Asterisk Project Security Advisory - A remotely exploitable crash vulnerability exists in the SIP channel driver if a SIP UPDATE request is processed within a particular window of time.
32e74fe214613d789749549a4bf27817
Asterisk Project Security Advisory - In the Skinny channel driver, KEYPAD_BUTTON_MESSAGE events are queued for processing in a buffer allocated on the heap, where each DTMF value that is received is placed on the end of the buffer. Since the length of the buffer is never checked, an attacker could send sufficient KEYPAD_BUTTON_MESSAGE events such that the buffer is overrun.
696a9c6849da6138ccfe67440c3caec9
Asterisk Project Security Advisory - A user of the Asterisk Manager Interface can bypass a security check and execute shell commands when they lack permission to do so. Under normal conditions, a user should only be able to run shell commands if that user has System class authorization. Users could bypass this restriction by using the MixMonitor application with the originate action or by using either the GetVar or Status manager actions in combination with the SHELL and EVAL functions. The patch adds checks in each affected action to verify if a user has System class authorization. If the user does not have those authorizations, Asterisk rejects the action if it detects the use of any functions or applications that run system commands.
409cfec2b992f13790527da55bc20c35
Red Hat Security Advisory 2012-0509-01 - Wireshark is a program for monitoring network traffic. Wireshark was previously known as Ethereal. Several flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file.
9fab7ad8027e1775e6c5a043ba72912a
Red Hat Security Advisory 2012-0508-01 - The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit. This update fixes several vulnerabilities in the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit.
f2e7201e60f6290e3d33182b2dce01ca
ChurchCMS version 0.0.1 suffers from multiple remote SQL injection vulnerabilities.
3d2b3760071425f3286e4c3a63fc9047
An integer overflow vulnerability has been discovered in the EncoderParameter class of the .NET Framework. Exploiting this vulnerability results in an overflown integer that is used to allocate a buffer on the heap. After the incorrect allocation, one or more user-supplied buffers are copied in the new buffer, resulting in a corruption of the heap.
f743e8331a56b83fcfe2b2cbb6e904b2
HITB Magazine Volume 1 Issue 8 - Topics include Online Security At The Crossroads, Reverse Shell Traffic Obfuscation, and more.
1df89d656d3099e02fa4026a50d29500
School Website Solutions suffers from a cross site scripting vulnerability.
4939643ea105a553027778cb855f260d
ExponentCMS version 2.0.5 suffers from cross site scripting and remote blind SQL injection vulnerabilities.
1a9c42c94db7ae7c9f45865bdf220e89
Mobipocket Reader version 6.2 build 608 suffers from a buffer overflow vulnerability. Proof of concept included.
c965a12afc749d35e50648de2a8b0d3f
SumatraPDF version 2.0.1 suffers from chm and mobi file memory corruption vulnerabilities. Proof of concept included.
d1240f9e28eeb1f159902d452dfed57d
GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.
05e85d18955edd5c0fe40fbb7ef168bd
Mega File Manager version 1.0 suffers from an arbitrary file download vulnerability.
c8ee2253d729037b2c53e8f44d24be5e
The Chengdu Bureau of Commerce suffered from a remote SQL injection vulnerability.
5b2920407cc40efa0fba3cca239c4d76
PSFTP version 1.8 build 921 suffers from a NULL pointer denial of service vulnerability.
9e9523cb14ed12eb835610320f8a87be
The Joomla CCNewsLetter module version 1.0.7 suffers from a remote SQL injection vulnerability.
5b3419af47a3543fb8d2d45ff7bd885d
Firefox 11 suffers from a denial of service condition when using exponential string growth and document.write().
feb69b169c97333737d2ab29175892c3
SocketMail Pro version 2.2.9 suffers from cross site request forgery and cross site scripting vulnerabilities.
5e496b74495dc44ff2aa2ebeebabc406
Havalite CMS version 1.0.4 suffers from persistent and reflective cross site scripting vulnerabilities.
03e5ab45ff72cb6b5195d6bec489cf59
IPhone TreasonSMS suffers from html injection and file inclusion vulnerabilities.
baf9f8ad1ec36e375b28bc78fba8b6f1
Net-Shops suffers from a remote SQL injection vulnerability.
11c7625f34fa30b3bbcea2fd15b7c262
WordPress Organizer version 1.2.1 suffers from cross site scripting and path disclosure vulnerabilities.
25e439707bb58172d9ad4385ffb38677
phpMyBible version 0.5.1 suffers from a cross site scripting vulnerability.
7a0a5338a246609df54348ab04522746
VSR identified a vulnerability in IQRD. The IQRD service listens locally on a TCP socket bound to port 2479. This socket is intended to allow the Carrier IQ service to request device-specific functionality from IQRD. Unfortunately, there is no restriction or validation on which applications may request services using this socket. As a result, any application with the android.permission.INTERNET permission may connect to this socket and send specially crafted messages in order to perform potentially malicious actions.
b0da8b8505cdbc872d527eed57dee638