DELTA 347941 0 131398 SVN"!Hx@"M`':777d7b9e-ab02-11e3-841e-60a44c524f57"> wemux -- read-only can be bypassed wemux 3.2JonApps reports:

The read-only mode can be bypassed and any command sent to bash sessionurl>https://github.com/zolrath/wemux/issues/363-13 ^iR;\24.1.0 MFSA 2013-93 Miscellaneous memory safety hazards (rv:25.0 / rv:24.1 / rv:17.0.10)

MFSA 2013-94 Spoofing addressbar though SELECT element

MFSA 2013-95 Access violation with XSLT and uninitialized data

MFSA 2013-96 Improperly initialized memory and overflows in some JavaScript functions

MFSA 2013-97 Writing to cycle collected object during image decoding

MFSA 2013-98 Use-after-free when updatinMF`v; x^MQn <'_ryXzS1.kGiهmàa&."RĦ'#Qv.)>OTxN0@V`ו9j@#zEwwu!Vػ=QTepgX_,qK,bcVo8\l[[- ՍiĊc&$ U.Ohgҫ3N&8RQ1&5KQsMX",b">5B-~o0D"t> &Ȗ0-u\m]f&%Dz_ɒ ,E;Ex^MQn0 2vPf֩@ѥ,3qR});v1`/ooCd3"xRzT˗_׵YKWPb2\}N]aQxTϧS4ŻsyeDe( fʼn4$98U/ &G*V$e4RP9Rz~B]p&7pBlS  n@N{F<,]v:=-bێ&-Pjw˵Xщ0l{ ?D9nj yAit іGڑgs22oM 9Z'~`X;9Z"SoNd-1Ƿ6޳>Z30W d kCn31Sݏ'쐶f-V|, 2O 󀙀}kT:_v}1;{nge>9.9.2.1 bind99-base 9.9.2.14.1 bind98-base 9.8.4.1ISC reports:

BIND 9 nameservers using the DNS64 IPv6 transition mechanism are vulnerable to a software defect that allows a crafted query to crash the server with a REQUIRE assertion failure. Remote exploitation of this " [- 0x^S)JMK-JKN-RҢb+}̜DԔDtx^rz}f>H'%ZSnbiadBS -a1)eyvaFF& SfA2KBe)3+%="u=Ac!|nM 2034 CVE-2012-2035 CVE-2012-2036 CVE-2012-2037 CVE-2012-2038 CVE-2012-2039 CVE-2012-2040 http://www.adobe.com/support/security/bulletins/apsb12-146-08 2012-06-09 Apache APR -- DoS vulnerabilities apr0 0.9.20.0.9.19The Apache Portable Runtime Project reports:

mu2R˲-9jJ70N ʠDe^JŌEt2(m`RyAV .J{3\td%\fXA>jE5|5 x } Y ?+2W1^AI}$Y% 5M#lT2Lǫ>(&P &Ii]ZpҖ[ٌUt, oud3=vᅦ_?Evh_^z<M6;zfT%:яFݵc!`^J3q/ *ɱl*&V׾G y]xF͐")NFtMZ=ݽѠX?v@NN/ x^uN@)&AR#hD^`=νٙ懳(7ejiz(tZbTQb^Ηl^@T;fp://secunia.com/advisories/33711/ http://trapkit.de/advisories/TKADV2009-004.txt 2009-01-2835c0b572-125a-11de-a964-0030843d3802"> roundcube -- webmail script insertion and php code injection1,1622/">

Some vulnerabilities have been reported in RoundCube Webmail, which md/lv@u;kries/323117 vlc -- arbitrary code execution in the RealMedia processor vlc-devel 0.9.8aTobias Klein from TrapKit reports:

The VLC media player contains an integer overflow vulnerability while parsing malformed RealMedia (.rm) files. The vulnerab?AZNcb`Ri=8/08/multiple-vulnerabilities-in-ruby/">

WEBrick::HTTP::DefaultFileHandler is faulty of exponential time taking requests due to a backtracking regular expression in WEBrick::HTTPUtils.split_header_valuecvename>CVE-2008-3655 CVE-2008-3656 CVE-2008-3905CN@4;wx^mRn0 ='_AΚK_赐%:&H$;I~t0ȇG>Q0c 9WF -+N} =F贷B aNMpܑ_tcՃMLyXnE/ yD:n[40fDOXUQľ*%nO ] IoM8ImGJ!&YRɉ"f#i|c/KLɈ-F ӂXQ2s6nYe;}9O(E,**9^OHuST0Eϻf/cIfCOv\#}[/Qrϵ5G}n/]RM y7 mE;Ex^MO0 +|Il$mjGILJ^|e ; 9AQQQ:=plCqd)VA2#`v~X.׋j썜H n*u kF 7`2rϯ5_O)WiIkI+*`%͡e6N!1ة7)[/5oʒ<Ȏ|r@:3XSvz ~'z*(Pl;!$h㲱n*(G]Gm^8O_ۊ,a2007-02-0946b922a8-c69c-11db-9f82-000e0c2e438a"> FreeBSD -- Jail rc.d script privilege escalation12 6.06.0_17 5.55.5_15multiple situations the host's jail rc.d(8) script does not check if a path inside the jail file system structure is a symbolic link before using the path. In particular this is t|yv@gU?;zic>postnuke -- admin section SQL injection postnuke 0.763ISS X-Force reports:

PostNuke is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements to the admin section using the hits parameter, which could allow the attacker to view, add, modify or delete information in the back-end databas317 C E;Ex^eAo0 ۯx.EQ )6mf ڦ-r3Qv2,=sDP0n#[,+Pۊ%9,0{-W0)7/bjHHdzp3&S(R8B89( gkyYX Ed5G O]BUyR(YL1tAaڝZ{lZ.M 5K0,'ku(uh:zE3HUd4Ëeq)p#E?Vn.br/of}R˧꡼_JePB=gTJ_;~ȋCGRٴ 'A9dX vSZ9"I<ZXk8 ]]8:S$HQ闁rv3;Ox^Un0 EWYuիn(0`f[2 U,WdI~dOsIZLƞҩZk}Uuig]G|\5wy6Cꏡc9V~Im횊[j`QoWZnnpƒy[%fE]' P| ^NFٍ͎YC{M\2yfTrS_|FvFa}y=F!^~D;a(W^ S^d'Owg !Pu '>b;:08)qVl Q3H>Ёg͞,.mٳu)Fyΐ.MÏٜ{-/YhuCRNeA@KzuFx^EQn <'_OR ^'!vܬfwe_3xCc1GOnɍx5mEQW [Hzl޿>HXNxQ֒Q[fڷT\QS2^yɪ販vIvpLדz\=R&=pG gSIy+emc1i-"J<0&ꬪPdW'@VV3FN]5!.ŪP&-$~+%ݧ|N 1+mhX%uY@DN@3;wx^QAn0<7$H$KUUBcdld}}IQ[-vggfG6z!XZCyMPvZI5Cl]]5 `@7vVF\Ch!U rmM"J=Jk؅ߎxs("G=m*s_hx}ia r_oZtф=26cBJkXW3;&'1gSIZ{'oADYO)v6fӝ g+z~#ߐRO+.ϐr<4s֖RX.( x˲l)Vv򁜠.O?FN:L;(x^N ƯS]xGn `fRwEn|VhEXl'\i!Xq{ ɠxi\߄v:d7 ݆1^gE^0Zy1q~vW=LH)0]4ǽro˙o4X/:YVL4?(\gbteQRhJt.vF Yy"ka$F{__v3ɉO&ݮ7Jз׷?Dm42d_L>_NlxR2Z(b5:j005-0227 http://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php 2005-01-21831a6a66-79fa-11d9-a9e7-0001020eed82"> ethereal -- multiple protocol dissectorsge>0.8.100.10.9 E;Ex^mn1 S='kMANРݥBҖKI= g+!Kf{&OOa -i !D =ɖ;3GfM:#R84W{M78v+HHA qW2N4oTߊ&{&K(6:xB&(GG-(@RF}`ErN5n3'Xuh DCQI++^@n~Ru FafQPX)֊$:_Q}=Jx̧V\`Rm=ujkEdrCN}4;wx^Mю EbiE-*uUiv(X0NM6 at 9@^ =f01Zr揇g?}yu1RL `0/hL-Ysl1=]>DO"SޢRj*kW]0<†4H)D$˪w!-#y~o1]HWd,m UiyS?}S*6ZK+T4fKGr?6ueejQٵJ).θ Hh <m@!c ~|9~FE˷ˎpi򣼗&Gs?rW{~{(;per read overrun and possibly result in an application421 http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120508 http://rhn.redhat.com/errata/RHSA-2004-181.html http://secunia.com/advisories/11505 http://www.osvdb.org/5726 10244 En|v;SOx^uAN0E#6lHFm)DB k8dT} c"@x&ܾ̳ldyodi|,t)O0q}y*\'۳