From theall at tenable.com Thu Dec 1 14:45:03 2011 From: theall at tenable.com (George A. Theall) Date: Thu, 1 Dec 2011 15:45:03 -0500 Subject: [VIM] PHP Wares PHP Inventory Multiple SQL Injection Vulnerabilities Message-ID: BID 50863 was created yesterday and covers multiple SQL injection vulnerabilities in PHP Inventory. It also crosses with CVE-2009-4595. Aren't these issues already covered by BID 41819, which crosses with the same CVE. Rob? George -- theall at tenablesecurity.com From rkeith at securityfocus.com Mon Dec 5 11:13:07 2011 From: rkeith at securityfocus.com (rkeith) Date: Mon, 05 Dec 2011 10:13:07 -0700 Subject: [VIM] PHP Wares PHP Inventory Multiple SQL Injection Vulnerabilities In-Reply-To: References: Message-ID: <4EDCFBA3.1090500@securityfocus.com> Hey George, Thanks for pointing this out. BID 50863 has been retired. Cheers, Rob On 12/01/2011 01:45 PM, George A. Theall wrote: > BID 50863 was created yesterday and covers multiple SQL injection vulnerabilities in PHP Inventory. It also crosses with CVE-2009-4595. > > Aren't these issues already covered by BID 41819, which crosses with the same CVE. Rob? > > > George From coley at rcf-smtp.mitre.org Thu Dec 8 10:48:49 2011 From: coley at rcf-smtp.mitre.org (Steven M. Christey) Date: Thu, 8 Dec 2011 11:48:49 -0500 (EST) Subject: [VIM] EXPLOIT-DB:18055 WordPress WP Glossary Plugin Message-ID: URL: http://www.exploit-db.com/exploits/18055/ Researcher: longrifle0x The researcher blames "ajax.php" but there is no ajax.php in the distribution, nor is there any mention of ajax anywhere, and there is limited usage of an "id" parameter. - Steve From osf-lists at opensecurityfoundation.org Wed Dec 14 02:26:32 2011 From: osf-lists at opensecurityfoundation.org (OSF LISTS) Date: Wed, 14 Dec 2011 03:26:32 -0500 Subject: [VIM] 2006-0656 vs 2011-4711 Message-ID: Per the OSVDB/Tenable links for 2006-0656, ( http://osvdb.org/22992 / http://www.nessus.org/plugins/index.php?view=single&id=20893 ) the issue is caused due to Namazu. For 2011-4711, it's mentioned that this is fixed in 2.0.16, which per Namazu's main page http://www.namazu.org/ was released on 2006-03-12 for a " Directory traversal problemby lang and result of CGI parameter is corrected." It seems clear that 2011-4711 is in reference to the issue fixed on 2006-03-12, but is it distinct from 2006-0656? Thanks, DLM osvdb.org -------------- next part -------------- An HTML attachment was scrubbed... URL: From amanion at cert.org Wed Dec 21 13:50:02 2011 From: amanion at cert.org (Art Manion) Date: Wed, 21 Dec 2011 14:50:02 -0500 Subject: [VIM] vrdx list Message-ID: <4EF2386A.6060602@cert.org> FYI: "This non-NIST mailing list is a follow-up from some of the discussions that occurred during the "Future of Global Vulnerability Reporting" track at the 7th Annual IT Security Automation Conference. The list is intended to facilitate the discussion of how to exchange information pertaining to vulnerabilities." If the above link doesn't work, send mail to with "subscribe vrdx {email_address}" in the body. There's nothing going on at the moment, but we expect some discussion about vulnerability databases, tracking, naming, level of abstraction, deconfliction, etc. Things should pick up in January. This discussion has roots in USG circles, but one of the points of the list is to invite others to the discussion. Regards, - Art From theall at tenable.com Thu Dec 29 19:41:57 2011 From: theall at tenable.com (George A. Theall) Date: Thu, 29 Dec 2011 20:41:57 -0500 Subject: [VIM] Computer Associates ARCserve D2D and ARCserve Backup Arbitrary Code Execution Vulnerability, BID 51189 Message-ID: BID 51189 was created yesterday for an issue in CA ARCserve D2D / ARCserve Backup. It looks to me to be a dup of BID 48897. Yesterday's BID references an advisory from Hitachi (http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-025/index.html) which in turn references a Japanese language advisory from Computer Associates (http://www.casupport.jp/resources/info/CA20110809-01.htm). Like the earlier BID, that mentions CVE-2011-3011, which immediately should raise suspicions. And, if you use something like Yahoo's Babelfish to translate the page, you'll end up with text that's pretty close to http://seclists.org/fulldisclosure/2011/Aug/82, CA's original advisory from August referenced in 48897. Rob? George -- theall at tenablesecurity.com