potentially sensitive information and compromise a
user's system.
Full Advisory:
http://secunia.com/advisories/15367/
--
[SA15358] Mandriva update for kdelibs
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-05-13
Mandriva has issued an update for kdelibs. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/15358/
--
[SA15357] Mandriva update for gaim
Critical: Highly critical
Where: From remote
Impact: DoS, System access
Released: 2005-05-13
Mandriva has issued an update for gaim. This fixes a vulnerability and
a weakness, which can be exploited by malicious people to cause a DoS
(Denial of Service) or compromise a user's system.
Full Advisory:
http://secunia.com/advisories/15357/
--
[SA15350] Red Hat update for openmotif
Critical: Highly critical
Where: From remote
Impact: System access
Released: 2005-05-12
Red Hat has issued an update for openmotif. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
vulnerable system.
Full Advisory:
http://secunia.com/advisories/15350/
--
[SA15408] Red Hat update for cyrus-imapd
Critical: Moderately critical
Where: From remote
Impact: DoS, System access
Released: 2005-05-18
Red Hat has issued an update for cyrus-imapd. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise a vulnerable
system.
Full Advisory:
http://secunia.com/advisories/15408/
--
[SA15399] iControl Services Manager Multiple Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: DoS, System access
Released: 2005-05-18
F5 Networks have acknowledged multiple vulnerabilities in iControl
Services Manager, which can be exploited by malicious, local users to
cause a DoS (Denial of Service) or malicious people to potentially
compromise a vulnerable system.
Full Advisory:
http://secunia.com/advisories/15399/
--
[SA15398] SCO OpenServer update for telnet
Critical: Moderately critical
Where: From remote
Impact: System access
Released: 2005-05-18
SCO has issued an update for telnet. This fixes two vulnerabilities,
which can be exploited by malicious people to compromise a user's
system.
Full Advisory:
http://secunia.com/advisories/15398/
--
[SA15389] Slackware update for mozilla
Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting
Released: 2005-05-16
Slackware has issued an update for mozilla. This fixes a vulnerability,
which can be exploited by malicious people to conduct cross-site
scripting attacks.
Full Advisory:
http://secunia.com/advisories/15389/
--
[SA15388] ignitionServer Access Entry Deletion and Channel Locking
Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: Security Bypass, DoS
Released: 2005-05-17
Two vulnerabilities have been reported in ignitionServer, which can be
exploited by malicious users to delete access entries or prevent
protected operators from accessing certain channels.
Full Advisory:
http://secunia.com/advisories/15388/
--
[SA15381] Fedora update for squid
Critical: Moderately critical
Where: From remote
Impact: Security Bypass, Spoofing, Manipulation of data
Released: 2005-05-18
Fedora has issued an update for squid. This fixes some vulnerabilities,
which can be exploited by malicious people to spoof DNS lookups and
poison the web proxy cache.
Full Advisory:
http://secunia.com/advisories/15381/
--
[SA15359] Mandriva update for gnutls
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2005-05-13
Mandriva has issued an update for gnutls. This fixes a vulnerability,
which potentially can be exploited by malicious people to cause a DoS
(Denial of Service).
Full Advisory:
http://secunia.com/advisories/15359/
--
[SA15351] Ubuntu update for gnutls
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2005-05-13
Ubuntu has issued an update for gnutls. This fixes a vulnerability,
which potentially can be exploited by malicious people to cause a DoS
(Denial of Service).
Full Advisory:
http://secunia.com/advisories/15351/
--
[SA15380] Trustix update for postgresql
Critical: Moderately critical
Where: From local network
Impact: Unknown, Privilege escalation, DoS
Released: 2005-05-16
Trustix has released an update for postgresql. This fixes two
vulnerabilities, which can be exploited by malicious users to cause a
DoS (Denial of Service) or potentially gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/15380/
--
[SA15375] Gentoo update for postgresql
Critical: Moderately critical
Where: From local network
Impact: DoS, Privilege escalation, Unknown
Released: 2005-05-16
Gentoo has released an update for postgresql. This fixes two
vulnerabilities, which can be exploited by malicious users to cause a
DoS (Denial of Service) or potentially gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/15375/
--
[SA15404] Gentoo update for freeradius
Critical: Less critical
Where: From remote
Impact: Unknown, Manipulation of data
Released: 2005-05-18
Gentoo has issued an update for freeradius. This fixes some
vulnerabilities, where one has an unknown impact and the others
potentially can be exploited to conduct SQL injection attacks.
Full Advisory:
http://secunia.com/advisories/15404/
--
[SA15403] Ubuntu update for nasm
Critical: Less critical
Where: From remote
Impact: System access
Released: 2005-05-18
Ubuntu has issued an update for nasm. This fixes a vulnerability, which
can be exploited by malicious people to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/15403/
--
[SA15390] Slackware update for ncftp
Critical: Less critical
Where: From remote
Impact: System access
Released: 2005-05-16
Slackware has issued an update for ncftp. This fixes an old
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/15390/
--
[SA15378] Gentoo update for phpBB
Critical: Less critical
Where: From remote
Impact: Unknown, Cross Site Scripting
Released: 2005-05-16
Gentoo has issued an update for phpBB. This fixes a vulnerability,
which can be exploited to conduct cross-site scripting or script
insertion attacks.
Full Advisory:
http://secunia.com/advisories/15378/
--
[SA15364] Slackware update for gaim
Critical: Less critical
Where: From remote
Impact: DoS
Released: 2005-05-16
Slackware has issued an update for gaim. This fixes two weaknesses,
which can be exploited by malicious people to cause a DoS (Denial of
Service).
Full Advisory:
http://secunia.com/advisories/15364/
--
[SA15361] FreeRADIUS Potential SQL Injection and Buffer Overflow
Vulnerabilities
Critical: Less critical
Where: From remote
Impact: Unknown, Manipulation of data
Released: 2005-05-18
Primoz Bratanic has reported some vulnerabilities in FreeRADIUS, where
one has an unknown impact and the others potentially can be exploited
by malicious users to conduct SQL injection attacks.
Full Advisory:
http://secunia.com/advisories/15361/
--
[SA15356] Mandriva update for tcpdump
Critical: Less critical
Where: From remote
Impact: DoS
Released: 2005-05-13
Mandriva has issued an update for tcpdump. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service).
Full Advisory:
http://secunia.com/advisories/15356/
--
[SA15352] NASM "ieee_putascii()" Buffer Overflow Vulnerability
Critical: Less critical
Where: From remote
Impact: System access
Released: 2005-05-18
Jindrich Novy has reported a vulnerability in NASM, which can be
exploited by malicious people to compromise a user's system.
Full Advisory:
http://secunia.com/advisories/15352/
--
[SA15383] Trustix update for squid
Critical: Less critical
Where: From local network
Impact: Spoofing
Released: 2005-05-16
Trustix has issued an updated for squid. This fixes a vulnerability,
which can be exploited by malicious people to spoof DNS lookups.
Full Advisory:
http://secunia.com/advisories/15383/
--
[SA15406] Red Hat update for ncpfs
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-05-18
Red Hat has issued an update for ncpfs. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with escalated privileges.
Full Advisory:
http://secunia.com/advisories/15406/
--
[SA15392] Linux Kernel pktcdvd and raw device Block Device
Vulnerabilities
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-05-17
alert7 has reported two vulnerabilities in the Linux kernel, which can
be exploited by malicious, local users to gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/15392/
--
[SA15386] Cheetah Insecure Module Importing Vulnerability
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-05-17
Brian Bird has reported a vulnerability in Cheetah, which can be
exploited by malicious, local users to gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/15386/
--
[SA15384] Avaya CMS/IR Network Port Hijacking Vulnerability
Critical: Less critical
Where: Local system
Impact: Hijacking
Released: 2005-05-16
Avaya has acknowledged some vulnerabilities in Avaya Call Management
System (CMS) and Avaya Interactive Response (IR), which can be
exploited by malicious, local users to hijack network ports.
Full Advisory:
http://secunia.com/advisories/15384/
--
[SA15382] Trustix update for kernel
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-05-16
Trustix has issued an update for kernel. This can be exploited by
malicious, local users to gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/15382/
--
[SA15366] Avaya CMS/IR Xsun and Xprt Server Font Handling
Vulnerabilities
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-05-16
Avaya has acknowledged some vulnerabilities in Avaya Call Management
System (CMS) and Avaya Interactive Response (IR), which can be
exploited by malicious, local users to gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/15366/
--
[SA15365] IBM HTTP Server "mod_include" Vulnerability
Critical: Less critical
Where: Local system
Impact: Privilege escalation, DoS
Released: 2005-05-17
IBM has acknowledged a vulnerability in IBM HTTP Server, which can be
exploited by malicious, local users to cause a DoS (Denial of Service)
or potentially gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/15365/
--
[SA15354] cdrdao Unspecified Privilege Escalation Vulnerability
Critical: Less critical
Where: Local system
Impact: Privilege escalation
Released: 2005-05-13
A vulnerability has been reported in cdrdao, which potentially can be
exploited by malicious, local users to gain escalated privileges.
Full Advisory:
http://secunia.com/advisories/15354/
--
[SA15348] FreeBSD Hyper-Threading Support Information Disclosure
Critical: Less critical
Where: Local system
Impact: Exposure of sensitive information
Released: 2005-05-13
Colin Percival has reported a vulnerability in FreeBSD, which can be
exploited by malicious, local users to gain knowledge of sensitive
information.
Full Advisory:
http://secunia.com/advisories/15348/
Other:--
[SA15349] Cisco Firewall Services Module TCP Packet URL Filtering
Bypass
Critical: Less critical
Where: From remote
Impact: Security Bypass
Released: 2005-05-12
A security issue has been reported in Cisco Firewall Services Module
(FWSM), which can result in certain traffic bypassing configured ACLs.
Full Advisory:
http://secunia.com/advisories/15349/
Cross Platform:--
[SA15410] eDMS Multiple Unspecified Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: Unknown
Released: 2005-05-18
Some vulnerabilities with unknown impacts have been reported in eDMS.
Full Advisory:
http://secunia.com/advisories/15410/
--
[SA15405] Serendipity File Upload and Cross-Site Scripting
Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: Security Bypass, Cross Site Scripting
Released: 2005-05-18
Some vulnerabilities have been reported in Serendipity, which can be
exploited by malicious people to bypass certain security restrictions
and conduct cross-site scripting attacks.
Full Advisory:
http://secunia.com/advisories/15405/
--
[SA15401] Help Center Live Multiple Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting, Manipulation of data
Released: 2005-05-18
James Bercegay has reported some vulnerabilities in Help Center Live,
which can be exploited by malicious people to conduct cross-site
scripting, script insertion and SQL injection attacks.
Full Advisory:
http://secunia.com/advisories/15401/
--
[SA15396] Woltlab Burning Board JGS-Portal SQL Injection
Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: Manipulation of data
Released: 2005-05-17
deluxe89 and the Security-Project Team has reported some
vulnerabilities in the JGS-Portal module for Woltlab Burning Board,
which can be exploited by malicious people to conduct SQL injection
attacks.
Full Advisory:
http://secunia.com/advisories/15396/
--
[SA15395] Woltlab Burning Board "email" SQL Injection Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Manipulation of data
Released: 2005-05-17
James Bercegay has reported a vulnerability in Woltlab Burning Board,
which can be exploited by malicious people to conduct SQL injection
attacks.
Full Advisory:
http://secunia.com/advisories/15395/
--
[SA15391] PostNuke "func" Local File Inclusion Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Exposure of sensitive information
Released: 2005-05-17
pokleyzz has reported a vulnerability in PostNuke, which can be
exploited by malicious people to disclose sensitive information.
Full Advisory:
http://secunia.com/advisories/15391/
--
[SA15385] NPDS Cross-Site Scripting and SQL Injection Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting, Manipulation of data
Released: 2005-05-18
Some vulnerabilities have been reported in NPDS, which can be exploited
by malicious people to conduct cross-site scripting and SQL injection
attacks.
Full Advisory:
http://secunia.com/advisories/15385/
--
[SA15377] Skull-Splitter's PHP Guestbook Script Insertion
Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting
Released: 2005-05-17
Morinex Eneco has reported a vulnerability in Skull-Splitter's PHP
Guestbook, which can be exploited by malicious people to conduct script
insertion attacks.
Full Advisory:
http://secunia.com/advisories/15377/
--
[SA15371] SafeHTML "_writeAttrs()" Quote Handling Security Bypass
Critical: Moderately critical
Where: From remote
Impact: Security Bypass
Released: 2005-05-17
A vulnerability has been reported in SafeHTML, which potentially can be
exploited by malicious people to bypass certain security restrictions.
Full Advisory:
http://secunia.com/advisories/15371/
--
[SA15360] Kerio MailServer Two Denial of Service Vulnerabilities
Critical: Moderately critical
Where: From remote
Impact: DoS
Released: 2005-05-13
Two vulnerabilities have been reported in Kerio MailServer, which
potentially can be exploited by malicious people to cause a DoS (Denial
of Service).
Full Advisory:
http://secunia.com/advisories/15360/
--
[SA15355] Bug Report Script Insertion Vulnerability
Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting
Released: 2005-05-17
Sylvain Thual has reported a vulnerability in Bug Report, which can be
exploited by malicious people to conduct script insertion attacks.
Full Advisory:
http://secunia.com/advisories/15355/
--
[SA15353] Direct Topics Script Insertion and SQL Injection
Critical: Moderately critical
Where: From remote
Impact: Cross Site Scripting, Manipulation of data
Released: 2005-05-13
Morinex Eneco has reported two vulnerabilities in Direct Topics, which
can be exploited by malicious people to conduct script insertion and
SQL injection attacks.
Full Advisory:
http://secunia.com/advisories/15353/
--
[SA15400] Shop-Script FREE "categoryID" and "productID" SQL Injection
Critical: Less critical
Where: From remote
Impact: Manipulation of data
Released: 2005-05-18
Censored has reported a vulnerability in Shop-Script FREE, which can be
exploited by malicious people to conduct SQL injection attacks.
Full Advisory:
http://secunia.com/advisories/15400/
========================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Subscribe:
http://secunia.com/secunia_weekly_summary/
Contact details:
Web : http://secunia.com/
E-mail : support at secunia.com
Tel : +45 70 20 51 44
Fax : +45 70 20 51 45
More information about the ISN
mailing list