Information Security News mailing list archives

Secunia Weekly Summary - Issue: 2004-7


From: InfoSec News <isn () c4i org>
Date: Thu, 12 Feb 2004 06:48:02 -0600 (CST)

========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2004-02-05 - 2004-02-12                        

                       This week : 50 advisories                       

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

The Secunia staff is spending hours every day to assure you the best
and most reliable source for vulnerability information. Every single 
vulnerability report is being validated and verified before a Secunia
advisory is written.

Secunia validates and verifies vulnerability reports in many different
ways e.g. by downloading the software and performing comprehensive
tests, by reviewing source code, or by validating the credibility of
the source from which the vulnerability report was issued.

As a result, Secunia's database is the most correct and complete source
for recent vulnerability information available on the Internet.

Secunia Online Vulnerability Database:
http://www.secunia.com/

========================================================================
2) This Week in Brief:

The Opera Browser is affected by a variant of the file download
spoofing vulnerability, which was reported in Internet Explorer some
time ago. The vulnerability allows a malicious website to spoof the
real file extension using CLSID's. Opera is reportedly working on a
fix, which will address this vulnerability.
Reference: [SA10760]

Microsoft has released a security patch, which applies to almost all
versions of windows. The vulnerability was discovered in the Microsoft
ASN.1 Library by security research firm eEye Digital Security.
Furthermore, Microsoft also released two security updates for WINS
Server and Virtual PC for Mac.
Reference: [SA10759], [SA10835] & [SA10836]

A vulnerability has been found in XFree86, allowing malicious, local
users to escalate their privileges. A patch is available from the
vendor.
Reference: [SA10824]

Yet again, this week offered a new vulnerability in Internet explorer,
which can be exploited by malicious websites to determine the existence
of local files on a user's computer.
Reference: [SA10820]

TIP:
Finding Secunia advisories is easily done through the Secunia web site.
Simply enter the SA ID in the URL:
http://secunia.com/SA10760

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA10736] Internet Explorer File Download Extension Spoofing
2.  [SA10395] Internet Explorer URL Spoofing Vulnerability
3.  [SA10796] RealOne Player / RealPlayer Multiple Vulnerabilities
4.  [SA10759] Microsoft Windows ASN.1 Library Integer Overflow
              Vulnerabilities
5.  [SA10794] Check Point FireWall-1 HTTP Parsing Format String
              Vulnerabilities
6.  [SA10820] Internet Explorer File Identification Variant
7.  [SA10805] Oracle9i Database Multiple Buffer Overflow
              Vulnerabilities
8.  [SA10795] Check Point VPN-1 ISAKMP Buffer Overflow Vulnerability
9.  [SA10835] Microsoft Windows WINS Server Buffer Overflow
              Vulnerability
10. [SA10706] Serv-U FTP Server "SITE CHMOD" Command Buffer Overflow
              Vulnerability

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA10831] Caucho Resin Source Code Exposure Vulnerability
[SA10835] Microsoft Windows WINS Server Buffer Overflow Vulnerability
[SA10807] IBM Cloudscape Command Injection Vulnerability
[SA10825] JShop Server Cross Site Scripting Vulnerability
[SA10820] Internet Explorer File Identification Variant

UNIX/Linux:
[SA10853] Red Hat update for mutt
[SA10852] Fedora update for mutt
[SA10848] Gentoo update for gallery
[SA10847] Red Hat update for Mutt
[SA10846] Mutt Buffer Overflow Vulnerability
[SA10850] Monkey HTTP Daemon Denial of Service Vulnerability
[SA10838] Conectiva update for gaim
[SA10837] Conectiva update for vim
[SA10826] Clam AntiVirus UUencoded Message Denial of Service
Vulnerability
[SA10823] Fedora update for mc
[SA10821] Red Hat update for Gaim
[SA10810] Debian update for mpg123
[SA10808] OpenJournal Authentication Bypass Vulnerability
[SA10803] Debian update for gaim
[SA10849] Gentoo update for XFree86
[SA10841] Fedora update for kernel
[SA10822] Red Hat update for mailman
[SA10819] Gentoo update for PHP
[SA10813] Debian update for mailman
[SA10811] Apache-SSL Client Certificate Forging Vulnerability
[SA10845] Sun Solaris Apache "mod_alias" and "mod_rewrite"
Vulnerabilities
[SA10842] Samba Local Privilege Escalation Issue
[SA10836] Microsoft Virtual PC for Mac Insecure Temporary Files
Creation
[SA10833] eTrust InoculateIT for Linux Insecure Default Installation
[SA10824] XFree86 "font.alias" File Parsing Privilege Escalation
Vulnerability
[SA10816] Linux VServer Chroot Escape Vulnerability
[SA10812] Fedora update for NetPBM
[SA10806] BSD "shmat()" Privilege Escalation Vulnerability
[SA10851] OpenLinux update for slocate

Other:
[SA10834] EvolutionX FTP Server Denial of Service Vulnerabilities
[SA10828] httpd / palmhttpd Multiple Connection Denial of Service
Vulnerability
[SA10832] Red-Alert Denial of Service Vulnerability
[SA10809] VMware ESX Server Privilege Escalation Vulnerabilities
[SA10827] Nokia 6310i OBEX Message Denial of Service
[SA10817] ZyXEL ZyNOS Frame Padding Information Disclosure
Vulnerability

Cross Platform:
[SA10839] ezContents Arbitrary File Inclusion and Login Bypass
Vulnerabilities
[SA10815] Jacks FormMail.php Arbitrary File Upload Vulnerability
[SA10843] PHP-Nuke SQL Injection Vulnerabilities
[SA10840] MaxWebPortal Cross-Site Scripting and SQL Injection
Vulnerabilities
[SA10830] PHP-Nuke Cross-Site Scripting and SQL Injection
Vulnerabilities
[SA10844] BosDates SQL Injection Vulnerability
[SA10805] Oracle9i Database Multiple Buffer Overflow Vulnerabilities
[SA10818] PHP Configuration Leakage Vulnerability
[SA10814] Crossday Discuz! Board Cross Site Scripting Vulnerability
[SA10804] Mambo "Itemid" Parameter Cross-Site Scripting Vulnerability

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA10831] Caucho Resin Source Code Exposure Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2004-02-10

Wang Yun has reported a vulnerability in Resin, allowing malicious
people to view source code and directory listings.

Full Advisory:
http://www.secunia.com/advisories/10831/

 --

[SA10835] Microsoft Windows WINS Server Buffer Overflow Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      DoS, System access
Released:    2004-02-10

Qualys has discovered a vulnerability in certain versions of Microsoft
Windows, which can be exploited by malicious people to cause a DoS
(Denial of Service) and potentially compromise a vulnerable system.

Full Advisory:
http://www.secunia.com/advisories/10835/

 --

[SA10807] IBM Cloudscape Command Injection Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      Exposure of sensitive information, DoS, System access
Released:    2004-02-06

Marc Schoenefeld has reported a vulnerability in IBM Cloudscape, which
can be exploited by malicious people to disclose information, cause a
DoS (Denial of Service) or execute arbitrary executables present on an
affected system.

Full Advisory:
http://www.secunia.com/advisories/10807/

 --

[SA10825] JShop Server Cross Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2004-02-10

David Sopas Ferreira has reported a vulnerability in JShop Server,
allowing malicious people to conduct Cross Site Scripting attacks.

Full Advisory:
http://www.secunia.com/advisories/10825/

 --

[SA10820] Internet Explorer File Identification Variant

Critical:    Not critical
Where:       From remote
Impact:      Exposure of system information
Released:    2004-02-09

Jelmer has discovered a vulnerability in Internet Explorer, allowing
malicious sites to detect the presence of local files.

Full Advisory:
http://www.secunia.com/advisories/10820/


UNIX/Linux:--

[SA10853] Red Hat update for mutt

Critical:    Highly critical
Where:       From remote
Impact:      System access, DoS
Released:    2004-02-12

Red Hat has issued updated packages for mutt. These fix a vulnerability
which can be exploited to crash the mail client or potentially
compromise a vulnerable system.

Full Advisory:
http://www.secunia.com/advisories/10853/

 --

[SA10852] Fedora update for mutt

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-02-12

Red Hat has issued updated packages for mutt. These fix a vulnerability
which can be exploited to crash the mail client or potentially
compromise a vulnerable system.

Full Advisory:
http://www.secunia.com/advisories/10852/

 --

[SA10848] Gentoo update for gallery

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2004-02-12

Gentoo has issued an update for Gallery. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://www.secunia.com/advisories/10848/

 --

[SA10847] Red Hat update for Mutt

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-02-11

Red Hat has issued updated packages for Mutt. These fix a vulnerability
which can be exploited to crash the mail client or potentially
compromise a vulnerable system.

Full Advisory:
http://www.secunia.com/advisories/10847/

 --

[SA10846] Mutt Buffer Overflow Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2004-02-11

Niels Heinen has reported a vulnerability in Mutt, potentially allowing
malicious people to compromise a vulnerable system.

Full Advisory:
http://www.secunia.com/advisories/10846/

 --

[SA10850] Monkey HTTP Daemon Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-02-12

Luigi Auriemma has discovered a vulnerability in Monkey HTTP Daemon,
which can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://www.secunia.com/advisories/10850/

 --

[SA10838] Conectiva update for gaim

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-02-11

Conectiva has issued updated packages for gaim. These fix multiple
vulnerabilities, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://www.secunia.com/advisories/10838/

 --

[SA10837] Conectiva update for vim

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-02-11

Conectiva has issued updated packages for vim. These fix an old
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://www.secunia.com/advisories/10837/

 --

[SA10826] Clam AntiVirus UUencoded Message Denial of Service
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-02-10

Oliver Eikemeier has reported a vulnerability in Clam AntiVirus
(clamav), which can be exploited by malicious people to cause a DoS
(Denial of Service).

Full Advisory:
http://www.secunia.com/advisories/10826/

 --

[SA10823] Fedora update for mc

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-02-10

Red Hat has issued updated packages for mc. These fix a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://www.secunia.com/advisories/10823/

 --

[SA10821] Red Hat update for Gaim

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-02-10

Red Hat has issued updated packages for gaim. These fix multiple
vulnerabilities, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://www.secunia.com/advisories/10821/

 --

[SA10810] Debian update for mpg123

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-02-09

Debian has issued updated packages for mpg123. These fix a
vulnerability, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://www.secunia.com/advisories/10810/

 --

[SA10808] OpenJournal Authentication Bypass Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-02-09

Tri Huynh has discovered a vulnerability in OpenJournal, which can be
exploited by malicious people to bypass the user authentication.

Full Advisory:
http://www.secunia.com/advisories/10808/

 --

[SA10803] Debian update for gaim

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2004-02-06

Debian has issued updated packages for gaim. These fix multiple
vulnerabilities, which potentially can be exploited by malicious people
to compromise a user's system.

Full Advisory:
http://www.secunia.com/advisories/10803/

 --

[SA10849] Gentoo update for XFree86

Critical:    Less critical
Where:       From remote
Impact:      Privilege escalation
Released:    2004-02-12

Gentoo has issued an update for XFree86. This fixes a vulnerability,
which potentially can be exploited by malicious users to escalate their
privileges on a vulnerable system.

Full Advisory:
http://www.secunia.com/advisories/10849/

 --

[SA10841] Fedora update for kernel

Critical:    Less critical
Where:       From remote
Impact:      Privilege escalation
Released:    2004-02-11

Red Hat has issued updated kernel packages. These fix various
vulnerabilities, allowing malicious users to escalate their privileges

Full Advisory:
http://www.secunia.com/advisories/10841/

 --

[SA10822] Red Hat update for mailman

Critical:    Less critical
Where:       From remote
Impact:      DoS, Cross Site Scripting
Released:    2004-02-10

Red Hat has issued updated packages for mailman. These fix three
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting attacks or crash the mailman process.

Full Advisory:
http://www.secunia.com/advisories/10822/

 --

[SA10819] Gentoo update for PHP

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information
Released:    2004-02-09

Gentoo has issued an update for PHP. This fixes a vulnerability, which
causes PHP configuration options to be leaked.

Full Advisory:
http://www.secunia.com/advisories/10819/

 --

[SA10813] Debian update for mailman

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting, DoS
Released:    2004-02-09

Debian has issued updated packages for mailman. These fix three
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting attacks or crash the mailman process.

Full Advisory:
http://www.secunia.com/advisories/10813/

 --

[SA10811] Apache-SSL Client Certificate Forging Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      ID Spoofing
Released:    2004-02-09

Wietse Venema has discovered a vulnerability in Apache-SSL, which can
be exploited by malicious people to forge client certificates.

Full Advisory:
http://www.secunia.com/advisories/10811/

 --

[SA10845] Sun Solaris Apache "mod_alias" and "mod_rewrite"
Vulnerabilities

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation, DoS
Released:    2004-02-11

Sun has acknowledged some vulnerabilities in Apache bundled with
Solaris. These can be exploited by malicious, local users to cause a
DoS (Denial of Service) or escalate privileges.

Full Advisory:
http://www.secunia.com/advisories/10845/

 --

[SA10842] Samba Local Privilege Escalation Issue

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-02-11

Michal Medvecky has reported a security issue in samba, which can be
exploited by malicious, local users to escalate their privileges.

Full Advisory:
http://www.secunia.com/advisories/10842/

 --

[SA10836] Microsoft Virtual PC for Mac Insecure Temporary Files
Creation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-02-10

George Gal has discovered a vulnerability in Microsoft Virtual PC for
Mac, which can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://www.secunia.com/advisories/10836/

 --

[SA10833] eTrust InoculateIT for Linux Insecure Default Installation

Critical:    Less critical
Where:       Local system
Impact:      Manipulation of data, Exposure of system information,
Exposure of sensitive information, Privilege escalation
Released:    2004-02-10

l0om has reported some vulnerabilities in eTrust InoculateIT for Linux,
which can be exploited by malicious, local users to perform certain
actions on a vulnerable system with other users' privileges.

Full Advisory:
http://www.secunia.com/advisories/10833/

 --

[SA10824] XFree86 "font.alias" File Parsing Privilege Escalation
Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-02-11

iDEFENSE has discovered a vulnerability in XFree86, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://www.secunia.com/advisories/10824/

 --

[SA10816] Linux VServer Chroot Escape Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-02-09

Markus Müller has identified a vulnerability in Linux VServer, allowing
malicious users to break out of the chroot jail.

Full Advisory:
http://www.secunia.com/advisories/10816/

 --

[SA10812] Fedora update for NetPBM

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-02-09

Red Hat has issued updated packages for netpbm. These fix a
vulnerability, allowing malicious users to escalate their privileges on
a vulnerable system.

Full Advisory:
http://www.secunia.com/advisories/10812/

 --

[SA10806] BSD "shmat()" Privilege Escalation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Exposure of system information, Exposure of sensitive
information, Privilege escalation
Released:    2004-02-06

Joost Pol has discovered a vulnerability in BSD, allowing malicious,
local users to gain escalated privileges.

Full Advisory:
http://www.secunia.com/advisories/10806/

 --

[SA10851] OpenLinux update for slocate

Critical:    Not critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-02-12

SCO has issued updated packages for slocate. These fix a vulnerability,
which can be exploited by malicious, local users to gain "slocate"
group privileges.

Full Advisory:
http://www.secunia.com/advisories/10851/


Other:--

[SA10834] EvolutionX FTP Server Denial of Service Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-02-10

Some vulnerabilities have been reported in EvolutionX for Xbox, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://www.secunia.com/advisories/10834/

 --

[SA10828] httpd / palmhttpd Multiple Connection Denial of Service
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2004-02-10

Shaun Colley has reported a vulnerability in httpd and a product based
on this (palmhttpd), which can be exploited by malicious people to
cause a DoS (Denial of Service).

Full Advisory:
http://www.secunia.com/advisories/10828/

 --

[SA10832] Red-Alert Denial of Service Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      DoS
Released:    2004-02-10

Bruno Morisson has reported a vulnerability in Red-Alert, which can be
exploited by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://www.secunia.com/advisories/10832/

 --

[SA10809] VMware ESX Server Privilege Escalation Vulnerabilities

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2004-02-06

VMware has issued updated packages for the kernel. These fix two
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges.

Full Advisory:
http://www.secunia.com/advisories/10809/

 --

[SA10827] Nokia 6310i OBEX Message Denial of Service

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2004-02-10

Tim Hurman has reported a vulnerability in Nokia 6310i, allowing
malicious people to cause a Denial of Service.

Full Advisory:
http://www.secunia.com/advisories/10827/

 --

[SA10817] ZyXEL ZyNOS Frame Padding Information Disclosure
Vulnerability

Critical:    Not critical
Where:       From local network
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2004-02-09

DiSToAGe has reported that ZyXEL ZyNOS is affected by a known
information disclosure vulnerability, which can be exploited by
malicious people to obtain potentially sensitive information.

Full Advisory:
http://www.secunia.com/advisories/10817/


Cross Platform:--

[SA10839] ezContents Arbitrary File Inclusion and Login Bypass
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, System access
Released:    2004-02-11

Some vulnerabilities have been reported in ezContents, which can be
exploited by malicious people to compromise a vulnerable system or
bypass the login.

Full Advisory:
http://www.secunia.com/advisories/10839/

 --

[SA10815] Jacks FormMail.php Arbitrary File Upload Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, System access
Released:    2004-02-09

Himeur Nourredine has reported a vulnerability, potentially allowing
malicious people to compromise a vulnerable system.

Full Advisory:
http://www.secunia.com/advisories/10815/

 --

[SA10843] PHP-Nuke SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2004-02-11

pokleyzz has reported two vulnerabilities in PHP-Nuke, allowing
malicious people to conduct SQL injection attacks.

Full Advisory:
http://www.secunia.com/advisories/10843/

 --

[SA10840] MaxWebPortal Cross-Site Scripting and SQL Injection
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
system information, Exposure of sensitive information
Released:    2004-02-11

Manuel López has reported some vulnerabilities in MaxWebPortal, which
can be exploited by malicious people to conduct cross-site scripting
and SQL injection attacks.

Full Advisory:
http://www.secunia.com/advisories/10840/

 --

[SA10830] PHP-Nuke Cross-Site Scripting and SQL Injection
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
system information, Exposure of sensitive information
Released:    2004-02-10

Janek Vind has reported three vulnerabilities in PHP-Nuke, allowing
malicious people to conduct Cross Site Scripting and SQL injection
attacks.

Full Advisory:
http://www.secunia.com/advisories/10830/

 --

[SA10844] BosDates SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      Security Bypass
Released:    2004-02-11

G00db0y has reported a vulnerability in BosDates, allowing malicious
people to conduct SQL injection attacks.

Full Advisory:
http://www.secunia.com/advisories/10844/

 --

[SA10805] Oracle9i Database Multiple Buffer Overflow Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      Privilege escalation, System access
Released:    2004-02-06

Cesar Cerrudo and Mark Litchfield have discovered multiple
vulnerabilities in Oracle9i Database, which can be exploited by
malicious database users to compromise the system and gain escalated
privileges.

Full Advisory:
http://www.secunia.com/advisories/10805/

 --

[SA10818] PHP Configuration Leakage Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information
Released:    2004-02-09

A vulnerability has been identified in PHP, potentially allowing
malicious people to view sensitive data or bypass an administrative
restriction.

Full Advisory:
http://www.secunia.com/advisories/10818/

 --

[SA10814] Crossday Discuz! Board Cross Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2004-02-09

Cheng Peng Su has reported a vulnerability in Crossday Discuz! Board,
allowing malicious users to conduct Cross Site Scripting attacks.

Full Advisory:
http://www.secunia.com/advisories/10814/

 --

[SA10804] Mambo "Itemid" Parameter Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2004-02-06

David Sopas Ferreira has reported a vulnerability Mambo, allowing
malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://www.secunia.com/advisories/10804/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://www.secunia.com/about_secunia_advisories/

Subscribe:
http://www.secunia.com/secunia_weekly_summary/

Contact details:
Web     : http://www.secunia.com/
E-mail  : support () secunia com
Tel     : +45 70 20 51 44
Fax     : +45 70 20 51 45

========================================================================





-
ISN is currently hosted by Attrition.org

To unsubscribe email majordomo () attrition org with 'unsubscribe isn'
in the BODY of the mail.


Current thread: