Release Date: 2008-11-11
Critical:
Moderately critical
Impact: Manipulation of data
Exposure of sensitive information
Where: From remote
Solution Status: Unpatched
Software: Dizi Film Portal
Description:
Kaan KAMIS has discovered a vulnerability in Dizi Film Portal, which can be exploited by malicious people to conduct SQL injection attacks.
Input passed to the "film" parameter in film.asp is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Solution:
Edit the source code to ensure that input is properly sanitised.
Provided and/or discovered by:
Kaan KAMIS
http://secunia.com/advisories/32675/
SAP GUI MDrmSap ActiveX Control Code Execution Vulnerability
Release Date: 2008-11-11
Critical:
Highly critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch
Software: SAP GUI 6.x
SAP GUI 7.x
Description:
A vulnerability has been reported in SAPgui, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to an unspecified error in the bundled MDrmSap ActiveX control (mdrmsap.dll). This can be exploited to compromise a user's system by e.g. tricking the user into visiting a malicious website.
Solution:
The vendor has reportedly issued a patch via SAP Note 1142431.
http://service.sap.com/sap/support/notes/1142431
Provided and/or discovered by:
Will Dormann, CERT/CC.
Original Advisory:
US-CERT VU#277313:
http://www.kb.cert.org/vuls/id/277313

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic