DELTA 496333 0 22058 SVN'/&fxHzmM?bB>FX-7ba5a3d0-4b18-11e9-adcb-001b217b3468"> Gitlab -- Vulnerability gitlab-ce 11.814/gitlab-11-8-2-released/">

Public project in a private group makes the group page publicly accessibleurl>https://about.gitlab.com/2019/03/14/gitlab-11-8-2-released/ CVE-2019-973214 2019-03-20 ]{xT\=gv6x^QN#1 =WXpY&mBaHiҞ3a߯S{%y"A }H>kn)b0@P/Au^K߳f7a?0Ys).MoG&xEYPT (8Kfn!?|ԓYڋޘeY:w&В`^нLioz*m = Y;|"M֍ |sV/:aJ.S]":4w]6s@|%P 25j__Ԋx^mOn0<_](%R0>KjeH_ߕ@[$3 `}?CWhɔѺ6#|cL4xH)AGα8,d<\FkFyN%Q`Ƙ9d{ڛ7&>8lj_m!=*qp;꿺ӿ%nyN\.~Z ,߿Df6_M!ZJb\GqS"@ՅyB]HImTU%u-Oy

libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size

liComputeFastKeylibxml2 Bug 759398.

li%v\8#v8x^Pn0 =+mi؀C˶vu2!!Eqо~NA;M9~iOʹ֕6܌)rZ*Y-fBW{4[(ƻ 3+?U}9Qs&/&3>ԥ:y rlqK% 1Q E$ R;bװk%,c`<ń g.x8X \v9;I.$YMt$L$SeHdl,ܞ6h|J % tl+ Vtx^M 0ὧLnCHI^)sn[)REGƣU8"M!LKTZw^N@Q%Kn> wordpressordpress 4.77.Aaron D. Campbell reports:

WordPress versions 4.7 and earlier are affected by eight security issues..o3gtv}23bb0b7-ba4d-11e6-ae1b-002590263bf5"> xen-kernel -- x86 task switch to VM86 mode mis-handled2.html">

LDTR, just like TR, is purely a protected mode facility. Hence even when switching to a VM86 mode task, LDTR loading needs to follow protected mode semantics. This was violated by the code.

On SVM (AMD hardware): a malicious unprivileged guestˀO-B>vHx^K 0ཧS1)V('(t)>Bo߉.&&geR(^VǍI.T`9IS4"'1McĴ 0Ec5<_P'z[$k|=0~OX-|5kg;׼p+ uo. c>e2ھ6qZ*Mv@x^RKk0>ۿb :I -&PJ{Yzc{, =%͞`$[k4^TlnSۼAlS4z[w@Eh)֗ň `L:'֭BAqd4vGYY,rfD͊m "RU٤[|pѲ#&;_VGHq ew;#Ei{SP(wabejo}Z,Ow|U|mo0FTa: 6S˛ '4ҹ 6V)xGha/u$24P_B1ofX2t!H#UGol+5B1[|[`˾kt}\-T`>>UGW`Ms&( 8R)gkPV>kq36K Q\jdy*|Lަ6r@1aUϴ`l—RkY~ΕF,'\ײf%˻  v x^Ak@ɯc U$` ŤvB{\;I8*f{ߓW c7CNIPCRGcCak<ӝ6vjŏ騝uǧly;^ܭk_\og?9B 517e:R^j5J,4$h#oɡ;܄WDWoVpESeGK،GiB˂Ax?=th'Ghg lԧFp]n$u\= iIP q e k#C`WyӖ䲻6f(%v~,u ,3&RީG%(-ţ5ZlC|tvvfiht,ɇ`űV5o3ŋN z~%c<ݔvCuЇES%I r %˩4ŻQf j IZ1(ERY"W<#CI8qjL#4xwx8bOYN|б~FiS -4;+?mB$S^}k'ǷEEUJvN?vvFx^n0 ),vueqwS$K\ o&b~ 彻`Mudaoxh>(4d>NF`QjOzLV>R1=+fm^`!n?N +> +9t8O'Iŵ_ZNvُ^*`uJdY+Q m;uvm ^ @v\Q 86ڐBhAj 2014-09-30beb3d5fc-7ac5-11e5-b35a-002590263bf5"> Joomla! -- Core - Unauthorized Login vulnerability joomla3 joomla2 2.5.25The JSST ~pR=,v@Zx^n ۧ0#xzG],`mE]&@2fCw@ ъWeOyX<윇ams<twGF<B7Wx+Ð <3Z㼪)( Gic#F9AC\FKຢo_ݢ' @`'i 72)x9 T79&'=Z ? /m))MO% I|I|I|I|I|I|E1name> CVE-2015-2737 CVE-2015-2738 CVE-2015-2739 CVE-2015-2740 CVE-2015-2741 CVE-2015-2742 CVE-2015-2743 CVE-2015-4000 https://www.mozilla.org/security/advisories/mfsa2015-5901234rs\@9]yvQx^un0E+FbWYЇ*Ԗ*B&+cGSڿ>$=θ]VNJvíD˧+/rü\iNQ"?n_YM2P}Ji2%9Eu#O`f8-GXVV6^͙_JkR]!9>Q[jkvgJ` RrS԰ق]dzVPjâw4dE\;آ1;PMܟ^V[~? 4zbQ!wƣ[UJŠ63HNΟtc7nUʸ"&V8cJbFP{u1"Bk+Tsf2iw~Qv-x^1o0gVv$@vhJHH]\k7Rt'}޽yQ႖yÿ{VNêijma5DK#-ƁKM3۱C2)v 5. (ȗVuNWKUC+Zdsuz紒D1=:^VBʜ U1V :1p\i5c< Igs3PLdž.B\+ypǰečV{Ia}趄\EH,FS pNLvvc/]gL,@}/54Y@'LLn֖Z ]D>2>o/Ox-&t˒4c|OӢrXʧ:?`;u 281\lEJH"|\+˲~BȢNKYy#˓ِ.ԩTճAVe1diu䭭=Gykxoڑ[+Vw>V}/\dUv@N?DvFx^?O0g)NHL 6\SNK~{I@b“}z*‡s0⪗"7Tl b`<_l-:>Qx윧҄ICm!X3ZeM:U^t EĢc%- 7A Z a \9 2D8,c=mODAΣg!hNUmg$a2('P|B];KЖôqNu-+}yxxNU[F<dzon4JeT]xv w@Q%ce server to impersonate the client to any other using the same GSSAPI mechanism1-2192 http://curl.haxx.se/docs/adv_20110623.html 2011-06-2377bb0541-c1aa-11e3-a5ac-001b21614864"> dbus-glib -- privledge escalation dbus-glib 0.100.1 linux-f10-dbus-glib 0.100.1DR`y޺YBo9iivdx^n {B"\J}]+5F ~Il3#(׋W(?/c2Ӷ)c] c ̘"Rzt(buۖ(-"'{؋$kj*Q9`J+Qt|+0>0F'  8BD>Cg&>C\ gp[X3^P$hs[$Wvs}lw@`+q^tdy> CVE-2013-0504 CVE-2013-0643 CVE-2013-0648 2013-02-26 2013-02-27 otrs -- XSS vulnerability3Ky~vx^1R0Ek8N*I:Ƹ2Բ5JY$tP}z@NFݜt#SJhD֫#^Ж*ȄHiCy)6RWO5n\e3ߥ0 6jKMiG㈚%aŜщyB/jFAވ.j" &gs{Oj;is&h0" b`xv2x^MQn0<'_aqC^M"GY_ )_>W3?T2lvP.HoEyo;`;2m[B1]ob-3 Ѐ=;5:eH}/(SyN%x*x}J(yy = l(pK!g v;HZ^JәXՒ+B}ˢ59Z$R;tJx!E=p~\V o eEiȀyt?nf<%Qx^1o0 Ws>KС@@۱%8RHʾJ;IHx¡6} xֽK2(%ak;@WCa) %gRqR"1",7v@VcZ'ˤ y+պH+B'TۨVIIM%K 7 @@獖9TʱL8 R[8m_p@iى/U_f55/T[6B}_E7]ZW-|$io&a07w9iyFMb FI{DѺ?JrΠM[Uqo/@apP&Kces> SA-11:08.telnetd CVE-2011-4862 http://security.FreeBSD.org/advisories/FreeBSD-SA-11:08.telnetd.asc http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-008.txt 2011-12-23 2011-12-2022a4c77-2da4-11e1-b356-00215c6a37bb"> proftpd -- arbitrary code execution vulnerability with chroot6N@,v[`t e:|mnut.R\x|G3fZˤiINc99hqƘ|#9p69ePdna6ڴJnyHvx=&^7P3(Nj\3r@ٺpURWX1@):@e߽jIxFBvݐNΝ&LHK:CYOÔ3gE)rlPmRNMD%NJiԡQmyqi)}KL~zWxe~n vid="4c017345-1d89-11e0-bbee-0014a5e3cda6"> MoinMoin -- cross-moinmoin 1.9.3MoinMoin developers reports:

Fix XSS in Despam action (CVE-2010-0828)

Fix XSS issues

  • by escaping template name in messages
  • by fixing other places that had similar issuesveL`vHx^ER0=ӯqed"Rؓd^N{n[|y~ٛ}bE~ЀwD 4!z ]Z8DnCu o_yFŠ`?e?őKYS7z)@6 ~f8XIr*DΔY&€`Lsً6USI~hN=cˑKb},EnZ 2(yvNc"F[]:zD#˻9- ͝Ԓkź~URxR`BAVb+v}J@p+{e6Og"A d)˧s $?ZdD@Dvx^}RM "TwJE> =5A1n> CVE-2009-2477 http://www.kb.cert.org/vuls/id/443060 2009-07-16 2009-07-17c444c8b7-7169-11de-9ab7-000c29a67389"> isc-dhcp-client -- Stackisc-dhcp31-client 3.1.1 isc-dhcp30-client 3.0.7_1`~=oX\v^y> 2009-02-11 typo3 -- cross-site scripting and information disclosure typo3 4.2.63829conduct cross-site scripting attacks and disclose sensitive information.

    Input passed via unspecified fields to the backend user interface is not properly sanitised before being returned to the user. /O_@\v+x^eA0ͯJ16!ɒ"UU^V[ %6 !I4~b]>TCP=)hƶ%v"8BuIā ښD?d: OKyvr@j {G BoXr< J^C 6= `^2.6`H ,c]C*I# iI=&-ҸB ^(/WQi_u;?zb[!J+us3'GɎ/W<9fw#誨82=G=sۊSo}d½'gyYEܡԫT*^X)6bhK&D.(D__YZg3c;ۋ#HrAZh^Xmc!eOq-Jvx^}QN0 >qHpH$xj&IZ8:-_ԄPk!"{(%G45;Z܀++6>_vQH:cwc }VcKG[5:epb>xg.tRRi ܮ2fu$X*e0{K9bP 9ЅD/Nt,sKdpH+N,I&GjV]Zwشr⹰s˜yit9Du=T;;6OL"drQ#NTACh~ZB\6z;Ɨ;튍aCov{w$\ែ{jv>N@GvFx^mn0 S9mKv%kḷÀa(dʒ&nthD?\|r46_˕HKe6۔D:n5oו(Q^tUMN+=$AلVAU;(X 'C0|Uj5,^'1`hܖ*#"vI~D1!w!ś荓Og$%}*\8?MPL@AQAry)~o/j凋+<$Ǣ #zcd涕Q΁+hzd;2dve  GF7Y> TVr1fߙbQQ>4o꿱B|2 Nv@ site request forgeries

    Several parts in Drupal core are not protected against cross site request forgeries due to inproper use of the Forms API, or by taking action solely on GET requests. Malicious users are able to delete comments and content revisions and disable menu items by enticing a privileged users to visit certain URLs while the victim is logged-in to the targeted siteurl>http://AY=EUN?d@@v?rabilities cacti 0.8.6i.43528/">

    rgod has discovered four vulnerabilities in Cacti, which can be exploited by malicious people to bypass certain security restrictions, manipulate data and compromise vulnerable systemsurl>http://secunia.com/advisories/23528/ http://forums.cacti.net/about18846-0-asc-012-28 2007-01-12fayIh@VQ63`9Q¥+xbe?#~1s=?A)+2r3VZdl`X5+gX)ńX5j˶˕ת<c(pRhC[}v^scIX8J?c>͝xV@d Ȥ%jY//ov;,ڪ湯n@(`N8` s ̷3_F+N<9oa?P1j$uy$þć/{nK>q`{v_x^]Ak0ͯrˡv{ۖm m)@)XȒѺ[B}<;߼!痚җI5{!W#cܣ_XRaCkI}HgP` P(#| 8?ݵ(F٨QC8&0T.if!@΢4w>_lj*ZjX@+d2:&x< `{? ̶0p$zatp.h'nCvfo|㊢{~?`8RPCZahC51z*b92m`5+ 6y׷+s$2pAԶlQ&YHFi!K>EZQ-d26% [կ;uV>+jϥ< P::v::

    A number of issues has been discovered in cpio:

    When creating a new file, cpio closes the file before setting its permissions. (CVE-2005-1111)

    When extracting files cpio does not properly sanitize file names to filter out ".." components, even if the --no-absolute-filenames option is used. (CVE-2005-1229)

    When adding large files (larger than 4 GB) to a cpio archive on 64-bit platforms an inter^#`}X=v?|v\s/#squid-2.5.STABLE10-sslConnectTimeout http://www.squid-cache.org/bugs/show_bug.cgi?id=1355 http://secunia.com/advisories/16674/0c0dc409-1c5e-11da-92ce-0048543d60ce"> squid -- Possible Denial Of Service Vulnerability in store.c squid 2.5.10_5The squid patches page notes:

    Rr﷮z#<(a@e,uڛ CYtr^D?vTx^uKk0 mi;B1YqԱ3ON=,O ׋")2FwxT?2WEՃJ},2>ʳZv?}۾S95F@ i*(;YG&ހ&iZr5wa%k0TR 4k(M;9E7.Q\L.iPhWw1Jw, -{E!h&WB?jA@#уb ` HGҕT EQT$ 4bιd0lTpdNܽT.Kj%OJ*:r.sy{e]2sDv:x^=QM =7b`b6ki*ukabb`an.{N3Xjg&vk;!6'׍DdS3[ݠ_.! >_D "tLسE#۵L% FH~6\y;7B vߛ#k[sb'liqWA޵(D:[o03BY?VzDl𠈔-J_) P"P%F5:MtԉT> vZC)Yհ 1-q+$,+Oak@ŀxXCDVQ>Hvv04-11-24 2004-11-27 2005-02-13 unarj -- long filename buffer overflowLudwig Nussel has discovered a buffer overflow vulnerability in unarj's handling of long filenames which could potentially lead to execution of arbitrary code with the permissions of the user running unarj947 11665 ˠ > v x^eAo0 ɯ zڀn]2dvcu瀖H,y"50E{Jqzv] P-{tt4鍮]]^4ʍ2=8dw˻NdҨڵK)ѴܔyuA)i XPL7U?i rePkǒ_ _~Mqㅮ95R9eOn6>7A͸Dмu5/$ӿa}% ark)\G RVkWR>xA Ƃ~jX@^q\i |62004.html">

    A vulnerability within a libneon date parsing function could cause a heap overflow which could lead to remote code execution, depending on the application using libneon.

    The vulnerability is in the function ne_rfc1036_parse, which is in turn used by the function ne_httpdate_parse. Applications using either of these neon functions may be vulnerablcvename>CVE-2004-0398 http://security.e-matters.de/advisories/062004.htmlWv=x^n S ;\9^+icbl\I nz(7>< S&HwCh7dY 1eԳVSFTZť+a!bInMsDnFj(UbDSysY(ǒ0JW,詬UOpT=|ԧZs/d^MkDP)P=dd;SJ DAs4n$9sGOz5`hJY5@^aիaKj$66bwEGB$mx{#JBwڰ)oE$D