DELTA 304045 0 732 SVNZ[pZCDv*nlnzb4SX2Iqjz:wciX.nuxjKx^V[s8}ƿBam-Ҧ4&(č/-ƷM!M+f $st#֥$#S?5lRؗta]Ty4!G423Lrr坦~zܬO#BƱM9Eܻj \L @V^ɧ?Yc>O|j6O;93 ]y!_DhU׭LsR?' =s]IO$+^`] |LA.,2V9 _2X*1ߣ/Z=JG)||˄1Gg; 1ԡ,Søqu5$۠a={>Ha̋#SE(+Eu~m$JBLSH&¸wgY"=ky[NaDTޚj_Թ0~N(_:_i*&ߠ?m~zI4'/+\;vTE3DJUeIv]>e8!/цn%_;Y_ 0})׾=R$>y ߂'YJTO:b?;E(mi?q٦?R)d&KQjS0TENDREP DELTA 305684 4834 314 SVN(, $" "SHA256 (thunderbird-16.0.1.source.tar.bz2) = 2b2ca8c78a2f4e40f93d2f50d9cd7d5b0283245d97d2477510e638d2cde279cb SIZE (thunderbird-16.0.1.source.tar.bz2) = 111401489ENDREP DELTA 304045 967 31 SVNFFBCea66ENDREP DELTA 304045 1025 2284 SVNbb\bbx^YMe7Wd e`HDD1AHlW93$ !3AH}_΋L7V[:s)_w?w?;O\?7?Q4el#ugl=ZRj{H]3|LY?y߾<-f&7}(5Mc[oCd -CE,i.c62-E[ 5Gx>Ԃ\1)k4\лk2t$kRcm>kvgǬadqDJiTM=7Z:64>Aၰ!0JWP {`2t[emiəVF6>!Cd9᳭-^MkZd=hzIu »zg?C~+JuNW24.p6,aRu mL*<[Sy|n坙B-gNWkYmJ Ɩjƒ|UOݩOO[t @F)fhŜ.~:W#5;zn:|d ˩[ۻ ShdEĞɪ_&dg;fBimxbS \X 8RQ,{^ZI a' b^7O7]:XF@},!{bMGbkmY]HwχdʈNe 0z)]ҽC۶] ؜qZb>쇣&Oc:KlIP\QˈYF@(Z`'zgsC߈cbmRX %9)jzzx\gwx{[pq)MA700.φo؁ Cz;h;!O~:E$&g7"ג-9T;|HP~ACeh* UF@@(uANIsXhL0  ͽ!|{ ~l;*^hDYd'DYDvE:7骀ay$ŀ:*4~^NXtO$K?G1ȽYsTYu2\M¤2v|3;|K[~R3~w8XPFԍO:A֥͂*Rfyb{Ŵ3tl-_̾.\k@1J)'Lep`2B}rŬ3= :5/ jgR7E1 G^뉋xC&b#?܍?[wp51Ɉ/3 )+Wv0"F;QGg~>}(NA_|V+ҪЕv(BHpoTƜ _3La~SD cb#Z} b>W&,䥍؟Oأi-߿x2XCt; ipu|$YdI 2G10_ur6?`Sq$ MI R$(kk0ϣ5O_gPXPhuab.pN?'iU=Sӷ nKYa ]000WeD S88&J:σqܮV<)C3̂-6/>@90H]ӔT7{bPO$3R7swcl1]]!e CmR"66>;AT r煬r} -kt^%.k ᣘ!%j͇_0_ovZ`ٴ6`΁2;Gb&H= #΄$@XBE@Dl&ZH%!*O,g}׽)^ivّWiiɗX1L jǭ{M.#b8G1 3n7w2#twoA展Kbmi_7ADA QlTz)7~O_~,c)zNZd$6{l:r9yUy>ޯ ^gi ډAЖA)sAu⢁,t)׳^5LNsn m쮗jcBڂduXʫ:Ůyۿ>lQ—ƭ MYh+B/?ѿԘvB]z]'~ENDREP DELTA 305692 0 95439 SVNzIyc^(=c? t<uPF{ yIIIIIJJJJvwFg5x^N0D+D8-MSY]WHݻMcՏȎzܔ*E+{t}`@Q]Ɉf ̀/,4).'PiXo{ P*i6n !k-~Y84n>]6H=#r@׷'4K&4^R܀ i5t;=wGn==+EsL*yPݜȃNFh@<2CmJyGH91¥ zu":1Gc>|)Tt];%d`m2[S  ѵԶuTM

12/mfsa2012-56.html 2012-07-17 2012-08-02 Apache -- Insecure LD_LIBRARY_PATH handling apacheeventitkTx]Zvs[RRndex.php?do=details&task_id=2487">

Add User appears to be vulnerable to Cross Site Request Forgery (CSRF/XSRF)2-2128 CVE-2012-2129 2012-04-17 2012-04-23 OpenTTD -- Denial of service (server) via slow read attackThe OpenTTD Team reports:

CVE-2011-2746 http://otrs.org/advisory/OSA-2011-03-en/ 2011-08-16 2011-08-18 phpMyAdmin US-Se>CVE-2011-1435 CVE-2011-1436 CVE-2011-1437 CVE-2011-1438 CVE-2011-1439 CVE-2011-1440 CVE-2011-1441 CVE-2011-1442 CVE-2011-1443 CVE-2011-1444 CVE-2011-1445 CVE-2011-1446 D>E>E>E>E>E>[RD31.html

Opera Team reports:

  • Fixed a heap buffer overflow in string to number conversion
  • Fixed an issue where error messages could leak onto unrelated sites
  • Fixed a moderately severe issue, as reported by Chris Evans of the Google Security Team; details will be disclosed at a later date.
  • Fix an integer overflow in the Quicktime demuxercvename>CVE-2009-0385 CVE-2009-1274http://trapkit.de/advisories/TKADV2009-0054-04,a@ H@g-* the server via a specially crafted SQL statement63 http://bugs.mysql.com/bug.php?id=35658 http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-666.html http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html http:// US-S be affected.

    A weakness in the node module API allowed for node validation to be bypassed in certain circumstances for contributed modules implementing the API. Additional checks have been added to ensure that validation is performed in all cases. This vulnerability only affects sites using one of a very small number of contributed modules, all of which will continue to work correctly with the improved API. None of them weˀ US-Sd (2) that SET ROLE and SET SESSION AUTHORIZATION were permitted within index functions. Both of these holes have now been closed.

PostgreSQL allowed malicious users to initiate a denial-of-service by passing certain regular expressions in SQL queries. First, users could create infinite loops using some specific regular expressions. SѠ K@-5116 http://secunia.com/advisories/27546/ 2007-11-05 2007-11-06 2007-11-07 pcre -- arbitrary code execution pcre

Blogsecurity reports:

An attacker can read comments on posts that have not been moderated. This can be a real security risk if blog admins are using unmoderated comments (comments that have not been made public) to hide sensitive notes regarding posts, future work, passwords etc. So please be careful if you are one of these blog adm^ 8w-\b-851e-0016179b2dd5"> tdiary -- cross site scripting vulnerability ja-tdiary tdiary 2.0.2 ja-tdiary-devel tdiary-devel 2.12.1.4_tDiary was vulnerable to an unspecif US-Sption>

Clamav team reports:

A heap overflow vulnerability was discovered in libclamav which could cause a denial of service or allow the execution of arbitrary code.

The problem is specifically located in the PE file rebuild function used by the UPX unpacker.

Relevant code from libclamav/upx.c:

<>E?:R=|- CAN-2005-4501 http://sourceforge.net/project/shownotes.php?release_id=379951 2005-12-22ae9fb0d7-c4dc-11da-b2fb-000e0c2e438a"> netpbm -- buffer overflow in pnmtopng B@-C//www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-8">

It was possible to conduct an XSS attack via the HTTP_HOST variable; also, some scripts in the libraries directory that handle header generation were vulnerable to XSScvename>CVE-2005-3665 8 http://s US-Samming error in the implementation of the AES-XCBC-MAC algorithm for authentication resulted in a constant key being used instead of the key specified by the system administrator.

Impact

If the AES-XCBC-MAC algorithm is used for authentication in the absence of any encryption, then an attacker may be able to forge packets which appear to originate from a different system and thereby succeed in establishing an IPsec session.  G~ - gotbnc.com/changes.html#2.9.3 http://www.security.nnov.ru/advisories/sockets.asp http://marc.theaimsgroup.com/?l=bugtraq&m=110660879328901 2004-12-12 2005-06-17 2006-09-03

Mitigation factor: This path disclosure is possible on servers where the recommended setting of the PHP configuration directive display_errors is set to on, which is against the recommendations gx7]6-vith the permission of the CUPS server by printing a specially crated HPGL file.

11968 CVE-2004-1267 http://tigger.uic.edu/~jlongs2/holes/cups.txt http://www.cups.org/str.php?L1024
postgresql-contrib -- insecure temporary file creation postgresql-contrib 7.2.6 7.3.*7.3.8 7.4.*7.4.6'YSqb[hj-%. A web page can be constructed to leverage this into remote execution of arbitrarycvename>CVE-2004-0722 http://bugzilla.mozilla.org/show_bug.cgi?id=236618 2004-09-22 tMR/R#E9;:c+Mcȥ%+Jd0whhpJN5.D@sw@H3חEAUa 4FS#=zEV}:%KSD^_~Oݵմ"WY[nd (; ;ZTIO'J}KT~`qTɡLO;Q,A~gBz`mxK g6wr+# qt[MDmJf`gF σDFr2\ob ͸Q MRA1ԖdYS|à`.8ٔ$ژ;%wsf?^D }䀫r_Ih?^'Ss 5/Ԑ$VIG6ob : U%0  )dExvc Uh iAZe.057wn O= ލ{jDZ=Kn4+]#¸bk'G}3>-,s[,)a7v XlX:\>c]D5N=)yx%2Bkq5|#}WAn_8~iƓz3pL Y)o8@ S̊kfX@q5dy2 {HZ&^VS]t:o . R]]uls ЍF{RrCӑ(D__֏pm憕N~T0Mr[@s;ev87&- $Iw{r٠: 0^E]-jV&}v0Oho~@8M6ǫgˈ?oBJY-܅wxN4~kJ9r<[,@tv|AY º#peAT @4h`!ꈠ N'q&6{ėA.Kq3j ['D:E{Kvڣ҅t薅c( # $j]''NjK!5 䡂kѓۓbFلq} .}xf=3{{??=r()1U_Jhr?j g#7@\L~wO;UzP%"Nrk GLl xɞtf Z'U߅0|$2IJԀH-~ Yc8mX 3W"Ў̭e?^60M/Rk,K\8:}X?]g=Dڵ{kLACs e$c͞}FfWu`7Ծ{j߷h ݁E*ȳ}+FvQ8G ~7ŝטFnͬ24Ʀ 6 dDf+j`)+PKY~dK3#ݰ́=, 9*QƒN ;evqE9%rQBԉґk(-MwXGYPV!;PHpfKVͮwپGhћAfpּ}u:_ab>o9S}\wl#L Z-_?qJSg8$D^y~f8fP2b.S Bm|X;EO(%v{P|rkgHíH"$o'X>߁$o(:gvtÄ́fs;;F]sRa􇟐uGԍX;^zyHd4~K2=1ɰb[CKәkr2ocC~??VW F tUs] $(&p7:+iWґE{L`>q5NfeU%m [Tm ^+[ݰƠ%om_)ZAT!87էLi#:oHcѧ]ʘX9LSrm‰m@/lG9~BpϙϑjkzAԺ[H_FBo4B[Jo %jrԔ w?ާTfws0&@c-*:+a%j׺ɋ2tKcf?]SU?@jۗe 6?/ `i@Y/_v0 &mPvik)k ()z7 cFCrob$<$[C)wimiYa{͵(M,t{m_.blGZ= Eo4~;v