DELTA 374768 0 20273 SVN† † +[*•DŠL–7€d#•+…þi–=˜Q†•>™g†•>†S†–Ymod_dav_sv subversion16 1.0.01.7.19 1.7.19 1.017 1.00.01.7.18Subversion stores cached credentials by an MD5 hash based on the URL and the authentication realm of the server the credentials are cached for. MD5 has been shown to be subject to chosen plaintext hash collisions. This means it may be possible to generate an authentication realm which results in the same MD5 hash for a different URLŒÀ† † ,‚.‡€kЄ–OÑ¿µ;…èC*fc28df92-b233-11e3-99ca-f0def16c5c1b"> nginx -- SPDY heap buffer overflow 4.01.7.14 1.8.01.8.5’à† † k ƒÒ€j†~j475">

Samba versions 3.2.0 and above (all versions of 3.2.x, 3.3.x, 3.4.x, 3.5.x, 3.6.x, 4.0.x ™€† † #bÊ€ „óeª„óf!The Apache Software Foundation reports:

The attempted fix to address CV0Ÿ † †   €sv›=™†~ piwigo -- CSRF/Path Traversal piwigo 2.4.7High-Tech Bridge Security¥À† † 6 €4w…ø>†U)4/dates> otrs -- XSS vulnerability otrs 3.1«à† † $–`ƒ”?€ †~"with the RADIUS server547 http://freeradius.org/security.html http://www.pre-cert.de/advisories/PRE-SA-2012-06.txt ²€† †  €Kx‚š~¿†~ nge> 8.38.3_3 9.09.0Problem description:

Google Chrome Releases reports:

[81753] Medium CVE-2011-3903: Out-of-bounds read in regex matching. CreÄà† † z€s]‚Ç@†N‘u†\"yeports that this vulnerability is being exploited in the wild in targeted attacks via malicious Web pages1-2110Ë€† †  ‚€‚†~‚>Beginning with sudo version 1.7.0 it has been possible to grant permission to run a command using a specified group via sudo's -g option (run as group), if allowed by the sudoers file. A flaw exists in sudo's password checking logic thatÑ † †  ‚€‚†~‚-update upgrade', the freebsd-update(8) utility copies currently installed files into its working directory (/var/db/freebsd-update by default) both for the purpose of merging changes to configuration files and in order to be able to roll back in×À† †  ‚€‚†~‚ename>CVE-2010-1155 CVE-2010-1156 http://xforce.iss.net/xforce/xfdb/57790 http://xforce.iss.net/xforce/xfdb/57791 2010-04-16 Ýà† † 3 Q†?€1†~1Drupal Team reports:

The core OpenID module does not correctly implement Form API for the form that allows one 䀆 †  ‚€‚†~‚ 2009-03-16 2009-04-17 ziproxy -- multiple vulnerability ziproxy

Certain SVG scripts are not properly sanitised before beinðÀ† † - W°i€+†~+If a General Protection Fault happens on a FreeBSD/amd64 system while it is returning from an interrupt, trap or system call, the swapgs CPU instruction may be calleöà† †  ‚€‚†~‚me>CVE-2008-0418 CVE-2008-0419 CVE-2008-0420 CVE-2008-0591 CVE-2008-0592 CVE-2008-0593 CVE-2008-0594 2007-09-21 samba -- nss_info plugin privilege escalation vulnerability samba ƒ † †  ‚€‚†~‚compromise a vulnerable system.

Input passed to unspecified parameters is not properly verified before being used with the "noSet" parameter set. This can be exploited to overwrite certain variables, and allows e.g. the inclusio‰À† †  ‚€‚†~‚iscovery> 2006-10-14 2007-04-13 torrentflux -- User-Agent XSS Vulnerability toà† †  ‚€‚†~‚ 18175 CVE-2006-2762 http://www.securityfocus.com/archive/1/435379 http://www.securityfocus.com/archive/1/436263 –€† †  ‚€‚†~‚ the unprivileged child terminates while PAM authentication is under way, the parent process incorrectly believes that the PAM child also terminated. The parent process then terminates, and the PAM child is left behind.

Due to the way OpenSœ † †  ‚€‚†~‚40&w=2">

Unlike most of the supported image formats in xloadimage, the NIFF image format can store a title name of arbitrary length as part of the image file.

When xloadimage is processing a loaded image, it is creating a n¢À† † 3’Q†<€†~1ux-mozillafirebirdackage names are obsolete. --> de-linux-netscape de-netscape7 fr-linux-netscape fr-netscape7 ja-¨à† †   ‰1«v†–O‡/¯€† †   v›€}†~ ange>2.0.18A Debian Security Advisory reports:

Albert Puigsecµ † † 4€mP…›<€E†~2 an attacker overwriting arbitrary files with the credentials of the user running the vulnerable scripts1377 12108 12109

Amit Klein reports about Xerces-C++9674050017645">

An attacker can craft a malicious XML document, which uses XML attributes in a wÁà† †  ‚€‚†~‚lhotcopy insecure temporary file creation mysql-scripts 3.23.58 44.0.20 4.14.1.3 55.0.0_1