Mandriva Linux Security Advisory 2013-245 - Integer overflow in kbdint.c in mod_sftp in ProFTPD 1.3.4d and 1.3.5r3 allows remote attackers to cause a denial of service (memory consumption) via a large response count value in an authentication request, which triggers a large memory allocation. The updated packages have been patched to correct this issue.
e4f9f86ca1ec517a8ee256a4c2d1c6b5b638a8a2f18528122bb728d1c874c6cd
Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
10532b626e8182605e3ca9215d856a20145f776c30c729387f374dd753230a15
Zenphoto version 1.4.5.2 suffers from cross site scripting and remote SQL injection vulnerabilities.
186e32de10a3e7dda397488f868c181cbea223eeaf97d5fa65c9c8a4de5db329
Atmos nodes prior to version 2.1.4 allow connections to the remote PostgreSQL database server using a default user account with no password. The PostgreSQL database stores system information data used to administer Atmos nodes.
5e4ac6a7e0202c43697bfc3df33ee600bccdb3fee8349f53c8ffe61056868469
A vulnerability was found in the nsconfigd daemon (TCP port 3008/SSL and 3010). This daemon can be crashed by sending a specially crafted message. No prior authentication is necessary. A watchdog daemon (pitboss) automatically restarts nsconfigd after the first six crashes and then reboots the appliance. By sending just a few packets the appliance can be kept in a constant reboot loop resulting in total loss of availability. The vulnerabilities have been verified to exist in Citrix NetScaler VPX (Build 70.7.nc), which was the most recent version at the time of discovery.
58dcdce47632f720bc628f80305effb40ef074b20b017ef9442a1abcc451ee3b
HP Security Bulletin HPSBPI02892 - Potential security vulnerabilities have been identified with certain HP FutureSmart LaserJet printers. The vulnerabilities might lead to weak encryption of PDF documents or local disclosure of scanned information. Revision 1 of this advisory.
6fa5d4c637fa52dc3ecd517150d8ee41c3cd9b916c71349e4ba1429fe5261fdf
Aanval version 7.1 build 70151 suffers from cross site scripting and remote SQL injection vulnerabilities.
25c6581c50e70623be4df653e794e6218f92804314f2bd7664a2d6b31e5a06b5
WebAssist PowerCMS PHP suffers from multiple cross site scripting vulnerabilities.
6fc868abcb18310896d829df9b0a6d0530380058beae2c964f7c7ac6f21c9eea
Apple Security Advisory 2013-10-03-1 - OS X version 10.8.5 Supplemental Update is now available and addresses a logic issue in Directory Service's verification of authentication credentials.
4a73c6b3f66419ffc682c15f58284c701a52641d52fe5e8b937b967b4a687bdb
SilverStripe Framework CMS version 3.0.5 suffers from multiple cross site scripting vulnerabilities.
2b771ae8f3a35f7ab9bc5a1fb65e5cce149fb153b8b308c95772c9a55632ada8
Hide Photo+Video Safe version 1.6 suffers from local file inclusion and cross site scripting vulnerabilities.
2adba6964e32ad40cea84bbbc4d4d0e987f5a0d56241a0b542b1ced551b55897
ZeroShell version 2.0 RC3 suffers from command injection and cross site scripting vulnerabilities.
c6b7a171ee0acfbc63038e7082d14a3c678fc1589e9e4db140b10e4c2c32b948
Security Guard CMS QT version 4.7.3 suffers from a local stack buffer overflow vulnerability.
e337b29c9abe7f018791eace7e3978986e243436724a2227c3ca3ec164dcbae3
elproLOG MONITOR WebAccess version 2.1 suffers from cross site scripting and remote SQL injection vulnerabilities.
d161c80d8b1e4da060ee9651719266cdc777ed36571d5f91f285927707c309e9
WordPress Slimstat Ex plugin remote PHP arbitrary code execution exploit.
8ed6ec6d5399189b0d500e2817fd117e9e5da303c52a66bce3ba5263df85eb15
Evince PDF Reader versions 2.32.0.145 (Windows) and 3.4.0 (Linux) suffer from a denial of service vulnerability.
991428249cbe929860d2599990338a2127ae1aebe48f41fc531a342c63cdaffe
WordPress SEO Watcher plugin remote code execution exploit.
f4717c8b12ddb539492284d5c7dfd2d0f0f2fa6e209a9c9fa7e6515d4d4d7940