AOH :: ISNQ4947.HTM

Secunia Weekly Summary - Issue: 2007-50




Secunia Weekly Summary - Issue: 2007-50
Secunia Weekly Summary - Issue: 2007-50



=======================================================================
                  The Secunia Weekly Advisory Summary                  
                        2007-12-06 - 2007-12-13                        

                       This week: 100 advisories                       

=======================================================================Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

=======================================================================1) Word From Secunia:

2003: 2,700 advisories published
2004: 3,100 advisories published
2005: 4,600 advisories published
2006: 5,300 advisories published

How do you know which Secunia advisories are important to you?

The Secunia Vulnerability Intelligence Solutions allows you to filter
and structure all the information you need, so you can address issues
effectively.

Get a free trial of the Secunia Vulnerability Intelligence Solutions:
http://corporate.secunia.com/how_to_buy/38/vi/?ref=summary_sm 

=======================================================================2) This Week in Brief:

Secunia Research has discovered a vulnerability in Samba, which can be
exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused by a boundary error within the
"send_mailslot()" function. This can be exploited to cause a
stack-based buffer overflow with zero bytes via a specially crafted
"SAMLOGON" domain logon packet containing a username string placed at
an odd offset followed by an overly long GETDC string.

Successful exploitation allows execution of arbitrary code, but
requires that the "domain logons" option is enabled.

The vulnerability is confirmed in version 3.0.27a and is fixed in
version 3.0.28. The vendor has also released a patch for 3.0.27a.

For more information:
http://secunia.com/advisories/27760/ 

 --

Some vulnerabilities have been discovered in the MPEG-4 format from
3ivx, which can be exploited by malicious people to compromise a user's
system.

The vulnerabilities are caused due to boundary errors in
3ivxDSMediaSplitter.ax when processing certain atoms ("art", "nam",
"cmt", "des", and "cpy") in MP4 files. These can be exploited to
cause stack-based buffer overflows via a specially crafted MP4 file.
Successful exploitation allows execution of arbitrary code.

The vulnerabilities are confirmed in version 5.0.1 of the file, with
the following applications as attack vectors:
* Windows Media Player version 6.4.09.1130 (mplayer2.exe)
* Media Player Classic version 6.4.9.0

Other versions and applications may also be affected. The
vulnerabilities are currently unpatched.

For more information:
http://secunia.com/advisories/27998/ 

 --

Microsoft released its last batch of Security Bulletins for the year.
Seven Security Bulletins were released, with one Extremely Critical
advisory, two Highly Critical advisories, two Moderately Critical
advisories, and two Less Critical advisories.

The Extremely Critical advisory discusses a cumulative update for
Internet Explorer. One of the vulnerabilities discussed in the advisory
is reportedly currently being exploited to execute arbitrary code.

For more information:
http://secunia.com/advisories/28036/ 

Several highly critical vulnerabilities in the Windows Media Format
Runtime / Windows Media Services were also disclosed, which could be
exploited to execute arbitrary code.

For more information:
http://secunia.com/advisories/28034/ 

Two highly critical vulnerabilities in Microsoft DirectX were also
reported, which could be exploited to execute arbitrary code.

For more information:
http://secunia.com/advisories/28010/ 

Two moderately critical vulnerabilities, one in the Message Queuing
Service (MSMQ) in Windows, and another in Vista SMBv2 signing, can be
exploited to cause arbitrary code, but requires that the MSMQ component
is installed (not the default setting), and SMBv2 is enabled (not the
default setting), respectively.

For more information:
http://secunia.com/advisories/28051/ 
http://secunia.com/advisories/27997/ 

Two less critical vulnerabilities, one in Windows Advanced Local
Procedure Call (ALPC) in Vista, and another in Message Queuing Service
(MSMQ) can be exploited to allow malicious, local users to gain
escalated privileges.

For more information:
http://secunia.com/advisories/28015/ 
http://secunia.com/advisories/28011/ 

Users are urged to run Windows Updates as soon as possible.

Secunia has constructed the Secunia Personal Software Inspector, which
you can use to check if your personal system is vulnerable:
https://psi.secunia.com/

Corporate users can request for a trial of the Secunia Network Software
Inspector, which you can use to check which systems in your network are
vulnerable:
http://secunia.com/network_software_inspector/ 

 --

VIRUS ALERTS:

During the past week Secunia collected 257 virus descriptions from the
Antivirus vendors. However, none were deemed MEDIUM risk or higher
according to the Secunia assessment scale.

=======================================================================3) This Weeks Top Ten Most Read Advisories:

1.  [SA27934] Skype skype4com URI Handler Buffer Overflow
2.  [SA28036] Internet Explorer Multiple Code Execution Vulnerabilities
3.  [SA27938] Mac OS X vpnd Denial of Service Vulnerability
4.  [SA27947] Cisco Security Agent Unspecified System Driver Buffer
              Overflow Vulnerability
5.  [SA27945] Nokia N95 SIP Message Processing Denial of Service
              Weakness
6.  [SA27889] e2fsprogs libext2fs Integer Overflow Vulnerabilities
7.  [SA27941] IBM Lotus Sametime Meeting WebRunMenuFrame Page
              Cross-Site Scripting
8.  [SA27964] HP OpenView Network Node Manager Multiple
              Vulnerabilities
9.  [SA27965] SUSE Update for Multiple Packages
10. [SA27898] Cisco IP Phone 7940 SIP INVITE Denial of Service
              Vulnerability

=======================================================================4) Vulnerabilities Summary Listing

Windows:
[SA28036] Internet Explorer Multiple Code Execution Vulnerabilities
[SA27992] JustSystems Ichitaro Document Processing Buffer Overflow
[SA28055] HP Info Center HPInfo Class ActiveX Control Insecure Methods
[SA28034] Windows Media Format Runtime ASF Parsing Vulnerabilities
[SA28031] BadBlue Multiple Vulnerabilities
[SA28010] Microsoft DirectX SAMI/WAV/AVI File Parsing Vulnerabilities
[SA27998] 3ivx MPEG-4 MP4 File Processing Buffer Overflows
[SA28038] Trend Micro Products UUE File Parsing Buffer Overflow
[SA28032] BarracudaDrive Web Server Multiple Vulnerabilities
[SA28007] Easy File Sharing Web Server Multiple Vulnerabilities
[SA27976] PenPal Three SQL Injection Vulnerabilities
[SA28051] Microsoft Windows Message Queuing Buffer Overflow
[SA27997] Microsoft Windows Vista SMBv2 Signing Vulnerability
[SA28019] Websense "username" Cross-Site Scripting Vulnerability
[SA28015] Windows Vista Kernel Legacy Reply Path Validation Privilege
Escalation
[SA28011] Microsoft Windows Message Queuing Privilege Escalation
[SA28072] Kerio WinRoute Firewall Proxy Server Unspecified Security
Bypass

UNIX/Linux:
[SA28068] Sun Solaris update for Adobe Flash Player
[SA28056] Red Hat update for java-1.4.2-bea
[SA28043] Fedora update for poppler
[SA28039] SUSE update for OpenOffice_org
[SA28001] Debian update for iceweasel
[SA27979] Fedora update for seamonkey
[SA27972] Fedora update for openoffice.org
[SA28060] Debian update for ruby-gnome2
[SA28050] Red Hat update for python
[SA28044] IBM AIX Multiple Unspecified Vulnerabilities
[SA28041] Avaya Products PCRE Multiple Vulnerabilities
[SA28033] Debian update for kernel
[SA28027] Red Hat update for python
[SA28022] Gentoo update for ruby-gtk2
[SA28021] Gentoo update for emul-linux-x86-qtlibs
[SA28008] Debian update for sitebar
[SA28002] wwwstats "link" Script Insertion Vulnerability
[SA27996] Debian update for qt-x11-free
[SA27989] Fedora update for eggdrop
[SA27985] Gentoo update for cairo
[SA27984] Gentoo update for emacs
[SA27975] Fedora update for ruby-gnome
[SA27973] Fedora update for drupal
[SA28067] Mandriva update for samba
[SA28029] Gentoo update for samba
[SA28028] rPath update for samba and samba-swat
[SA28003] SUSE update for samba
[SA27999] Debian update for samba
[SA27993] Slackware update for samba
[SA27982] Gentoo update for firebird
[SA27977] Fedora update for samba
[SA28062] Debian update for htdig
[SA28061] Debian update for libnss-ldap
[SA28042] Mandriva update for e2fsprogs
[SA28030] rPath update for e2fsprogs
[SA28000] Ubuntu update for e2fsprogs
[SA27987] Debian update for e2fsprogs
[SA27983] Gentoo update for PEAR-MDB2
[SA27980] Fedora update for nagios
[SA27971] Avaya Products Apache mod_proxy "date" Denial of Service
[SA27967] Ubuntu update for tetex-bin and texlive-bin
[SA28040] Mandriva update for MySQL
[SA28052] Red Hat autofs "/net" Privilege Escalation Vulnerability
[SA28023] Gentoo update for lookup
[SA28004] Fedora update for xorg-x11-xfs
[SA27978] Fedora update for zabbix
[SA28070] Linux Kernel "mmap_min_addr" Security Bypass
[SA28057] Avaya CMS / IR Solaris Remote Procedure Call Module Denial of
Service
[SA28048] Mac OS X "cs_validate_page()" Local Denial of Service

Other:
[SA27970] IBM HMC Version 3 Privilege Escalation Vulnerabilities

Cross Platform:
[SA28066] ViArt CMS/HelpDesk/Shop "root_folder_path" File Inclusion
[SA28058] CityWriter "path" File Inclusion Vulnerability
[SA28054] Fastpublish CMS designconfig.php File Inclusion
[SA28047] Falcon Series One Multiple Vulnerabilities
[SA28018] Sun StarOffice/StarSuite Database Document Processing
Arbitrary Java Method Execution
[SA27974] Novell NetMail AntiVirus Agent Integer Overflow
Vulnerability
[SA28080] Robocode Arbitrary Java Code Execution Security Issue
[SA28075] MMS Gallery PHP "id" File Inclusion Vulnerabilities
[SA28071] xml2owl "file" Information Disclosure Vulnerability
[SA28053] Mcms Easy Web Make "template" Local File Inclusion
[SA28045] Falt4 CMS Cross-Site Scripting and SQL Injection
Vulnerabilities
[SA28035] Cybozu Office Multiple Vulnerabilities
[SA28014] aurora framework "pack_var()" SQL Injection Vulnerability
[SA28013] PolDoc Document Management System "filename" Information
Disclosure
[SA27990] DWdirectory "search" SQL Injection Vulnerability
[SA27988] Ace Image Hosting Script "id" SQL Injection Vulnerability
[SA27986] Content Injector "id" SQL Injection Vulnerability
[SA28082] Hitachi Web Server Cross-Site Scripting Vulnerabilities
[SA28081] Apache mod_imap Module Cross-Site Scripting Vulnerability
[SA28078] BEA WebLogic Mobility Server Image Converter Security Bypass
[SA28077] JBoss Seam "order" EJBQL Injection Vulnerability
[SA28073] Apache mod_imap Module Cross-Site Scripting Vulnerability
[SA28069] Rainboard Unspecified Cross-Site Scripting
[SA28063] MySQL Security Issue and Two Vulnerabilities
[SA28049] Cybozu Products Cross-Site Scripting and HTTP Header
Injection
[SA28046] Apache mod_imagemap Module Cross-Site Scripting
Vulnerability
[SA28024] bitweaver Cross-Site Scripting Vulnerabilities
[SA28012] Serendipity Remote RSS Sidebar Plugin Script Insertion
[SA28006] WebSPELL Multiple Cross-Site Scripting Vulnerabilities
[SA28005] WordPress GBK/Big5 Character Set "s" SQL Injection
[SA27966] OpenNewsletter "type" Cross-Site Scripting
[SA28026] Websense User-Agent Filtering Bypass Security Issue
[SA27981] MySQL System Table Information Overwrite Vulnerability

=======================================================================5) Vulnerabilities Content Listing

Windows:--

[SA28036] Internet Explorer Multiple Code Execution Vulnerabilities

Critical:    Extremely critical
Where:       From remote
Impact:      System access
Released:    2007-12-11

Some vulnerabilities have been reported in Internet Explorer, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/28036/ 

 --

[SA27992] JustSystems Ichitaro Document Processing Buffer Overflow

Critical:    Extremely critical
Where:       From remote
Impact:      System access
Released:    2007-12-13

A vulnerability has been reported in JustSystems Ichitaro, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27992/ 

 --

[SA28055] HP Info Center HPInfo Class ActiveX Control Insecure Methods

Critical:    Highly critical
Where:       From remote
Impact:      Manipulation of data, Exposure of system information,
System access
Released:    2007-12-12

porkythepig has reported some vulnerabilities in HP Info Center, which
can be exploited by malicious people to gain knowledge of certain
system information, manipulate registry data, and to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/28055/ 

 --

[SA28034] Windows Media Format Runtime ASF Parsing Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-12-11

IBM X-Force has reported four vulnerabilities in Windows Media Format
Runtime / Windows Media Services, which can be exploited by malicious
people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/28034/ 

 --

[SA28031] BadBlue Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information, System
access
Released:    2007-12-11

Luigi Auriemma has reported some vulnerabilities in BadBlue, which can
be exploited by malicious people to disclose sensitive information,
bypass certain security restrictions, and compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/28031/ 

 --

[SA28010] Microsoft DirectX SAMI/WAV/AVI File Parsing Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-12-11

Two vulnerabilities have been reported in Microsoft DirectX, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/28010/ 

 --

[SA27998] 3ivx MPEG-4 MP4 File Processing Buffer Overflows

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-12-10

SYS 49152 has discovered some vulnerabilities in 3ivx MPEG-4, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27998/ 

 --

[SA28038] Trend Micro Products UUE File Parsing Buffer Overflow

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-12-12

Sowhat has reported a vulnerability in some Trend Micro products, which
potentially can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/28038/ 

 --

[SA28032] BarracudaDrive Web Server Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
system information, Exposure of sensitive information, DoS
Released:    2007-12-11

Luigi Auriemma has reported some vulnerabilities in BarracudaDrive Web
Server, which can be exploited by malicious users to manipulate certain
data and cause a DoS (Denial of Service), and by malicious people to
conduct script insertion attacks and disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/28032/ 

 --

[SA28007] Easy File Sharing Web Server Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, System access
Released:    2007-12-10

Luigi Auriemma has reported some vulnerabilities in Easy File Sharing
Web Server, which can be exploited by malicious people to disclose
sensitive information and by malicious users to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/28007/ 

 --

[SA27976] PenPal Three SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-12-07

Aria-Security Team have reported some vulnerabilities in PenPal, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/27976/ 

 --

[SA28051] Microsoft Windows Message Queuing Buffer Overflow

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-12-11

A vulnerability has been reported in Microsoft Windows, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/28051/ 

 --

[SA27997] Microsoft Windows Vista SMBv2 Signing Vulnerability

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-12-11

A vulnerability has been reported in Microsoft Windows Vista, which can
be exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27997/ 

 --

[SA28019] Websense "username" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-11

Dave Lewis has reported a vulnerability in Websense Enterprise and
Websense Web Security Suite, which can be exploited by malicious people
to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/28019/ 

 --

[SA28015] Windows Vista Kernel Legacy Reply Path Validation Privilege
Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-12-11

A vulnerability has been reported in Microsoft Windows Vista, which can
be exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/28015/ 

 --

[SA28011] Microsoft Windows Message Queuing Privilege Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-12-11

A vulnerability has been reported in Microsoft Windows, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/28011/ 

 --

[SA28072] Kerio WinRoute Firewall Proxy Server Unspecified Security
Bypass

Critical:    Not critical
Where:       Local system
Impact:      Security Bypass
Released:    2007-12-13

A weakness has been reported in Kerio WinRoute Firewall, which
potentially can be exploited by malicious, local users to bypass
certain security restrictions.

Full Advisory:
http://secunia.com/advisories/28072/ 


UNIX/Linux:--

[SA28068] Sun Solaris update for Adobe Flash Player

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of sensitive information, System access
Released:    2007-12-12

Sun has issued an update for Adobe Flash Player. This fixes some
vulnerabilities, which can be exploited by malicious people to gain
knowledge of sensitive information or compromise a user's system.

Full Advisory:
http://secunia.com/advisories/28068/ 

 --

[SA28056] Red Hat update for java-1.4.2-bea

Critical:    Highly critical
Where:       From remote
Impact:      System access, DoS
Released:    2007-12-12

Red Hat has issued an update for java-1.4.2-bea. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/28056/ 

 --

[SA28043] Fedora update for poppler

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-12-11

Fedora has issued an update for poppler. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/28043/ 

 --

[SA28039] SUSE update for OpenOffice_org

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-12-11

SUSE has issued an update for OpenOffice_org. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a user's system.

Full Advisory:
http://secunia.com/advisories/28039/ 

 --

[SA28001] Debian update for iceweasel

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, DoS, System access
Released:    2007-12-10

Debian has issued an update for iceweasel. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site request forgery and cross-site scripting attacks or
potentially to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/28001/ 

 --

[SA27979] Fedora update for seamonkey

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, DoS, System access
Released:    2007-12-10

Fedora has issued an update for seamonkey. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting and cross-site request forgery attacks and
potentially to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/27979/ 

 --

[SA27972] Fedora update for openoffice.org

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-12-10

Fedora has issued an update for openoffice.org. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a user's system.

Full Advisory:
http://secunia.com/advisories/27972/ 

 --

[SA28060] Debian update for ruby-gnome2

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-12

Debian has issued an update for ruby-gnome2. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/28060/ 

 --

[SA28050] Red Hat update for python

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, DoS, System access
Released:    2007-12-11

Red Hat has issued an update for python. This fixes a security issue
and a vulnerability, which can be exploited by malicious people to
disclose potentially sensitive information, cause a DoS (Denial of
Service), or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/28050/ 

 --

[SA28044] IBM AIX Multiple Unspecified Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Unknown
Released:    2007-12-12

Multiple vulnerabilities have been reported in IBM AIX, which have
unknown impacts.

Full Advisory:
http://secunia.com/advisories/28044/ 

 --

[SA28041] Avaya Products PCRE Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, DoS, System access
Released:    2007-12-13

Avaya has acknowledged some vulnerabilities in various Avaya products,
which can be exploited by malicious people to disclose sensitive
information, cause a DoS (Denial of Service), or potentially compromise
an application using the library.

Full Advisory:
http://secunia.com/advisories/28041/ 

 --

[SA28033] Debian update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-11

Debian has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users and
by malicious people to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/28033/ 

 --

[SA28027] Red Hat update for python

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information, DoS, System access
Released:    2007-12-11

Red Hat has issued an update for python. This fixes some security
issues and a vulnerability, which can be exploited by malicious people
to disclose potentially sensitive information, cause a DoS (Denial of
Service), or compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/28027/ 

 --

[SA28022] Gentoo update for ruby-gtk2

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-10

Gentoo has issued an update for ruby-gtk2. This fixes a vulnerability,
which can potentially be exploited by malicious people to compromise an
application using the library.

Full Advisory:
http://secunia.com/advisories/28022/ 

 --

[SA28021] Gentoo update for emul-linux-x86-qtlibs

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-10

Gentoo has issued an update for emul-linux-x86-qtlibs. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or potentially compromise an application using
the library.

Full Advisory:
http://secunia.com/advisories/28021/ 

 --

[SA28008] Debian update for sitebar

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Exposure of sensitive information,
System access
Released:    2007-12-10

Debian has issued an update for sitebar. This fixes some
vulnerabilities, which can be exploited by malicious people to conduct
cross-site scripting attacks, and by malicious users to disclose
potentially sensitive information and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/28008/ 

 --

[SA28002] wwwstats "link" Script Insertion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-10

Jesus Olmos Gonzalez has reported a vulnerability in wwwstats, which
can be exploited by malicious people to conduct script insertion
attacks.

Full Advisory:
http://secunia.com/advisories/28002/ 

 --

[SA27996] Debian update for qt-x11-free

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-10

Debian has issued an update for qt-x11-free. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) or compromise an application using the
library.

Full Advisory:
http://secunia.com/advisories/27996/ 

 --

[SA27989] Fedora update for eggdrop

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-12-11

Fedora has issued an update for eggdrop. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/27989/ 

 --

[SA27985] Gentoo update for cairo

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-12-10

Gentoo has issued an update for cairo. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise an
application using the library.

Full Advisory:
http://secunia.com/advisories/27985/ 

 --

[SA27984] Gentoo update for emacs

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2007-12-10

Gentoo has issued an update for emacs. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/27984/ 

 --

[SA27975] Fedora update for ruby-gnome

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-10

Fedora has issued an update for ruby-gnome. This fixes a vulnerability,
which can potentially be exploited by malicious people to compromise an
application using the library.

Full Advisory:
http://secunia.com/advisories/27975/ 

 --

[SA27973] Fedora update for drupal

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-12-10

Fedora has issued an update for drupal. This fixes a vulnerability,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/27973/ 

 --

[SA28067] Mandriva update for samba

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-12-12

Mandriva has issued an update for samba. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/28067/ 

 --

[SA28029] Gentoo update for samba

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-12-11

Gentoo has issued an update for samba. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/28029/ 

 --

[SA28028] rPath update for samba and samba-swat

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-12-11

rPath has issued an update for samba and samba-swat. This fixes a
vulnerability, which can be exploited by malicious people to compromise
a vulnerable system.

Full Advisory:
http://secunia.com/advisories/28028/ 

 --

[SA28003] SUSE update for samba

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-12-12

SUSE has issued an update for samba. This fixes a vulnerability, which
can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/28003/ 

 --

[SA27999] Debian update for samba

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-12-11

Debian has issued an update for samba. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/27999/ 

 --

[SA27993] Slackware update for samba

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-12-11

Slackware has issued an update for samba. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/27993/ 

 --

[SA27982] Gentoo update for firebird

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-12-10

Gentoo has issued an update for firebird. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27982/ 

 --

[SA27977] Fedora update for samba

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2007-12-11

Fedora has issued an update for samba. This fixes a vulnerability,
which can be exploited by malicious people to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/27977/ 

 --

[SA28062] Debian update for htdig

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-12

Debian has issued an update for htdig. This fixes a vulnerability,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/28062/ 

 --

[SA28061] Debian update for libnss-ldap

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-12-12

Debian has issued an update for nss-ldap. This fixes a security issue,
which can be exploited by malicious persons to manipulate certain
data.

Full Advisory:
http://secunia.com/advisories/28061/ 

 --

[SA28042] Mandriva update for e2fsprogs

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-11

Mandriva has issued an update for e2fsprogs. This fixes a
vulnerability, which potentially can be exploited by malicious people
to compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/28042/ 

 --

[SA28030] rPath update for e2fsprogs

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-12

rPath has issued an update for e2fsprogs. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/28030/ 

 --

[SA28000] Ubuntu update for e2fsprogs

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-10

Ubuntu has issued an update for e2fsprogs. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/28000/ 

 --

[SA27987] Debian update for e2fsprogs

Critical:    Less critical
Where:       From remote
Impact:      DoS, System access
Released:    2007-12-10

Debian has issued an update for e2fsprogs. This fixes some
vulnerabilities, which potentially can be exploited by malicious people
to compromise an application using the library.

Full Advisory:
http://secunia.com/advisories/27987/ 

 --

[SA27983] Gentoo update for PEAR-MDB2

Critical:    Less critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2007-12-10

Gentoo has issued an update for PEAR-MDB2. This fixes a security issue,
which can be exploited by malicious people to disclose potentially
sensitive information.

Full Advisory:
http://secunia.com/advisories/27983/ 

 --

[SA27980] Fedora update for nagios

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-10

Fedora has issued an update for nagios. This fixes a vulnerability,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/27980/ 

 --

[SA27971] Avaya Products Apache mod_proxy "date" Denial of Service

Critical:    Less critical
Where:       From remote
Impact:      DoS
Released:    2007-12-07

Avaya has acknowledged a vulnerability in various Avaya products, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/27971/ 

 --

[SA27967] Ubuntu update for tetex-bin and texlive-bin

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information,
DoS, System access
Released:    2007-12-07

Ubuntu has issued an update for tetex-bin and texlive-bin. This fixes
some vulnerabilities, which can be exploited by malicious, local users
to disclose and manipulate sensitive information and by malicious
people to potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27967/ 

 --

[SA28040] Mandriva update for MySQL

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass, Manipulation of data, DoS
Released:    2007-12-11

Mandriva has issued an update for MySQL. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
manipulate certain data and by malicious users to bypass certain
security restrictions or cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/28040/ 

 --

[SA28052] Red Hat autofs "/net" Privilege Escalation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-12-12

A vulnerability has been reported in Red Hat Enterprise Linux, which
can be exploited by malicious, local users to gain escalated
privileges.

Full Advisory:
http://secunia.com/advisories/28052/ 

 --

[SA28023] Gentoo update for lookup

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-12-10

Gentoo has issued an update for lookup. This fixes a vulnerability,
which can be exploited by malicious, local users to perform certain
actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/28023/ 

 --

[SA28004] Fedora update for xorg-x11-xfs

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-12-11

Fedora has issued an update for xorg-x11-xfs. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/28004/ 

 --

[SA27978] Fedora update for zabbix

Critical:    Not critical
Where:       From local network
Impact:      Privilege escalation
Released:    2007-12-10

Fedora has issued an update for zabbix. This fixes a weakness, which
can be exploited by malicious users to perform certain actions with
escalated privileges.

Full Advisory:
http://secunia.com/advisories/27978/ 

 --

[SA28070] Linux Kernel "mmap_min_addr" Security Bypass

Critical:    Not critical
Where:       Local system
Impact:      Security Bypass
Released:    2007-12-12

A security issue has been reported in the Linux Kernel, which can be
exploited by malicious, local users to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/28070/ 

 --

[SA28057] Avaya CMS / IR Solaris Remote Procedure Call Module Denial of
Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-12-12

Avaya has acknowledged a vulnerability in Avaya CMS / IR, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/28057/ 

 --

[SA28048] Mac OS X "cs_validate_page()" Local Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2007-12-13

mu-b has reported a vulnerability in Mac OS X, which can be exploited
by malicious, local users to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/28048/ 


Other:--

[SA27970] IBM HMC Version 3 Privilege Escalation Vulnerabilities

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2007-12-07

Some vulnerabilities have been reported in IBM HMC, which can be
exploited by malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/27970/ 


Cross Platform:--

[SA28066] ViArt CMS/HelpDesk/Shop "root_folder_path" File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-12-12

RoMaNcYxHaCkEr has discovered a vulnerability in various ViArt
products, which can be exploited by malicious people to disclose
sensitive information or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/28066/ 

 --

[SA28058] CityWriter "path" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-12-13

RoMaNcYxHaCkEr has discovered a vulnerability in CityWriter, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/28058/ 

 --

[SA28054] Fastpublish CMS designconfig.php File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2007-12-13

RoMaNcYxHaCkEr has discovered a vulnerability in Fastpublish CMS, which
can be exploited by malicious people to disclose sensitive information
or to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/28054/ 

 --

[SA28047] Falcon Series One Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, System access
Released:    2007-12-11

MhZ91 has reported some vulnerabilities in Falcon Series One, which can
be exploited by malicious people to conduct script insertion and
cross-site request forgery attacks and to compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/28047/ 

 --

[SA28018] Sun StarOffice/StarSuite Database Document Processing
Arbitrary Java Method Execution

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-12-10

Sun has acknowledged a vulnerability in Sun StarOffice and StarSuite,
which can be exploited by malicious people to compromise a user's
system.

Full Advisory:
http://secunia.com/advisories/28018/ 

 --

[SA27974] Novell NetMail AntiVirus Agent Integer Overflow
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2007-12-07

A vulnerability has been reported in Novell NetMail, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/27974/ 

 --

[SA28080] Robocode Arbitrary Java Code Execution Security Issue

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-12-13

A security issue has been reported in Robocode, which can be exploited
by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/28080/ 

 --

[SA28075] MMS Gallery PHP "id" File Inclusion Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-12-13

GoLd_M has reported some vulnerabilities in MMS Gallery PHP, which can
be exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/28075/ 

 --

[SA28071] xml2owl "file" Information Disclosure Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-12-13

GoLd_M has discovered a vulnerability in xml2owl, which can be
exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/28071/ 

 --

[SA28053] Mcms Easy Web Make "template" Local File Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-12-12

MhZ91 has discovered a vulnerability in Mcms Easy Web Make, which can
be exploited by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/28053/ 

 --

[SA28045] Falt4 CMS Cross-Site Scripting and SQL Injection
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2007-12-11

Mesut Timur has reported some vulnerabilities in Falt4 CMS, which can
be exploited by malicious people to conduct cross-site scripting and
SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/28045/ 

 --

[SA28035] Cybozu Office Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, DoS
Released:    2007-12-11

Some vulnerabilities have been reported in Cybozu Office, which can be
exploited by malicious people to conduct cross-site scripting attacks,
HTTP header injection attacks, or cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/28035/ 

 --

[SA28014] aurora framework "pack_var()" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-12-12

A vulnerability has been reported in aurora framework, which can be
exploited by malicious people to conduct SQL injection attacks against
applications using the framework.

Full Advisory:
http://secunia.com/advisories/28014/ 

 --

[SA28013] PolDoc Document Management System "filename" Information
Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2007-12-10

GoLd_M has discovered a vulnerability in PolDoc Document Management
System (PDDMS), which can be exploited by malicious people to disclose
sensitive information.

Full Advisory:
http://secunia.com/advisories/28013/ 

 --

[SA27990] DWdirectory "search" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-12-10

t0pP8uZz & xprog have reported a vulnerability in DWdirectory, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/27990/ 

 --

[SA27988] Ace Image Hosting Script "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-12-10

t0pP8uZz & xprog have reported a vulnerability in Ace Image Hosting
Script, which can be exploited by malicious people to conduct SQL
injections attacks.

Full Advisory:
http://secunia.com/advisories/27988/ 

 --

[SA27986] Content Injector "id" SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-12-10

S.W.A.T. has discovered a vulnerability in Content Injector, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/27986/ 

 --

[SA28082] Hitachi Web Server Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-13

Hitachi has acknowledged some vulnerabilities in the Hitachi Web
Server, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/28082/ 

 --

[SA28081] Apache mod_imap Module Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-13

A vulnerability has been reported in the mod_imap module for Apache,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/28081/ 

 --

[SA28078] BEA WebLogic Mobility Server Image Converter Security Bypass

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass
Released:    2007-12-13

A vulnerability has been reported in the BEA WebLogic Mobility Server,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/28078/ 

 --

[SA28077] JBoss Seam "order" EJBQL Injection Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2007-12-13

A vulnerability has been reported in JBoss Seam, which potentially can
be exploited by malicious people to conduct SQL injection attacks
against applications using the framework.

Full Advisory:
http://secunia.com/advisories/28077/ 

 --

[SA28073] Apache mod_imap Module Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-12

A vulnerability has been reported in the mod_imap module for Apache,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/28073/ 

 --

[SA28069] Rainboard Unspecified Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-12

A vulnerability has been reported in Rainboard, which can be exploited
by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/28069/ 

 --

[SA28063] MySQL Security Issue and Two Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data, Privilege escalation, DoS
Released:    2007-12-12

A security issue and two vulnerabilities have been reported in MySQL,
which can be exploited by malicious users to gain escalated privileges,
manipulate certain data, or to cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/28063/ 

 --

[SA28049] Cybozu Products Cross-Site Scripting and HTTP Header
Injection

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-11

Some vulnerabilities have been reported in Cybozu products, which can
be exploited by malicious people to conduct cross-site scripting and
HTTP header injection attacks.

Full Advisory:
http://secunia.com/advisories/28049/ 

 --

[SA28046] Apache mod_imagemap Module Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-12

A vulnerability has been reported in the mod_imagemap module for
Apache, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/28046/ 

 --

[SA28024] bitweaver Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-10

DoZ has discovered some vulnerabilities in bitweaver, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/28024/ 

 --

[SA28012] Serendipity Remote RSS Sidebar Plugin Script Insertion

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-10

A vulnerability has been reported in Serendipity, which can be
exploited by malicious people to conduct script-insertion attacks.

Full Advisory:
http://secunia.com/advisories/28012/ 

 --

[SA28006] WebSPELL Multiple Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-11

Brainhead has discovered some vulnerabilities in WebSPELL, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/28006/ 

 --

[SA28005] WordPress GBK/Big5 Character Set "s" SQL Injection

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2007-12-11

Abel Cheung has discovered a vulnerability in WordPress, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/28005/ 

 --

[SA27966] OpenNewsletter "type" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2007-12-07

Manuel Fernandez has discovered a vulnerability in OpenNewsletter,
which can be exploited by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/27966/ 

 --

[SA28026] Websense User-Agent Filtering Bypass Security Issue

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass
Released:    2007-12-13

mrhinkydink has reported a security issue in Websense, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/28026/ 

 --

[SA27981] MySQL System Table Information Overwrite Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Manipulation of data
Released:    2007-12-10

A vulnerability has been reported in MySQL, which can be exploited by
malicious, local users to manipulate certain data.

Full Advisory:
http://secunia.com/advisories/27981/ 



=======================================================================
Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/ 

Subscribe:
http://secunia.com/secunia_weekly_summary/ 

Contact details:
Web	: http://secunia.com/ 
E-mail	: support@secunia.com 
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45


__________________________________________________________________      
Visit InfoSec News
http://www.infosecnews.org/ 

Site design & layout copyright © 1986-2014 CodeGods