VUPEN Vulnerability Research Team discovered a critical vulnerability in Oracle Java. The vulnerability is caused by a design error in the Java click-2-play security warning when the preloader is used, which can be exploited by remote attackers to load a malicious applet (e.g. taking advantage of a Java memory corruption vulnerability) without any user interaction. Oracle Java versions 7u21 and below are affected.
10e02ec7b9426a95440e714eac97006eaeca4b625413293939ad86595f91ad55
D-Link devices DIR-300 rev B, DIR-600 rev B, DIR-645, DIR-845, and DIR-865 suffer from a remote command injection vulnerability. The vulnerability is caused due to missing input validation in different XML parameters.
45b06bd652acac11c15608f66dea0133730d0c898dc986726de440ece8669b91
Debian Linux Security Advisory 2721-1 - A buffer overflow has been identified in nginx, a small, powerful, scalable web/proxy server, when processing certain chunked transfer encoding requests if proxy_pass to untrusted upstream HTTP servers is used. An attacker may use this flaw to perform denial of service attacks, disclose worker process memory, or possibly execute arbitrary code.
6e99ad6cc32808c72aea2fdc8a60c3b1e83edc6d3f8b8b8a6b9b122cd944919c
HP Security Bulletin HPSBST02890 2 - A potential security vulnerability has been identified with HP StoreOnce D2D Backup System. The vulnerability could be exploited remotely resulting in unauthorized access and modification. Please note that this issue does not affect HP StoreOnce Backup systems that are running software version 3.0.0 or newer. Devices running software version 3.0.0 or newer do not have a HPSupport user account with a pre-set password configured. A user who is logged in via the HPSupport user account does not have access to the data that has been backed up to the HP StoreOnce Backup system, and hence is not able to read or download the backed up data. However, it is possible to reset the device to factory defaults, and hence delete all backed up data that is present on the device. Revision 2 of this advisory.
9f18eb5ef4c93f01c624397b15391591aecd9224dfc4b12234c5acfe333401c8
Debian Linux Security Advisory 2720-1 - Multiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail and news client. Multiple memory safety errors, use-after-free vulnerabilities, missing permission checks, incorrect memory handling and other implementation errors may lead to the execution of arbitrary code, privilege escalation, information disclosure or cross-site request forgery.
2169fb3cae789aee11903229ba2e3f01583061efa102f4bfa9860b38144f8fe9
Solaris Recommended Patch Cluster 6/19 suffers from a local root command execution vulnerability on x86.
532e22bc6ff3e644f7b297fffe8d58e1796dc3a75b7965cd74a76062a5280627
The NTLM library contains utilities for authenticating against Microsoft servers that require NTLM authentication. The goal of this project is to make libntlm easier to build (by using autoconf, automake, and libtool) for use by other projects.
8415d75e31d3135dc7062787eaf4119b984d50f86f0d004b964cdc18a3182589
Google Chrome version 25.0.1364.152 suffers from an XMLHttpRequest HTTP Referer Header faking vulnerability.
b637b280b79f7030e948538de6695ffcde18a45fea4e3bb46f714e32896ebea4
VUPEN Vulnerability Research Team discovered high risk vulnerabilities in Mozilla Firefox. The vulnerabilities are caused by errors in the Mozilla Maintenance Service on Windows when interacting with local software, which could allow local unprivileged users to execute arbitrary code with SYSTEM privileges. It is possible to combine these vulnerabilities with a remote Firefox memory corruption to achieve a remote SYSTEM code execution.
6d67487dd7131f3f10ac5977a85cdbc90ed1c00cd95ae50e00f955350a1f8791
The File Roller archive manager for the GNOME desktop suffers from a path traversal vulnerability caused by insufficient path sanitization. A specially crafted archive file can be used to trigger creation of arbitrary files in any location, writable by the user executing the extraction, outside the current working directory. This behavior is triggered when the option 'Keep directory structure' is selected from the application 'Extract' dialog.
f6e7eec5337ffaec3b1e39f19c1e07cbe65ea4c169f65204d92f2634cdcc1947
D-Link DIR-505L and DIR-826L devices suffer from an authentication bypass vulnerability due to not validating session cookies.
15aeb881d7e8aff6673857cc13ccac13075a10312358a2e2634d2fabe3a41b31
Avira Analysis Web Service suffers from a remote SQL injection vulnerability.
b3027710b6c99a1596e86ed291f5ab4b8ddd1efb8e6a7331dbc90080704db339
This program encrypts and decrypts files using a 128 bit length key with Blowfish in CBC mode.
47e5f1406f19065edce7cda9fd3183d37944e05e7a528e286ee0343714aad83d
AOL Instant Messenger versions 8.0.1.5 and below suffer from a binary file planting vulnerability.
da5758570b995ade98829ed009b58ef415a94b0fdcdf1d9efe1ebb63339d6fa4
Adobe Reader X version 10.1.4.38 suffers from a BMP/RLE heap corruption vulnerability.
5c80216fd665dd80e7efa0a83034620674ebe12cdd052dd3151c9b2f257b9ab2
WordPress JS Restaurant plugin suffers from a remote SQL injection vulnerability.
48ddb834b6b5c6d9fbea650fb35d3b87734eda81ec9641f4a14fba0edf197f4b