DELTA 344327 0 49528 SVNz.y*g.nM7[O:ST+[JqB24"h}HS0g ^rMJ ,µCP˃q2^N>I Mg GGPE 9Mp$j3a@+ĸFL;bs0cj_'dxov2M M 8%ZF1 ;Oj.o*^V%2O]<эB:.95gkcl=:<6#LQiw#5vwnOwO_^_`xu@ÇKݴWp/:tCW mtsY &z(v,: V TT<XTnces> CVE-2013-5093 https://github.com/rapid7/metasploit-framework/pull/2260 2013-08-21 2013-09-30xr]>cSwl commands in the context of the user whom the pre-commit script runs as (the user who owns the repository)3-208 hdding a default maximum number of forms of 1,000. You can still manually specify a bigger max_num, if you wish, but 1,000 should be enough for anyone.

  • XML attacks

    Django's serialization framework was vulnerable to attacks via hongnu.org/bugs/?37704 2012-11-09 2012-11-10 2012-11-13 ruby -- Hash-flooding DoSStG]hQct a root compromise, except of course if the root account is the one you're attempting to protect with rssh.. 53430 CVE-2012-3478 http://sourceforge.n h evaluated certain XPointer parts (XPointer is used by libxml to include only the part from the returned XML document, that can be accessed using the XPath expression given with the XPointer). A remote attacker could provide a specially-crafted XML file, which once hCVE-2011-3961 CVE-2011-3962 CVE-2011-3963 CVE-2011-3964 CVE-2011-3965 CVE-2011-3966 CVE-2011-3967 2011-04-14 krb5 -- MITKRB5-SA-2011-003, KDC vulnerable to double-free when PKINIT enabled1.7.2 how CVE-2011-3880: Don't permit as a HTTP header delimiter. Credit to Vladimir Vorontsov, ONsec company.
    [96047] [96885] [98053] [99512] [99750] High CVE-2011-3881: Cross-origin policy violations. Credit to Sergey Glazunov.
    [96292] High CVE-2011- heferences> 2010-08-09 2010-08-21
    slim -- insecure PATH assignment slim ˀ hl>http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0010 http://www.security-database.com/detail.php?alert=CVE-2010-0010 http://security-tracker.debian.org/tracker/CVE-2010-0010 http://www.vupen.com/english/Reference-CVE-2Ѡ _@D>F" as installing malware.

    This vulnerability does not affect earlier versions of Firefox which do not support the JIT feature2477 2009-02-09 2009-02-11 typo3 -- cross-site scripting and information disclosure a _O@R_.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename comman hese vulnerabilities, to be exploited successfully, require either an already established connection to a running X server (and normally running X servers are only accepting authenticated connections), or a shell access with a valid user on the machine where the vul h

    The Ganglia project reports:

    The Ganglia development team is pleased to release Ganglia 3.0.6 (Foss) which is available[...]. This release includes a security hest forgeries due to inproper use of the Forms API, or by taking action solely on GET requests. Malicious users are able to delete comments and content revisions and disable menu items by enticing a privileged users to visit certain URLs while the victim is lo hery>2006-12-28 2007-01-12 mplayer -- buffer overflow in the code for RealMedia RTSP streams. mplayer KO20022 CVE-2006-4684 http:// h 2006-05-01 2006-05-03 jabberd -- SASL Negotiation Denial of Service Vulnerability jabberd

    The lack of proper file name sanitation can allow an attacker to overwrite arbitrary local files when extracting files from a cpio archive. (CVE-2005-1LN hJPENDING"] in certain conditions involving aborted requestsbid>14761 CVE-2005-2794 http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE10-STOREZO@ hXsed to effect either of these attacks would have spoofed source IP addressesertvu>637934 CVE-2005-0356 CVE-2005-2068 SA-05:15.tcp http://www.mozilla.org/security/announce/mfsa2005-33.html https://bugzilla.mozilla.org/show_bug.cgi?id=288688 h Secunia Research advisory reports:

    Secunia Research has reported a vulnerability in multiple browsers, which can be exploited by malicious people to spoof the content of websites.

    "J`~VB@>* p archives are re-compressed automatically using Info-Zip application010 11603 http://www.hexview.com/docs/20041103-1 `sC~Uious POP3 server.
  • Processing non-ASCII URLs.
  • Each of these vulnerabilities may be exploited for remote 902N LR@bLgered while parsing messages, as well as input validation errors that could result in disclosure of mailing list passwords.

    These bugs were resolved in the August 2003 snapshot of ecartisr H VRsprFhopd.org/msg00136.html 2003-12-04d7af61c8-2cc0-11d8-9355-0020ed76ef5a"> lftp HTML parsing vulnerability