WordPress Encrypted Blog plugin version 0.0.6.2 suffers from cross site scripting and open redirection vulnerabilities.
8584bdef7145c52fd6508ebb8bc399f13fe30a4e1e37ccec276dae4e1e44f238
The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program.
9fd26d41fd22e4129c77a4d73ea91dc162b341382d20abaf8a4da3c11006e787
This bulletin summary lists four re-released Microsoft security bulletins for August, 2013.
8785bf1419d277108c889ac3baa9bbd0bc93dd5beb125a2286b87baacd8a5181
IBM Lotus iNotes suffered from four cross site scripting vulnerabilities.
618ce3eda1131f575c8580bda8bf0d3b521173ae62782e832850453ccb773385
Debian Linux Security Advisory 2743-1 - Several vulnerabilities have been discovered in the FreeBSD kernel that may lead to a privilege escalation or information leak.
569d8b0cda13d3a73e841bf15e6cefd040a645974771d3bc8fc7fc5adeea0929
Red Hat Security Advisory 2013-1173-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel's Stream Control Transmission Protocol implementation handled duplicate cookies. If a local user queried SCTP connection information at the same time a remote attacker has initialized a crafted SCTP connection to the system, it could trigger a NULL pointer dereference, causing the system to crash.
9700f82bdc10eeda814ac97795a008dafe46c72aa62da3f3cb548d663ffbe8f8
Red Hat Security Advisory 2013-1181-01 - The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine hypervisor. It includes everything necessary to run and manage virtual machines: A subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent. Note: Red Hat Enterprise Virtualization Hypervisor is only available for the Intel 64 and AMD64 architectures with virtualization extensions. Upgrade Note: If you upgrade the Red Hat Enterprise Virtualization Hypervisor through the 3.2 Manager administration portal, the Host may appear with the status of "Install Failed". If this happens, place the host into maintenance mode, then activate it again to get the host back to an "Up" state.
c9ef6b0e618b611300179156206106cdff91ea723fef48c2288632319326506a
Mandriva Linux Security Advisory 2013-222 - It was discovered that Puppet incorrectly handled the resource_type service. A local attacker on the master could use this issue to execute arbitrary Ruby files. It was discovered that Puppet incorrectly handled permissions on the modules it installed. Modules could be installed with the permissions that existed when they were built, possibly exposing them to a local attacker.
b9b2e0d9a30061a4929ce87461ea0acf12f98e9413ea4e6c9ff8fcd444c02674
Debian Linux Security Advisory 2744-1 - Pedro Ribeiro and Huzaifa S. Sidhpurwala discovered multiple vulnerabilities in various tools shipped by the tiff library. Processing a malformed file may lead to denial of service or the execution of arbitrary code.
28493f2a76208a5335d6abcb7ed91978040d7a674fc1aa40821edf071e19f880
Mandriva Linux Security Advisory 2013-221 - The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. Additionally a patch has been applied to fix an UMR (Unitialized Memory Read) bug in the original fix for CVE-2013-4248. The updated packages have been patched to correct these issues.
645f59943e5f467ddce2176dbf8da00053c3a0235f9de73ed2f48beec92773eb
Mandriva Linux Security Advisory 2013-220 - Three buffer overflows in Little CMS version 1.19 that could possibly be exploited through user input.
e42dc83e33c2698de8d2f76eb73c5a30901010106bb9f9cd591c46164807717b
The Opera Speed Dial extensions suffer from cross site request forgery and cross site scripting vulnerabilities.
6f6cb4062f0f63fde672c830d1a7d39c6f57f0a6ea74a83d42cc11a3f35f9611
Debian Linux Security Advisory 2742-1 - It was discovered that PHP, a general-purpose scripting language commonly used for web application development, did not properly process embedded NUL characters in the subjectAltName extension of X.509 certificates. Depending on the application and with insufficient CA-level checks, this could be abused for impersonating other users.
94d9e680a062358787e25ec659acc74944e9b260376d2f8e2978f25085b91e0e
Debian Linux Security Advisory 2741-1 - Several vulnerabilities have been discovered in the Chromium web browser.
bdd10a6aa033fcc7c6611dd7a8e6b25e019466b4bb621cfcb18e5dff400ad50d
Apache Hadoop versions prior to 2.0.6-alpha, 0.23.9, and 1.2.1 suffer from a man in the middle vulnerability.
920b4b37291877975ac89ad350cad1cbc7140726f76783a940c8e7f9a30bb34b
Apache HBase versions prior to 0.92.3 and 0.94.9 suffer from a man in the middle vulnerability.
5cbbf2fbcb303a708f88f69ffb41c24dc8538ff7d51887f0601d19e0d147af31
FreeBSD Security Advisory - When initializing the SCTP state cookie being sent in INIT-ACK chunks, a buffer allocated from the kernel stack is not completely initialized. Fragments of kernel memory may be included in SCTP packets and transmitted over the network. For each SCTP session, there are two separate instances in which a 4-byte fragment may be transmitted. This memory might contain sensitive information, such as portions of the file cache or terminal buffers. This information might be directly useful, or it might be leveraged to obtain elevated privileges in some way. For example, a terminal buffer might include an user-entered password.
31263b7b248f107d5f7ed98d3b388e63dc69a3862d01f93e4c9b344f9c86de7c
FreeBSD Security Advisory - An integer overflow in computing the size of a temporary buffer can result in a buffer which is too small for the requested operation. An unprivileged process can read or write pages of memory which belong to the kernel. These may lead to exposure of sensitive information or allow privilege escalation.
831fd4ba520eff2086ca0682aa7616522338d8662d219c74c434ceb7166343db
Debian Linux Security Advisory 2740-1 - Nick Brunn reported a possible cross-site scripting vulnerability in python-django, a high-level Python web development framework.
1671b9c95174b9e627098dc3bd5a91753223b915764d97e06efb1312af248f2f
Gentoo Linux Security Advisory 2013-08-04 - Multiple vulnerabilities have been found in Puppet, the worst of which could lead to execution of arbitrary code. Versions less than 2.7.23 are affected.
0540da72c54f57cbe5a156cdb95056d98fa489beca31a869e539fa0bb49ca073
Mandriva Linux Security Advisory 2013-219 - Pedro Ribeiro discovered a buffer overflow flaw in rgb2ycbcr, a tool to convert RGB color, greyscale, or bi-level TIFF images to YCbCr images, and multiple buffer overflow flaws in gif2tiff, a tool to convert GIF images to TIFF. A remote attacker could provide a specially-crafted TIFF or GIF file that, when processed by rgb2ycbcr and gif2tiff respectively, would cause the tool to crash or, potentially, execute arbitrary code with the privileges of the user running the tool. Pedro Ribeiro discovered a use-after-free flaw in the t2p_readwrite_pdf_image\(\) function in tiff2pdf, a tool for converting a TIFF image to a PDF document. A remote attacker could provide a specially-crafted TIFF file that, when processed by tiff2pdf, would cause tiff2pdf to crash or, potentially, execute arbitrary code with the privileges of the user running tiff2pdf.
abadfaec26a7eeb332d6857b3d9a3fda4971210c3fa04c79b7632f3de3d6ec6e
Mandriva Linux Security Advisory 2013-218 - The python-django package addresses a security issue. The is_safe_url() function has been modified to properly recognize and reject URLs which specify a scheme other than HTTP or HTTPS, to prevent cross-site scripting attacks through redirecting to other schemes, such as javascript.
1504a9f25eef5880d207471510df5d68d0689eb24ea616adf9a8ef6310edda32
Mandriva Linux Security Advisory 2013-217 - Updated spice packages address a vulnerability. A user able to initiate spice connection to the guest could use a flaw in server/red_channel.c to crash the guest.
0141aa0c20e6ba7b8bc867edb78229f58246fea99e2959aac781d177685f0cec
Mandriva Linux Security Advisory 2013-216 - ProcessTable.pm in the Proc::ProcessTable module 0.45 for Perl, when TTY information caching is enabled, allows local users to overwrite arbitrary files via a symlink attack on /tmp/TTYDEVS.
e270d97c7c30cd1dfa32136b75cbfb5d2f2f8687db2bbac9746b8e5e5f17ef6a
Spring Framework versions 3.x and 4.x suffer from an XML external entity (XXE) injection vulnerability.
44db748efe1afb0144c46a27348301fabb29af09798bbf1a847a659236ae224d