Blogs

TikiWiki Versions Prior to 4.2 Multiple Vulnerabilities

http://www.securityfocus.com/bid/38608

"TikiWiki is prone to multiple vulnerabilities, including:

- An SQL-injection vulnerability
- An unspecified authentication-bypass vulnerability
- An unspecified vulnerability

Exploiting these issues could allow an attacker to compromise the
application, access or modify data, exploit latent vulnerabilities in
the underlying database, and gain unauthorized access to the affected
application. Other attacks are also possible.

PDF Execution function deemed dangerous

http://blogs.adobe.com/adobereader/2010/04/didier_stevens_launch_functio...

A design feature in PDF allows for the execution of a program from
within the PDF. Most PDF readers supply a warning about executing the
program before continuing.

A researcher last week showed how the warning message could be rewritten
by a malicious PDF and trick the user into allowing it to execute. It
could potentially infect other PDFs or run whatever the attacker desired.

XSS Vulnerability in NextGEN Gallery Wordpress Plugin

http://www.coresecurity.com/content/nextgen-gallery-xss-vulnerability

"An XSS[1] vulneravility has been discovered in NextGEN Gallery[2], a
very popular and commonly used plugin for the Wordpress content
management system commonly found as a blogging platform. This
vulnerability results from reflected unsanitized imput that can be
crafted into an attack by a malicious user by manipulating the mode
parameter of the xml/media-rss.php script."

Vulnerable packages

Apple Safari for Windows Prior to 4.0.5 Integer Overflow Vulnerability

http://www.securityfocus.com/bid/38674

"Safari is prone to an integer overflow vulnerability.

Successfully exploiting this issue may allow remote attackers to execute
arbitrary code in the context of the application. Failed attacks will
likely cause denial-of-service conditions."

Apple has released version 4.0.5 of the software. It is recommended
that users update to this release.

Thanks,
Brian

Oracle Java SE and Java for Business Critical Patch Update Advisory - Fixes 27 vulnerabilities

http://www.oracle.com/technology/deploy/security/critical-patch-updates/...

"Due to the threat posed by a successful attack, Oracle strongly
recommends that customers apply CPU fixes as soon as possible. This
Critical Patch Update contains 27 new security fixes across all products.
Supported Products Affected

Foxit Reader Remote Code Execution Vulnerability

http://www.securityfocus.com/bid/39109

"Foxit Reader is prone to a remote code-execution vulnerability because
it fails to properly restrict access to certain functionality.

An attacker can exploit this issue by enticing a user to open a
malicious PDF file.

Successful exploits may allow the attacker to execute arbitrary code or
commands in the context of a user running the affected application.

TikiWiki Versions Prior to 4.2 Multiple Vulnerabilities

http://www.securityfocus.com/bid/38608

"TikiWiki is prone to multiple vulnerabilities, including:

- An SQL-injection vulnerability
- An unspecified authentication-bypass vulnerability
- An unspecified vulnerability

Exploiting these issues could allow an attacker to compromise the
application, access or modify data, exploit latent vulnerabilities in
the underlying database, and gain unauthorized access to the affected
application. Other attacks are also possible.

Apple iPhone Malformed VML Data Remote Code Execution Vulnerability

http://www.securityfocus.com/bid/38990/discuss

A POC exploit has been written that can crash Safari on the Apple iPhone
when the user visits a maliciously crafted webpage. This affects:

Apple iPhone 3.1.3
Apple iPhone 3.1.2
Apple iPhone 3.0.1
Apple iPhone 3.1
Apple iPhone 3.0

The POC claims the ability to execute arbitrary code via this exploit.
Apple has not yet released a patch or verified this issue.

Apple iPhone Malformed VML Data Remote Code Execution Vulnerability

http://www.securityfocus.com/bid/38990/discuss

A POC exploit has been written that can crash Safari on the Apple iPhone
when the user visits a maliciously crafted webpage. This affects:

Apple iPhone 3.1.3
Apple iPhone 3.1.2
Apple iPhone 3.0.1
Apple iPhone 3.1
Apple iPhone 3.0

The POC claims the ability to execute arbitrary code via this exploit.
Apple has not yet released a patch or verified this issue.

Pages