DELTA 465483 0 24617 SVN† † † † † † † ŒÀ† † ƒüd€t‡zƒüA ‚š„„5 mythtv mythtv-frontend 29.1 2018-03-25 https://github.com/ImageMagick/ImageMagick/commit/bb11d07139efe0f5e4ce0e4afda32abdbe82fa9d CVE-2017-14741 CVE-2017-6921 CVE-2017-6922Ÿ † † ‚€}N…悯e€s†]‚¯O ƒæ`‚¶&‚ime-of-check, time-of-use race condition can allow clients to access non-exported parts of the file system via symlinks mythtv mythtv-frontend 29. 2018-03-25 CVE-2017-5356 ports/215800 https://irssi.org/security/irssi_sa_2017_01.txt 2017-01-03 2017-01-05 2017-01-15 xen-tools -- virtio: unbounded memory allocation issue ¾À† †  ‚q €‚ov¾?†œk‚o https://www.openafs.org/dl/1.6.16/RELNOTES-1.6.16 2016-03-16 2016-06-05 ikiwiki -- XSS vulnerability ikiwiki 3.20160509Äà† † ‚€L`…x€N†‚iption>

Michael Furman34-announcement.txt">

The web based administration console does not set the X-Frame-Options header in HTTP responses. This allows the console to be embedded in a frame or iframe which could Ë€† † ‚w €‚uc„ì|†œ(^‚uand injection in the "useradm" and "chpasswd" web applications

  • CVE-2016-2057: Incorrect permissions on IPC queues used by the xymond daemon can bypass IP access filtering

  • CVE-2016-2058: Javascript injection in "detailed status webpage" of monitoring items; XSS vulnerability via malformed acknowledgment messages

    A privileged user inside guest could use this flaw to cause memory leakage on the host or crash the Qerange>0.282018-03-25PHPMailer changelog reports:

    Fix vulnerability that allowed email addresses with line breaks (valid in RFC5322) to pass to SMTP, permitting message injection at the SMTP level. Mitigated range>0.28ports/203668 CVE-2015-6938 CVE-2015-7337 http://www.openwall.com/lists/oss-security/2015/09/02/3 https://github.com/ipython/ipython/commit/3ab41641cf6fce3860c73d5cf4645aa12e1e5892range>0.280.288-03-25range>0.28 2018-03-25

    A new use-after-free was found in Jasper JPEG-200. The use-after-free appears in the function mif_process_cmpt of the src/libjasper/mif/mif_cod.c filezilla.redhat.com/show_ê † †  ‚2€‚0†P‚0In the event that the platform surfaces aforementioned UR responses as Non-Maskable Interrupts, and either the OS is configured to treat NMIs as fatal or (e.g. via ACPI's APEI) the platform tells the OS to treat these errors as fatal, the host would crash, leading to a Denial of ServðÀ† †  ‚2€‚0†P‚0 https://bugs.exim.org/show_bug.cgi?id=1638 2015-05-29 2015-06-04 2015-06-07 hostapd and wpa_supöà† † {–^‚¡€ZX‚£7ІPzname> 2.346.0 seamonkey 2.346.0

    Cross-site scripting (XSS) vulnerability in Press This in WordPress before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1 allows remoteƒ † †  ‚2€‚0†P‚0-2014-3506 CVE-2014-3507 CVE-2014-3508 CVE-2014-3509 CVE-2014-3510 CVE-2014-3511 CVE-2014-3512 CVE-2014-5139 CVE-2014-2286 CVE-2014-2287 CVE-2014-2288 http://downloads.asterisk.org/pub/security/AST-2014-001.pdf http://downloads.asterisk.org/pub/security/AST-2014-002.pdf httà† †  ‚2€‚0†P‚0e case, the IPv6 and ATM network layer ioctl request handlers are written in such a way that an unrecognized request is passed on unmodified to the link layer, which will either handle it or return an error code.

    Network interface drivers, however, assume that the SIOCSIFADDR, SIO–€† † y€ZA”žw†‹†Px plibplib 1.8.5_œ † †  ‚2€‚0†P‚0log reports:

    This patch addresses three possible buffer overflows in function unique_service_name().The three issues have the folowing CVE numbers:

    • CVE-2012-5958 Issue #2: Stack buffer overflow of Tempb¢À† † j H‚ª|€h†Ph3982 CVE-2012-3983 CVE-2012-3984 CVE-2012-3985 CVE-2012-3986 CVE-2012-3987 CVE-2012-3988 CVE¨à† †  ‚2€‚0†P‚0an cause an arbitrary file deletion on the Puppet master, potentially causing a denial of service attack. Note that this vulnerability does *not* exist in Puppet as configured by default.

      The last_run_report.yaml is world readable (medium). The most recent Puppet run report is ¯€† †  ‚2€‚0†P‚0 Jörg Scheinert has reported a remote command execution vulnerability in portaudit.

      An attacker who can get the user to use a specially crafted audit file will be able to run commands on the users system, with the privileges of the user running running portaudit (often root).

      <µ † † < –vá@€$†P:ame> 2.4.7The FreeType project reports:

      A couple of vulnerabilities »À† † @ °q† †P?eamonkey 2.0.*2.0.141-12 MiscellaneÁà† † A’Oƒ¬z®=‚¯9†œek@believed to be rarbid>45122 CVE-2010-402107È€† † &† ‚Òf€†P$A 201008-5913 CVE-2010-0183 CVE-2010-1121 CVE-2010-1125 CVE-2010Π† †  ‚ €‚N½@†9‚.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.cÔÀ† † d€N¦€H†Pba carefully crafted exploit to bring down your DNS server. It is highly unlikely that this one byte overflow can lead to other (system) exploitscvename>CVE-2009-1755 http://www.nlnetlabs.nl/publiÚà† † K€Sg‚y€v†PIr to execute arbitrary commands on an affected computer in the context of cvename>CVE-2008-5705 CVE-2008-5706 32889 32420 ဆ † q¤@ƒ¥H€L†Ppdrupal6 6.5318706">

      A logic error in the core upload module validation allowed ç † † U€j]Ø>€i†PSrbitrary code via a negative signed integer, which triggers insufficient memory allocation and aCVE-2008-1721 28715 http://securityreason.com/securityaleríÀ† †  ‚2€‚0†P‚0he vulnerability is caused due to a boundary error within the "ippReadIO()" function in cups/ipp.c when processing IPP (Internet Printing Protocol) tags. This can be exploited to overwrite one byte on the stack with a zero by sending an IPP request containing specially crafted "textóà† † B€@ˆ'vÈ?†D Aa197-0011098b2f36"> wordpress -- XMLRPC SQL Injection1ú€† †  ‚2€‚0†P‚0-vulnerability-in-cgi-library/">

      Another vulnerability has been discovered in the CGI library (cgi.rb) that ships with Ruby which could be used by a malicious user to create a denial of service attack (DoS).

      A specific HTTP request for any web application using cgi.rb caus‚€ † †  j €hNš@†Jhquote cite="http://www.squirrelmail.org/security/issue/2006-08-11">

      A logged in user could overwrite random variables in compose.php, which might make it possible to read/write other users' preferences or attachments‚†À† † k€AT„ò}rƒ´™†Pj clamav 0.88.1e>20051104_1 http://www.hardened-php.net/advisory_242005.109.html http://secunia.com/advisories/179077 2005-12-09 2006-01-01 gforge -- directory traversal vulnerability gforge 4‚ŸÀ† †  ‚2€‚0†P‚0Admin's theming mechanism, he was able to include arbitrary files. This is especially dangerous if php is not running in safe mode.

    • A possible attacker could manipulate phpMyAdmin's localized strings via the URL and inject harmful JavaScript code this way, which‚¥à† † i«P‚œ}ŸxÒž†Pheb-11d9-a9e7-0001020eed82"> unrtunrtf 0.19.3Yosef Klein and Limin Wang hav‚¬€† † ‚$ €‚"O…õ@†A‚"e routine that handles loading PNG image files. This later leads to heap data structures being overwritten. If an attacker tricked a user into loading a malicious PNG image, they could leverage this into executing arbitrary code in the context of the user opening imag‚² † † p€iBÒ>€†Pn system to read these files, potentially exposing information the user likely assumed was inaccessicvename>CVE-2004-0752 http://www.openoffice.org/issues/show_bug.cgi?id=33357 http://securitytra‚¸À„êy„í): €Sxˆ]€e„êy8SA-04:03.jail 2004-02-19e289f7fd-88ac-11d8-90d1-0020ed76ef5a"> many out-of-sequence TCP packets denial-of-service