Information Security News mailing list archives

Secunia Weekly Summary


From: InfoSec News <isn () c4i org>
Date: Fri, 29 Aug 2003 03:19:10 -0500 (CDT)

===========================================================================

                    The Secunia Weekly Advisory Summary
                          2003-08-21 - 2003-08-28

                         This week : 40 advisories

===========================================================================

Secunia Improvements!

Secunia has improved the online vulnerability database making it even more
open and easy to use! Several new features have been added. Furthermore,
every Secunia Advisory is now identified with a SA ID - making it very
easy to refer to Secunia Advisories.

Read more about the Features:
http://www.secunia.com/about_secunia_advisories/

===========================================================================

============
 2003-08-28
============

Red Hat update for sendmail
SA9627 - Moderately critical
http://www.secunia.com/advisories/9627/


============
 2003-08-27
============

PY-Membres SQL Injection and Admin Access
SA9624 - Moderately critical
http://www.secunia.com/advisories/9624/

 -- 

AttilaPHP Authentication Bypass
SA9623 - Moderately critical
http://www.secunia.com/advisories/9623/

 -- 

eNdonesia Cross Site Scripting Vulnerability
SA9622 - Less critical
http://www.secunia.com/advisories/9622/

 -- 

aldweb miniPortail Cross Site Scripting Vulnerability
SA9621 - Less critical
http://www.secunia.com/advisories/9621/

 -- 

SNMPc User Authentication Vulnerability
SA9620 - Moderately critical
http://www.secunia.com/advisories/9620/

 -- 

NewsPHP Inclusion of Arbitrary Files
SA9619 - Moderately critical
http://www.secunia.com/advisories/9619/

 -- 

Tellurian TftpdNT Filename Buffer Overflow Vulnerability
SA9616 - Highly critical
http://www.secunia.com/advisories/9616/

 -- 

SuSE update for sendmail
SA9615 - Moderately critical
http://www.secunia.com/advisories/9615/

 -- 

FreeBSD update for sendmail
SA9614 - Moderately critical
http://www.secunia.com/advisories/9614/

 -- 

Debian update for libpam-smb
SA9613 - Moderately critical
http://www.secunia.com/advisories/9613/

 -- 

Red Hat update for pam_smb
SA9612 - Moderately critical
http://www.secunia.com/advisories/9612/

 -- 

pam_smb Password Buffer Overflow Vulnerability
SA9611 - Moderately critical
http://www.secunia.com/advisories/9611/


============
 2003-08-26
============

slrn Xref Buffer Overflow Vulnerability
SA9610 - Moderately critical
http://www.secunia.com/advisories/9610/

 -- 

AnalogX Proxy Cross Site Scripting Vulnerability
SA9609 - Less critical
http://www.secunia.com/advisories/9609/

 -- 

Slackware update for unzip
SA9608 - Less critical
http://www.secunia.com/advisories/9608/

 -- 

Slackware update for gdm
SA9607 - Less critical
http://www.secunia.com/advisories/9607/

 -- 

Gentoo update for vmware-workstation
SA9606 - Less critical
http://www.secunia.com/advisories/9606/

 -- 

IRIX update for sendmail
SA9605 - Moderately critical
http://www.secunia.com/advisories/9605/

 -- 

OpenBSD update for sendmail
SA9604 - Moderately critical
http://www.secunia.com/advisories/9604/

 -- 

Mandrake update for sendmail
SA9603 - Moderately critical
http://www.secunia.com/advisories/9603/

 -- 

Sendmail DNS Map Uninitialised Structure Vulnerability
SA9602 - Moderately critical
http://www.secunia.com/advisories/9602/

 -- 

SnapGear Filter Denial of Service Vulnerability
SA9601 - Moderately critical
http://www.secunia.com/advisories/9601/


============
 2003-08-25
============

KisMAC Local Privilege Escalation Vulnerabilities
SA9600 - Less critical
http://www.secunia.com/advisories/9600/

 -- 

widz apmon Arbitrary Command Execution Vulnerability
SA9599 - Highly critical
http://www.secunia.com/advisories/9599/

 -- 

Blubster Denial of Service Vulnerability
SA9598 - Less critical
http://www.secunia.com/advisories/9598/

 -- 

Netbula Anyboard Exposes System Information
SA9597 - Not critical
http://www.secunia.com/advisories/9597/

 -- 

DWebPro Discloses Username and Password
SA9596 - Less critical
http://www.secunia.com/advisories/9596/

 -- 

akpop3d SQL Injection Vulnerability
SA9595 - Moderately critical
http://www.secunia.com/advisories/9595/

 -- 

phpGACL Database Password Disclosure Vulnerability
SA9594 - Less critical
http://www.secunia.com/advisories/9594/

 -- 

Helix Universal Server Remotely Exploitable Vulnerability
SA9593 - Highly critical
http://www.secunia.com/advisories/9593/

 -- 

GBrowse Directory Traversal Vulnerability
SA9591 - Moderately critical
http://www.secunia.com/advisories/9591/


============
 2003-08-22
============

BitKeeper Unspecified Code Injection Vulnerability
SA9592 - Moderately critical
http://www.secunia.com/advisories/9592/

 -- 

Mandrake update for gdm
SA9590 - Less critical
http://www.secunia.com/advisories/9590/

 -- 

Red Hat update for gdm
SA9589 - Less critical
http://www.secunia.com/advisories/9589/

 -- 

Red Hat IA64 kernel update
SA9588 - Moderately critical
http://www.secunia.com/advisories/9588/

 -- 

Red Hat update for kernel
SA9587 - Moderately critical
http://www.secunia.com/advisories/9587/

 -- 

Piolet Denial of Service Vulnerability
SA9586 - Less critical
http://www.secunia.com/advisories/9586/


============
 2003-08-21
============

oMail-webmail Arbitrary Command Execution Vulnerability
SA9585 - Highly critical
http://www.secunia.com/advisories/9585/

 -- 

RealOne Player SMIL Arbitrary Script Execution Vulnerability
SA9584 - Moderately critical
http://www.secunia.com/advisories/9584/


===========================================================================

Secunia recommends that you verify all advisories you receive, by clicking
the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Contact details:
Web     : http://www.secunia.com/
E-mail  : support () secunia com
Tel     : +44 (0) 20 7016 2693
Fax     : +44 (0) 20 7637 0419

===========================================================================



-
ISN is currently hosted by Attrition.org

To unsubscribe email majordomo () attrition org with 'unsubscribe isn'
in the BODY of the mail.


Current thread: