Release Date: 2008-11-07
Critical:
Moderately critical
Impact: Manipulation of data
Exposure of sensitive information
Where: From remote
Solution Status: Unpatched
Software: Pre Simple CMS
Description:
Hussin X has reported a vulnerability in Pre Simple CMS, which can be exploited by malicious people to conduct SQL injection attacks.
Input passed to the "user" parameter in siteadmin/loginsucess.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Solution:
Edit the source code to ensure that input is properly sanitised.
Provided and/or discovered by:
Hussin X
Original Advisory:
http://milw0rm.com/exploits/7004
CDRW-Taper "amlabel-cdrw" Insecure Temporary Files
Release Date: 2008-11-07
Critical:
Less critical
Impact: Privilege escalation
Where: Local system
Solution Status: Unpatched
Software: CDRW-Taper 0.x
Description:
A security issue has been reported in CDRW-Taper, which can be exploited by malicious, local users to perform certain actions with escalated privileges.
The security issue is caused due to the "amlabel-cdrw" script using temporary files in an insecure manner. This can be exploited to e.g. overwrite or delete arbitrary files via symlink attacks.
The security issue is reported in version 0.4. Other versions may also be affected.
Solution:
Restrict local access to trusted users only.
Provided and/or discovered by:
Reported by Dmitry E. Oboukhov in a Debian bug report.
Original Advisory:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496380

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic