DELTA 388586 0 6502 SVN† † ‚ •Y€‚†ˆ•m‚t>8.38 php5 5.4.42 php55 5.5.26 php56 5.6.9 † † †  < IΎ<€:†}:5-1798 CVE-2015-1799 http://archive.ntp.org/ntp4/ChangeLog-stable 2015-04-07 ’ΰ† †  ‚€‚†}‚, sync, and extensions that can lead to remote code execution outside of the sandbox.
  • [369860] High CVE-2014-3168: Use-after-free in SVG. Credit to cloudfuzzer.
  • [387389] High CVE-2014-3169: Use-after-free in DO™€† †  ‚€‚†}‚/li>
  • [330626] High CVE-2014-1722: Use-after-free in rendering. Credit to miaubiz.
  • [337746] High CVE-2014-1723: Url confusion with RTL characters. Credit to George McBay.
  • [327295] High CVE-2014-1724: Use-afterŸ † †   €Q~7΄†}d other initiatives.
  • [319722] Medium CVE-2013-6638: Buffer overflow
  • [319835] High CVE-2013-6639: Out of bounds wri₯ΐ† † B C„­=€@†}@4635 https://bugs.php.net/bug.php?id=64895 2013-05-22 2013-07-16 €OG„°;€m†}< FreeBSD -- OpenSSLFreeBSD 8.38.3_7 9.09.0_7 ²€† † 4 €rQ…x€@†}2>

    Jenkins Security Advisory reports:

    This advisory announces a security vulnerability that wΈ † † `»_’?ƒEΣ?‘†}_lls AcquireMagickMemory with an improper size argument3434105 54716Ύΐ† †  ‚€‚†}‚ster from authenticated clients (high). Given a Puppet master with the "Delete" directive allowed in auth.conf for an authenticated host, an attacker on that host can send a specially crafted Delete request that can cause an arbitrary file deletioΔΰ† † t¦N„—?•BΦ?Έ†}smessage that lacks UTF-8 encodingcvename>CVE-2012-117815 2012-04-01

    Integer signedness error in the base64_decode function in the HTTP authentication functionality (http_auth.c) in lighttpd 1.4 before 1.4.30 and 1.5 before SVN revision Ρ † † ( €&a……)†y&php">

    It was possible to manipulate the PHP session superglobal using some of the Swekey authentication code. This could open a path for other attackΧΐ† † K₯Y…Π₯`‘d†}Jnput validation are insufficientwww.videolan.org/security/sa1102.htmlέΰ† † H €F]„λ:†] Fcovery> 2010-11-03 mozilla -- Heap buffer overflow mixing document.write and DOM insertion䀆 †  ‚€‚†}‚04.php http://www.debian.org/security/2010/dsa-2039 2010-04-21 2010-04-24 2013-06-16

    Patch 20091015 fixes one buffer overflow problem in sgLog.c when overlong URLs are requested. SquidGuard will then go into emergency mode were no blocking occurs. This is not required in this situation.

    πΐ† † 6˜OΦ>€†}4ng to a denial of servicbid>34656 http://lists.quagga.net/pipermail/quagga-dev/2009-April/006541.html

    Lack of sanitization throughout Netrw can lead to arbitrary code execution upon opening a directory wiύ€† † C B‚Γ€A†}AJoe Orton reports:

    A NULL pointer deference in the Digest authentication support in neon versions 0.2ƒ † †  €vƒά@ކ} -gtk mplayer-gtk2 mplayer-gtk-esound mplayer-gtk2-esound 0.99.11_2The Mplayer te‰ΐ† †  ‚€‚†}‚cious people to cause a DoS (Denial of Service).

    Certain errors within libpng, including a logical NOT instead of a bitwise NOT in pngtrtran.c, an error in the 16bit cheap transparency extension, and an incorrect use of sizeof() may bΰ† † &ˆ_ƒ΅€†}$ service1320 CVE-2007-1321 CVE-2007-1322 CVE-2007-1323 CVE-2007-–€† †  ‚€‚†}‚tion> http://www.security-assessment.com/files/advisories/Asterisk_remote_heap_overflow.pdf http://marc.theaimsgroup.com/?l=bugtraq&m=116121567530170 œ † †  ‚€‚†}‚.w3.org/1999/xhtml">

    Horde 3.1.2 release announcement:

    Security Fixes:

    • Closed XSS problems in dereferrer (IE only), help viewer and proble’ΐ† †  ‚€‚†}‚

      Problem Description

      IPsec provides an anti-replay service which when enabled prevents an attacker from successfully executing a replay attack. This is done through the verification of sequence numbers. A programming error in the fast_i¨ΰ† †  ‚€‚†}‚CVE-2005-1151 CVE-2005-1152 http://secunia.com/advisories/15475/ 2005-05-26 2005-11-07 2005-11-26 ru-apache 1.3.34+30.22 ru-apache+mod_ssl 1.3.34+30.22+2.8.25΅ † † 1 €tT‚Α9»†}//msg66978.html 2005-01-03 2005-06-0184479a62-ca5f-11d9-b772-000c29b00e99"> fswiki --»ΐ† † 7„N‚ά€1†}5asedurl>http://www.mozilla.org/security/announce/mfsa2005-28.html https://bugzilla.mozilla.org/show_bug.cgi?id=281284 12075 CVE-2004-1308Θ€† †  §wΘ@€e†} me>phpmyadmin 2.6.0.From the phpMyAdmin 2.6.0p2 release notes: