[ISN] Secunia Weekly Summary - Issue: 2006-22

InfoSec News isn at c4i.org
Fri Jun 2 01:18:07 EDT 2006


========================================================================

                  The Secunia Weekly Advisory Summary                  
                        2006-05-25 - 2006-06-01                        

                       This week: 102 advisories                       

========================================================================
Table of Contents:

1.....................................................Word From Secunia
2....................................................This Week In Brief
3...............................This Weeks Top Ten Most Read Advisories
4.......................................Vulnerabilities Summary Listing
5.......................................Vulnerabilities Content Listing

========================================================================
1) Word From Secunia:

The Secunia staff is spending hours every day to assure you the best
and most reliable source for vulnerability information. Every single 
vulnerability report is being validated and verified before a Secunia
advisory is written.

Secunia validates and verifies vulnerability reports in many different
ways e.g. by downloading the software and performing comprehensive
tests, by reviewing source code, or by validating the credibility of
the source from which the vulnerability report was issued.

As a result, Secunia's database is the most correct and complete source
for recent vulnerability information available on the Internet.

Secunia Online Vulnerability Database:
http://secunia.com/

========================================================================
2) This Week in Brief:

eEye Digital Security has reported a vulnerability in Symantec Client
Security and Symantec AntiVirus Corporate Edition, which can be
exploited by malicious people to compromise a user's system.

Users of Symantec products are advised to view the referenced Secunia
advisory for additional details and information about patches.

Reference:
http://secunia.com/SA20318

 --

VIRUS ALERTS:

Secunia has not issued any virus alerts during the week.

========================================================================
3) This Weeks Top Ten Most Read Advisories:

1.  [SA20153] Microsoft Word Malformed Object Code Execution
              Vulnerability
2.  [SA19762] Internet Explorer "object" Tag Memory Corruption
              Vulnerability
3.  [SA20107] RealVNC Password Authentication Bypass Vulnerability
4.  [SA19738] Internet Explorer "mhtml:" Redirection Disclosure of
              Sensitive Information
5.  [SA20261] Cisco VPN Client Privilege Escalation Vulnerability
6.  [SA19521] Internet Explorer Window Loading Race Condition Address
              Bar Spoofing
7.  [SA18680] Microsoft Internet Explorer "createTextRange()" Code
              Execution
8.  [SA20288] Novell Netware abend.log User Credentials Disclosure
9.  [SA15601] Mozilla / Mozilla Firefox Frame Injection Vulnerability
10. [SA20300] Basic Analysis and Security Engine "BASE_path" File
              Inclusion

========================================================================
4) Vulnerabilities Summary Listing

Windows:
[SA20361] wodSFTP ActiveX Component Arbitrary File Access
Vulnerability
[SA20318] Symantec Client Security / AntiVirus Unspecified Code
Execution
[SA20407] F-Secure Products Web Console Buffer Overflow Vulnerability
[SA20357] Enigma Haber Multiple SQL Injection Vulnerabilities
[SA20355] AspSitem SQL Injection and Private Message Disclosure
[SA20348] Nukedit "groupid" Parameter Administrator Register
Vulnerability
[SA20347] Hitachi HITSENSER3 SQL Injection Vulnerability
[SA20335] My Web Server Long URL Denial of Service
[SA20317] Mini-NUKE SQL Injection Vulnerabilities
[SA20309] qjForum member.asp SQL Injection Vulnerability
[SA20294] NewsCMSLite Admin Logon Bypass Vulnerability
[SA20360] ASPBB "search" Parameter Cross-Site Scripting Vulnerability
[SA20319] Omegasoft Insel "WCE" Parameter Cross-Site Scripting
[SA20342] Jiwa Financials Information Disclosure Vulnerability

UNIX/Linux:
[SA20313] Ubuntu update for nagios
[SA20281] Mandriva update for mpg123
[SA20398] SUSE update for kernel
[SA20374] 4nForum "tid" Parameter SQL Injection Vulnerability
[SA20345] Gentoo update for libtiff
[SA20344] Gentoo update for cherrypy
[SA20339] Mandriva update for dia
[SA20338] Debian update for kernel-source-2.4.17
[SA20326] Debian update for libextractor
[SA20323] Open-Xchange Default Account Password
[SA20314] Ubuntu update for postgresql
[SA20284] Pre News Manager Multiple SQL Injection Vulnerabilities
[SA20381] UnixWare update for MySQL
[SA20283] Debian update for awstats
[SA20396] SUSE update for rug
[SA20389] FreeBSD ypserv Inoperative Access Controls Security Issue
[SA20333] Debian update for mysql-dfsg
[SA20302] OpenOBEX ircp File Overwrite Vulnerability
[SA20390] FreeBSD SMBFS chroot Directory Traversal Vulnerability
[SA20388] SUSE update for vixie-cron
[SA20380] Vixie Cron "do_command.c" setuid Security Issue
[SA20370] Shadow "useradd.c" Insecure Mailbox File Permissions
[SA20368] Debian update for motor
[SA20332] Avaya PDS Software Distributor Privilege Escalation
[SA20329] Motor ktools VGETSTRING Buffer Overflow Vulnerability
[SA20325] AIX lsmcode Unspecified Privilege Escalation Vulnerability
[SA20312] SUSE update for foomatic-filters
[SA20369] xine-lib HTTP Response Heap Corruption Weakness
[SA20330] Debian update for tiff
[SA20315] Debian update for dovecot
[SA20308] Dovecot "LIST" Command Directory Traversal Weakness
[SA20349] Linux Kernel SMP "/proc" Race Condition Denial of Service
[SA20337] PHP "curl_init()" Safe Mode Bypass Weakness

Other:
[SA20378] Secure Elements Class 5 AVR Multiple Vulnerabilities
[SA20343] D-Link Airspot DSA-3100 Gateway "uname" Cross-Site Scripting
[SA20288] Novell Netware abend.log User Credentials Disclosure
[SA20377] Secure Elements Class 5 AVR Message Encryption Security
Issue

Cross Platform:
[SA20404] METAjour "system_path" Parameter File Inclusion
Vulnerabilities
[SA20399] Ottoman "default_path" File Inclusion Vulnerabilities
[SA20373] phpMyDesktop|arcade Local File Inclusion and Script
Insertion
[SA20364] IBM DCE Two Kerberos Vulnerabilities
[SA20358] F at cile Interactive Web Multiple Vulnerabilities
[SA20356] tinyBB SQL Injection and File Inclusion Vulnerabilities
[SA20354] phpBB Activity Mod Plus Module "phpbb_root_path" File
Inclusion
[SA20353] UBB.threads Cross-Site Scripting and File Inclusion
[SA20350] phpBB Blend Portal System Module "phpbb_root_path" File
Inclusion
[SA20346] Fastpublish CMS "config[fsBase]" File Inclusion
Vulnerabilities
[SA20331] Hot Open Tickets "CLASS_PATH" Parameter File Inclusion
[SA20310] Plume CMS "/manager/frontinc/prepend.php" File Inclusion
[SA20301] open-medium.CMS "404.php" File Inclusion Vulnerability
[SA20300] Basic Analysis and Security Engine "BASE_path" File
Inclusion
[SA20299] ActionApps "GLOBALS[AA_INC_PATH]" File Inclusion
[SA20298] DoceboLMS "lang" Parameter File Inclusion Vulnerabilities
[SA20292] Back-End CMS "_PSL[classdir]" File Inclusion Vulnerability
[SA20375] pppBLOG "files[0]" Parameter Disclosure of Sensitive
Information
[SA20367] WebCalendar "includedir" Parameter Arbitrary Setting File
Loading
[SA20366] WikiNi Script Insertion Vulnerabilities
[SA20359] phpBB Nivisec Hacks List Module Local File Inclusion
[SA20352] Eggblog posts.php SQL Injection Vulnerability
[SA20351] aMule Information Disclosure Vulnerability
[SA20316] Geeklog Multiple Vulnerabilities and Weaknesses
[SA20307] Seditio "Referer" HTTP Header Script Insertion Vulnerability
[SA20304] ByteHoard File Copy and Script Insertion Vulnerabilities
[SA20303] MailManager PostgreSQL Encoding-Based SQL Injection
[SA20297] V-webmail "CONFIG[pear_dir]" File Inclusion Vulnerability
[SA20295] Pre Shopping Mall SQL Injection Vulnerabilities
[SA20290] ChatPat Script Insertion and SQL Injection Vulnerabilities
[SA20287] iFdate Cross-Site Scripting and Script Insertion
Vulnerabilities
[SA20286] Realty Pro One Cross-Site Scripting and SQL Injection
[SA20363] XiTi Tracking Script "xiti.js" Cross-Site Scripting
Vulnerabilities
[SA20341] Open Searchable Image Catalogue SQL Injection
Vulnerabilities
[SA20340] DGNews "upprocess.php" File Upload Vulnerability
[SA20336] Photoalbum B&W "index.php" Cross-Site Scripting
Vulnerabilities
[SA20334] TikiWiki Multiple Cross-Site Scripting Vulnerabilities
[SA20327] Achievo "atkselector" Parameter SQL Injection Vulnerability
[SA20324] Vacation Rental Script "obj" Parameter Cross-Site Scripting
[SA20322] Pretty Guestbook "pagina" Cross-Site Scripting Vulnerability
[SA20321] Smile Guestbook "pagina" Cross-Site Scripting Vulnerability
[SA20320] Morris Guestbook "pagina" Cross-Site Scripting Vulnerability
[SA20311] php-residence Multiple Script Insertion Vulnerabilities
[SA20306] PHPSimpleChoose Cross-Site Scripting Vulnerability
[SA20305] PHP-AGTC membership system "useremail" Script Insertion
[SA20296] CMS Mundo "searchstring" Cross-Site Scripting Vulnerability
[SA20293] phpESP ADOdb Cross-Site Scripting Vulnerabilities
[SA20291] AZ Photo Album Script Pro Cross-Site Scripting Vulnerability
[SA20289] Elite-Board "search" Parameter Cross-Site Scripting
Vulnerability
[SA20285] Assetman Unspecified Script Insertion Vulnerabilities
[SA20282] iFlance Multiple Cross-Site Scripting Vulnerabilities

========================================================================
5) Vulnerabilities Content Listing

Windows:--

[SA20361] wodSFTP ActiveX Component Arbitrary File Access
Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, System access
Released:    2006-05-31

Will Dormann has reported a vulnerability in WeOnlyDo wodSFTP, which
can be exploited by malicious people to disclose sensitive information
and potentially compromise a user's system.

Full Advisory:
http://secunia.com/advisories/20361/

 --

[SA20318] Symantec Client Security / AntiVirus Unspecified Code
Execution

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-05-29

eEye Digital Security has reported a vulnerability in Symantec Client
Security and Symantec AntiVirus Corporate Edition, which can be
exploited by malicious people to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/20318/

 --

[SA20407] F-Secure Products Web Console Buffer Overflow Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-06-01

A vulnerability has been reported in F-Secure Anti-Virus for Microsoft
Exchange and F-Secure Internet Gatekeeper, which potentially can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20407/

 --

[SA20357] Enigma Haber Multiple SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-05-29

Mustafa Can Bjorn has reported some vulnerabilities in Enigma Haber,
which can be exploited by malicious people to conduct SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/20357/

 --

[SA20355] AspSitem SQL Injection and Private Message Disclosure

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data, Exposure of sensitive information
Released:    2006-05-29

Mustafa Can Bjorn has reported two vulnerabilities in AspSitem, which
can be exploited by malicious users to disclose sensitive information
or malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/20355/

 --

[SA20348] Nukedit "groupid" Parameter Administrator Register
Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-05-30

FarhadKey has discovered a vulnerability in Nukedit, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/20348/

 --

[SA20347] Hitachi HITSENSER3 SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-05-31

A vulnerability has been reported in Hitachi HITSENSER3, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/20347/

 --

[SA20335] My Web Server Long URL Denial of Service

Critical:    Moderately critical
Where:       From remote
Impact:      DoS
Released:    2006-05-29

s3rv3r_hack3r has discovered a vulnerability in My Web Server, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/20335/

 --

[SA20317] Mini-NUKE SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-05-29

Mustafa Can Bjorn has reported some vulnerabilities in Mini-NUKE, which
can be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/20317/

 --

[SA20309] qjForum member.asp SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-05-29

ajann has reported a vulnerability in qjForum, which can be exploited
by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/20309/

 --

[SA20294] NewsCMSLite Admin Logon Bypass Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-05-26

FarhadKey has discovered a vulnerability in NewsCMSLite, which can be
exploited by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/20294/

 --

[SA20360] ASPBB "search" Parameter Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-29

Mustafa Can Bjorn has reported a vulnerability in ASPBB, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/20360/

 --

[SA20319] Omegasoft Insel "WCE" Parameter Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-31

MC.Iglo has reported a vulnerability in Omegasoft Insel, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/20319/

 --

[SA20342] Jiwa Financials Information Disclosure Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      Exposure of sensitive information
Released:    2006-05-30

Robert Passlow has reported a vulnerability in Jiwa Financials, which
can be exploited by malicious users to disclose potentially sensitive
information.

Full Advisory:
http://secunia.com/advisories/20342/


UNIX/Linux:--

[SA20313] Ubuntu update for nagios

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-05-30

Ubuntu has issued an update for nagios. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20313/

 --

[SA20281] Mandriva update for mpg123

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-05-29

Mandriva has issued an update for mpg123. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/20281/

 --

[SA20398] SUSE update for kernel

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of system information, Exposure
of sensitive information, DoS
Released:    2006-06-01

SUSE has issued an update for the kernel. This fixes some
vulnerabilities and weaknesses, which can be exploited by malicious,
local users to bypass certain security restrictions, gain knowledge of
potentially sensitive information and to cause a DoS (Denial of
Service), and by malicious people to disclose certain system
information, potentially to bypass certain security restrictions and to
cause a DoS (Denial of Service).

Full Advisory:
http://secunia.com/advisories/20398/

 --

[SA20374] 4nForum "tid" Parameter SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-05-31

CrAzY CrAcKeR has reported a vulnerability in 4nForum, which can be
exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/20374/

 --

[SA20345] Gentoo update for libtiff

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-05-31

Gentoo has issued an update for libtiff. This fixes some
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially to compromise a user's system.

Full Advisory:
http://secunia.com/advisories/20345/

 --

[SA20344] Gentoo update for cherrypy

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-05-31

Gentoo has issued an update for cherrypy. This fixes a vulnerability,
which can be exploited by malicious people to disclose potentially
sensitive information.

Full Advisory:
http://secunia.com/advisories/20344/

 --

[SA20339] Mandriva update for dia

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2006-05-31

Mandriva has issued an update for dia. This fixes some vulnerabilities,
which potentially can be exploited by malicious people to compromise a
user's system.

Full Advisory:
http://secunia.com/advisories/20339/

 --

[SA20338] Debian update for kernel-source-2.4.17

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information, Privilege escalation, DoS, System access
Released:    2006-05-31

Debian has issued an update for kernel-source-2.4.17. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
gain knowledge of sensitive information, cause a DoS (Denial of
Service), gain escalated privileges, and by malicious people to cause a
DoS, and disclose potentially sensitive information.

Full Advisory:
http://secunia.com/advisories/20338/

 --

[SA20326] Debian update for libextractor

Critical:    Moderately critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-05-29

Debian has issued an update for libextractor. This fixes two
vulnerabilities, which can be exploited by malicious people to cause a
DoS (Denial of Service) and potentially compromise an application that
uses the library.

Full Advisory:
http://secunia.com/advisories/20326/

 --

[SA20323] Open-Xchange Default Account Password

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass
Released:    2006-05-29

Cemil Degirmenci has reported a security issue in Open-Xchange, which
potentially can be exploited by malicious people to bypass certain
security restrictions.

Full Advisory:
http://secunia.com/advisories/20323/

 --

[SA20314] Ubuntu update for postgresql

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-05-30

Ubuntu has issued an update for postgresql. This fixes two
vulnerabilities, which potentially can be exploited by malicious people
to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/20314/

 --

[SA20284] Pre News Manager Multiple SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2006-05-26

luny has reported some vulnerabilities in Pre News Manager, which can
be exploited by malicious people to conduct cross-site scripting
attacks and SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/20284/

 --

[SA20381] UnixWare update for MySQL

Critical:    Moderately critical
Where:       From local network
Impact:      System access
Released:    2006-06-01

SCO has issued an update for MySQL. This fixes a vulnerability, which
can be exploited by malicious users to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20381/

 --

[SA20283] Debian update for awstats

Critical:    Less critical
Where:       From remote
Impact:      Security Bypass, System access
Released:    2006-05-26

Debian has issued an update for awstats. This fixes a security issue,
which can be exploited by malicious people to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/20283/

 --

[SA20396] SUSE update for rug

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass, Exposure of sensitive information
Released:    2006-06-01

SUSE has issued an update for rug. This fixes a security issue and a
weakness, which can be exploited by malicious, local users to disclose
certain sensitive information and potentially by malicious people to
bypass security restrictions.

Full Advisory:
http://secunia.com/advisories/20396/

 --

[SA20389] FreeBSD ypserv Inoperative Access Controls Security Issue

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass
Released:    2006-06-01

A security issue has been reported in FreeBSD, which can be exploited
by malicious people to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/20389/

 --

[SA20333] Debian update for mysql-dfsg

Critical:    Less critical
Where:       From local network
Impact:      Security Bypass, Exposure of sensitive information, System
access
Released:    2006-05-29

Debian has issued an update for mysql-dfsg. This fixes some
vulnerabilities, which can be exploited by malicious users to bypass
certain security restrictions, disclose potentially sensitive
information, and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20333/

 --

[SA20302] OpenOBEX ircp File Overwrite Vulnerability

Critical:    Less critical
Where:       From local network
Impact:      Manipulation of data
Released:    2006-05-26

Jeroen van Wolffelaar has reported a vulnerability in Open OBEX, which
can be exploited by malicious people to manipulate certain data on a
user's system.

Full Advisory:
http://secunia.com/advisories/20302/

 --

[SA20390] FreeBSD SMBFS chroot Directory Traversal Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Security Bypass
Released:    2006-06-01

A vulnerability has been reported in FreeBSD, which can be exploited by
malicious, local users to bypass certain security restrictions.

Full Advisory:
http://secunia.com/advisories/20390/

 --

[SA20388] SUSE update for vixie-cron

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-06-01

SUSE has issued an update for vixie-cron. This fixes a security issue,
which potentially can be exploited by malicious, local users to perform
certain actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/20388/

 --

[SA20380] Vixie Cron "do_command.c" setuid Security Issue

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-06-01

Roman Veretelnikov has reported a security issue in Vixie Cron, which
potentially can be exploited by malicious, local users to perform
certain actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/20380/

 --

[SA20370] Shadow "useradd.c" Insecure Mailbox File Permissions

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-05-31

A security issue has been reported in Shadow, which potentially can be
exploited by malicious, local users to perform certain actions with
escalated privileges.

Full Advisory:
http://secunia.com/advisories/20370/

 --

[SA20368] Debian update for motor

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-05-31

Debian has issued an update for motor. This fixes a vulnerability,
which potentially can be exploited by malicious, local users to perform
certain actions with escalated privileges.

Full Advisory:
http://secunia.com/advisories/20368/

 --

[SA20332] Avaya PDS Software Distributor Privilege Escalation

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-05-29

Avaya has acknowledged a vulnerability in Avaya Predictive Dialing
System (PDS), which can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/20332/

 --

[SA20329] Motor ktools VGETSTRING Buffer Overflow Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-05-31

A vulnerability has been reported in Motor, which potentially can be
exploited by malicious, local users to perform certain actions with
escalated privileges.

Full Advisory:
http://secunia.com/advisories/20329/

 --

[SA20325] AIX lsmcode Unspecified Privilege Escalation Vulnerability

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-05-29

A vulnerability has been reported in AIX, which can be exploited by
malicious, local users to gain escalated privileges.

Full Advisory:
http://secunia.com/advisories/20325/

 --

[SA20312] SUSE update for foomatic-filters

Critical:    Less critical
Where:       Local system
Impact:      Privilege escalation
Released:    2006-05-30

SUSE has issued an update for foomatic-filters. This fixes a
vulnerability, which can be exploited by malicious, local users to gain
escalated privileges.

Full Advisory:
http://secunia.com/advisories/20312/

 --

[SA20369] xine-lib HTTP Response Heap Corruption Weakness

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2006-05-31

Federico L. Bossi Bonin has discovered a weakness in xine-lib, which
can be exploited by malicious people to crash certain applications on a
user's system.

Full Advisory:
http://secunia.com/advisories/20369/

 --

[SA20330] Debian update for tiff

Critical:    Not critical
Where:       From remote
Impact:      DoS
Released:    2006-05-29

Debian has issued an update for tiff. This fixes a vulnerability, which
can be exploited by malicious people to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/20330/

 --

[SA20315] Debian update for dovecot

Critical:    Not critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-05-29

Debian has issued an update for dovecot. This fixes a weakness, which
can be exploited by malicious users to gain knowledge of potentially
sensitive information.

Full Advisory:
http://secunia.com/advisories/20315/

 --

[SA20308] Dovecot "LIST" Command Directory Traversal Weakness

Critical:    Not critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-05-29

A weakness has been reported in Dovecot, which can be exploited by
malicious users to gain knowledge of potentially sensitive
information.

Full Advisory:
http://secunia.com/advisories/20308/

 --

[SA20349] Linux Kernel SMP "/proc" Race Condition Denial of Service

Critical:    Not critical
Where:       Local system
Impact:      DoS
Released:    2006-05-31

Tony Griffiths has reported a vulnerability in the Linux Kernel, which
can be exploited malicious, local users to cause a DoS (Denial of
Service).

Full Advisory:
http://secunia.com/advisories/20349/

 --

[SA20337] PHP "curl_init()" Safe Mode Bypass Weakness

Critical:    Not critical
Where:       Local system
Impact:      Security Bypass
Released:    2006-05-30

Maksymilian Arciemowicz has discovered a weakness in PHP, which can be
exploited by malicious, local users to bypass certain security
restrictions.

Full Advisory:
http://secunia.com/advisories/20337/


Other:--

[SA20378] Secure Elements Class 5 AVR Multiple Vulnerabilities

Critical:    Moderately critical
Where:       From local network
Impact:      Security Bypass, Spoofing, Exposure of system information,
Exposure of sensitive information, DoS, System access
Released:    2006-05-31

Multiple vulnerabilities and security issues have been reported in
Secure Elements Class 5 AVR, which can be exploited by malicious people
to disclose potentially sensitive information, bypass certain security
restrictions, spoof the contents of messages, cause a DoS (Denial of
Service) and potentially to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20378/

 --

[SA20343] D-Link Airspot DSA-3100 Gateway "uname" Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-29

jaime.blasco has reported a vulnerability in D-Link Airspot DSA-3100
Gateway, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/20343/

 --

[SA20288] Novell Netware abend.log User Credentials Disclosure

Critical:    Less critical
Where:       Local system
Impact:      Exposure of sensitive information
Released:    2006-05-26

A security issue has been reported in Novell Netware, which can be
exploited by malicious, local users to gain knowledge of sensitive
information.

Full Advisory:
http://secunia.com/advisories/20288/

 --

[SA20377] Secure Elements Class 5 AVR Message Encryption Security
Issue

Critical:    Not critical
Where:       From local network
Impact:      Exposure of sensitive information
Released:    2006-05-31

A security issue has been reported in Secure Elements Class 5 AVR,
which potentially can be exploited by malicious people to disclose
certain sensitive information.

Full Advisory:
http://secunia.com/advisories/20377/


Cross Platform:--

[SA20404] METAjour "system_path" Parameter File Inclusion
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-06-01

Kacper has discovered some vulnerabilities in METAjour, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20404/

 --

[SA20399] Ottoman "default_path" File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-06-01

Kacper has discovered some vulnerabilities in Ottoman, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20399/

 --

[SA20373] phpMyDesktop|arcade Local File Inclusion and Script
Insertion

Critical:    Highly critical
Where:       From remote
Impact:      Exposure of sensitive information, System access, Cross
Site Scripting
Released:    2006-05-31

darkgod has discovered two vulnerabilities in phpMyDesktop|arcade,
which can be exploited by malicious people to conduct script insertion
attacks, disclose sensitive information, and compromise a vulnerable
system.

Full Advisory:
http://secunia.com/advisories/20373/

 --

[SA20364] IBM DCE Two Kerberos Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      DoS, System access
Released:    2006-06-01

IBM has acknowledged two vulnerabilities in IBM DCE, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
potentially compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20364/

 --

[SA20358] F at cile Interactive Web Multiple Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, System access
Released:    2006-05-29

Mustafa Can Bjorn has reported some vulnerabilities in F at cile
Interactive Web, which can be exploited by malicious people to conduct
cross-site scripting attacks, disclose sensitive information, and
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20358/

 --

[SA20356] tinyBB SQL Injection and File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      Manipulation of data, System access
Released:    2006-05-29

Mustafa Can Bjorn has discovered some vulnerabilities in tinyBB, which
can be exploited by malicious people to conduct SQL injection attacks
and to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20356/

 --

[SA20354] phpBB Activity Mod Plus Module "phpbb_root_path" File
Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-05-30

Mustafa Can Bjorn has reported a vulnerability in the Activity Mod Plus
module for phpBB, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20354/

 --

[SA20353] UBB.threads Cross-Site Scripting and File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      Cross Site Scripting, System access
Released:    2006-05-30

Mustafa Can Bjorn has discovered some vulnerabilities in UBB.threads,
which can be exploited by malicious people to conduct cross-site
scripting attacks and compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20353/

 --

[SA20350] phpBB Blend Portal System Module "phpbb_root_path" File
Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-05-30

Mustafa Can Bjorn has reported a vulnerability in the Blend Portal
System module for phpBB, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20350/

 --

[SA20346] Fastpublish CMS "config[fsBase]" File Inclusion
Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-05-30

Kacper has reported some vulnerabilities in Fastpublish CMS, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20346/

 --

[SA20331] Hot Open Tickets "CLASS_PATH" Parameter File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-05-29

Kacper has discovered a vulnerability in Hot Open Tickets, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20331/

 --

[SA20310] Plume CMS "/manager/frontinc/prepend.php" File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-05-29

beford has discovered a vulnerability in Plume CMS, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20310/

 --

[SA20301] open-medium.CMS "404.php" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-05-26

Kacper has discovered a vulnerability in the open-medium.CMS, which can
be exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20301/

 --

[SA20300] Basic Analysis and Security Engine "BASE_path" File
Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-05-26

str0ke has discovered some vulnerabilities in Basic Analysis and
Security Engine, which can be exploited by malicious people to
compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20300/

 --

[SA20299] ActionApps "GLOBALS[AA_INC_PATH]" File Inclusion

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-05-26

Kacper has discovered some vulnerabilities in ActionApps, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20299/

 --

[SA20298] DoceboLMS "lang" Parameter File Inclusion Vulnerabilities

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-05-26

beford has discovered some vulnerabilities in DoceboLMS, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20298/

 --

[SA20292] Back-End CMS "_PSL[classdir]" File Inclusion Vulnerability

Critical:    Highly critical
Where:       From remote
Impact:      System access
Released:    2006-05-26

Kacper has discovered a vulnerability in Back-End CMS, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20292/

 --

[SA20375] pppBLOG "files[0]" Parameter Disclosure of Sensitive
Information

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-06-01

rgod has discovered a vulnerability in pppBLOG, which can be exploited
by malicious people to disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/20375/

 --

[SA20367] WebCalendar "includedir" Parameter Arbitrary Setting File
Loading

Critical:    Moderately critical
Where:       From remote
Impact:      Security Bypass, Exposure of sensitive information
Released:    2006-05-31

socsam has discovered a vulnerability in WebCalendar, which can be
exploited by malicious people to bypass certain security restrictions
and disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/20367/

 --

[SA20366] WikiNi Script Insertion Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-30

Raphael Huck has discovered some vulnerabilities in WikiNi, which can
be exploited by malicious people to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/20366/

 --

[SA20359] phpBB Nivisec Hacks List Module Local File Inclusion

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of sensitive information
Released:    2006-05-29

Mustafa Can Bjorn has discovered a vulnerability in the Nivisec Hacks
List module for phpBB, which can be exploited by malicious people to
disclose sensitive information.

Full Advisory:
http://secunia.com/advisories/20359/

 --

[SA20352] Eggblog posts.php SQL Injection Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-05-29

Mustafa Can Bjorn has discovered a vulnerability in Eggblog, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/20352/

 --

[SA20351] aMule Information Disclosure Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Exposure of system information, Exposure of sensitive
information
Released:    2006-05-29

A vulnerability has been reported in aMule, which can be exploited by
malicious people and by malicious users to disclose potentially
sensitive information.

Full Advisory:
http://secunia.com/advisories/20351/

 --

[SA20316] Geeklog Multiple Vulnerabilities and Weaknesses

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data, Exposure of
system information
Released:    2006-05-30

trueend5 has reported some vulnerabilities and weaknesses in Geeklog,
which can be exploited by malicious people to disclose system
information, and conduct cross-site scripting and SQL injection
attacks.

Full Advisory:
http://secunia.com/advisories/20316/

 --

[SA20307] Seditio "Referer" HTTP Header Script Insertion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-29

Yunus Emre Yilmaz has discovered a vulnerability in Seditio, which can
be exploited by malicious people to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/20307/

 --

[SA20304] ByteHoard File Copy and Script Insertion Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2006-05-29

Nomenumbra has discovered two vulnerabilities in ByteHoard, which can
be exploited by malicious people to manipulate sensitive information
and conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/20304/

 --

[SA20303] MailManager PostgreSQL Encoding-Based SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-05-26

A vulnerability has been reported in MailManager, which potentially can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/20303/

 --

[SA20297] V-webmail "CONFIG[pear_dir]" File Inclusion Vulnerability

Critical:    Moderately critical
Where:       From remote
Impact:      System access
Released:    2006-05-26

beford has discovered a vulnerability in V-webmail, which can be
exploited by malicious people to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20297/

 --

[SA20295] Pre Shopping Mall SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-05-26

luny has reported some vulnerabilities in Pre Shopping Mall, which can
be exploited by malicious people to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/20295/

 --

[SA20290] ChatPat Script Insertion and SQL Injection Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2006-05-26

luny has reported two vulnerabilities in ChatPat, which can be
exploited by malicious people to conduct script insertion and SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/20290/

 --

[SA20287] iFdate Cross-Site Scripting and Script Insertion
Vulnerabilities

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-26

luny has reported some vulnerabilities in iFdate, which can be
exploited by malicious people to conduct cross-site scripting and
script insertion attacks.

Full Advisory:
http://secunia.com/advisories/20287/

 --

[SA20286] Realty Pro One Cross-Site Scripting and SQL Injection

Critical:    Moderately critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2006-05-26

luny has reported some vulnerabilities in Realty Pro One, which can be
exploited by malicious people to conduct cross-site scripting and SQL
injection attacks.

Full Advisory:
http://secunia.com/advisories/20286/

 --

[SA20363] XiTi Tracking Script "xiti.js" Cross-Site Scripting
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-31

Yannick Daffaud has reported two vulnerabilities in the XiTi Tracking
Script, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/20363/

 --

[SA20341] Open Searchable Image Catalogue SQL Injection
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting, Manipulation of data
Released:    2006-05-31

Nenad Jovanovic has discovered some vulnerabilities in Open Searchable
Image Catalogue, which can be exploited by malicious users to conduct
SQL injection attacks and by malicious people to conduct cross-site
scripting attacks.

Full Advisory:
http://secunia.com/advisories/20341/

 --

[SA20340] DGNews "upprocess.php" File Upload Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      System access
Released:    2006-05-30

r0t has discovered a vulnerability in DGNews, which can be exploited by
malicious users to compromise a vulnerable system.

Full Advisory:
http://secunia.com/advisories/20340/

 --

[SA20336] Photoalbum B&W "index.php" Cross-Site Scripting
Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-30

black-code and sweet-devil have discovered some vulnerabilities in
Photoalbum B&W, which can be exploited by malicious people to conduct
cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/20336/

 --

[SA20334] TikiWiki Multiple Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-29

Blwood has discovered some vulnerabilities in TikiWiki, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/20334/

 --

[SA20327] Achievo "atkselector" Parameter SQL Injection Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Manipulation of data
Released:    2006-05-30

Christian Nancy has reported a vulnerability in Achievo, which can be
exploited by malicious users to conduct SQL injection attacks.

Full Advisory:
http://secunia.com/advisories/20327/

 --

[SA20324] Vacation Rental Script "obj" Parameter Cross-Site Scripting

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-29

luny has discovered a vulnerability in Vacation Rental Script, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/20324/

 --

[SA20322] Pretty Guestbook "pagina" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-29

luny has discovered a vulnerability in Pretty Guestbook, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/20322/

 --

[SA20321] Smile Guestbook "pagina" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-29

luny has discovered a vulnerability in Smile Guestbook, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/20321/

 --

[SA20320] Morris Guestbook "pagina" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-29

luny has discovered a vulnerability in Morris Guestbook, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/20320/

 --

[SA20311] php-residence Multiple Script Insertion Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-29

Nomenumbra has reported some vulnerabilities in php-residence, which
can be exploited by malicious users to conduct script insertion
attacks.

Full Advisory:
http://secunia.com/advisories/20311/

 --

[SA20306] PHPSimpleChoose Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-29

luny has discovered a vulnerability in PHPSimpleChoose, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/20306/

 --

[SA20305] PHP-AGTC membership system "useremail" Script Insertion

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-29

Nomenumbra has discovered a vulnerability in PHP-AGTC membership
system, which can be exploited by malicious users to conduct script
insertion attacks.

Full Advisory:
http://secunia.com/advisories/20305/

 --

[SA20296] CMS Mundo "searchstring" Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-26

luny has reported a vulnerability in CMS Mundo, which can be exploited
by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/20296/

 --

[SA20293] phpESP ADOdb Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-29

Some vulnerabilities have been reported in phpESP, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/20293/

 --

[SA20291] AZ Photo Album Script Pro Cross-Site Scripting Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-26

luny has reported a vulnerability in AZ Photo Album Script Pro, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Full Advisory:
http://secunia.com/advisories/20291/

 --

[SA20289] Elite-Board "search" Parameter Cross-Site Scripting
Vulnerability

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-26

luny has reported a vulnerability in Elite-Board, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/20289/

 --

[SA20285] Assetman Unspecified Script Insertion Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-29

Nomenumbra has reported some vulnerabilities in Assetman, which can be
exploited by malicious users to conduct script insertion attacks.

Full Advisory:
http://secunia.com/advisories/20285/

 --

[SA20282] iFlance Multiple Cross-Site Scripting Vulnerabilities

Critical:    Less critical
Where:       From remote
Impact:      Cross Site Scripting
Released:    2006-05-26

luny has reported some vulnerabilities in iFlance, which can be
exploited by malicious people to conduct cross-site scripting attacks.

Full Advisory:
http://secunia.com/advisories/20282/



========================================================================

Secunia recommends that you verify all advisories you receive,
by clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only use
those supplied by the vendor.

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Subscribe:
http://secunia.com/secunia_weekly_summary/

Contact details:
Web	: http://secunia.com/
E-mail	: support at secunia.com
Tel	: +45 70 20 51 44
Fax	: +45 70 20 51 45





More information about the ISN mailing list