Debian Linux Security Advisory 3691-2 - The update for ghostscript issued as DSA-3691-1 caused regressions for certain Postscript document viewers (evince, zathura). Updated packages are now available to address this problem.
bf9ecded2517b9f70685b5a6c8769f95d5d255e233f8c459042e69a9ec20904d
Gentoo Linux Security Advisory 201610-11 - Multiple vulnerabilities have been found in Wget, the worst of which could lead to the remote execution of arbitrary code. Versions less than 1.18 are affected.
fe8f321799648fd7117d0c42050293a7b7f3f611b64a3ef20bfd07261e897964
Gentoo Linux Security Advisory 201610-10 - Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code. Versions less than 23.0.0.205 are affected.
d39c84f97fa4297c5874418e8f05337a85e75281733dc564c0a9e2b478143b2a
InfraPower PPS-02-S Q213V1 suffers from a cross site request forgery vulnerability.
b37af8c08805ea7640d8d197d165127c38864d0ee046dfafdd39b966e6aad3fd
InfraPower PPS-02-S Q213V1 suffers from an authentication bypass vulnerability. The device does not properly perform authentication, allowing it to be bypassed through cookie manipulation. The vulnerable function checkLogin() in 'Function.php' checks only if the 'Login' Cookie is empty or not, allowing easy bypass of the user security mechanisms.
77b1307af346ecfe3c45afddb0b9cec1987678dc3bb89c1d98a3d49a9d11a2c7
InfraPower PPS-02-S Q213V1 suffers from an insecure direct object reference authorization bypass vulnerability.
9312fbf0e0e08332d0ec2f279cc8ef20eef67898caba5aeb42438d468791552b
InfraPower PPS-02-S Q213V1 suffers from a use of hard-coded credentials. The IP dongle firmware ships with hard-coded accounts that can be used to gain full system access (root) using the telnet daemon on port 23.
c22e5f79189599a09a64a8e8a09ef273e57831a00e9bfcb6261740a9f82efae3
InfraPower PPS-02-S Q213V1 suffers from a file disclosure vulnerability when input passed thru the 'file' parameter to 'ListFile.php' script is not properly verified before being used to read files. This can be exploited to disclose contents of files from local resources.
ad79cf9d2792971f12b4467e9bfe8405b2023253e269e5156772d5997b5f9649
InfraPower PPS-02-S Q213V1 suffers from multiple stored and reflected cross site scripting vulnerabilities when input passed via several parameters to several scripts is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
c2ab6a1f6aa6c346e39e4bcbbc37acf45e0c10c36ae3954846da361ed1e8c2e5
InfraPower PPS-02-S Q213V1 suffers from multiple unauthenticated remote command injection vulnerabilities. The vulnerability exists due to several POST parameters in several scripts not being sanitized when using the exec(), proc_open(), popen() and shell_exec() PHP function while updating the settings on the affected device. This allows the attacker to execute arbitrary system commands as the root user and bypass access controls in place.
4bcd9fe006926b7e4e5923315fea8553003213cb95f58a40f72204f494f581c8
This Metasploit module exploits an un-authenticated code injection vulnerability in the bassmaster nodejs plugin for hapi. The vulnerability is within the batch endpoint and allows an attacker to dynamically execute JavaScript code on the server side using an eval. Note that the code uses a '\x2f' character so that we hit the match on the regex.
ee20d372ed0f1e30bd8d9b8a767eee792e35e7aba086370b04a670a286abf66e
PHP Support Tickets version 1.3 suffers from a remote SQL injection vulnerability.
a27060d874f333afedcca3b251ee3aa8c31e17ba488a19b028c19ace2d6ad266
PHP Support Tickets version 1.3 suffers from a local file inclusion vulnerability.
77ce766da24cd320c33836afab1cba31c7c36fbc622860543bfde78eaf3e05f2
Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
4bda6fb87674c7f402564351b142fcda6b5397b66d0d7edb6a8f0d46a70de5ab
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.
abc17e25afc1b9e74423c78fef586b11d503cbbbe5e4a2ed323870f4a82faa73
Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals.
e124a10f5e1cc12f366263958aeaf678bc45ef125e7d80430afc2808ac8cf4a5
The escape handler for 0x10000e9 lacks bounds checks, and passes a user specified size as the size to memcpy, resulting in a stack buffer overflow.
e764018c50128a89c728c3202c374cd2eee6b13beea7305fa6c32f6c0bab6212
There is a missing bounds check in inner loop of the escape handler for 0x7000014 that leads to a stack buffer overflow.
6154ad3c9f831583ddc42198a12cfa12363713dc40cd3172b448eda799e5eae1
Gentoo Linux Security Advisory 201610-9 - Multiple vulnerabilities have been found in the Chromium web browser, the worst of which allows remote attackers to execute arbitrary code. Versions less than 54.0.2840.59 are affected.
ad761228304f4fe9f8b6ce1842cf6603b66fd22ae641b2101ff84d93f1db9fcf
The DxgkDdiEscape handler for 0x70000d5 lacks bounds checks.
217f80d673facc15accb636f625922543219ec6b5feb5df98734f4a373cb88c7
The DxgkDdiEscape handler for 0x7000170 lacks proper bounds checks for the variable size input escape data, and relies on a user provided size as the upper bound for writing output.
7290a345ac11921d719fab843f9ee44533b83cdd39e09fc45d06819460973000
The DxgkDdiEscape handler for escape 0x100009a lacks proper bounds checks.
b14a13d1b77ffa3d060b707004362638f3c5ff6e048afd8cf77611c8cdde2d1a
The NvStreamKms.sys driver calls PsSetCreateProcessNotifyRoutineEx to set up a process creation notification routine. wcscpy_s is used incorrectly here, as the second argument is not the size of |Dst|, but rather the calculated size of the filename. |Dst| is a stack buffer that is at least 255 characters long. The the maximum component paths of most filesystems on Windows have a limit that is <= 255 though, so this shouldn't be an issue on normal filesystems. However, one can pass UNC paths to CreateProcessW containing forward slashes as the path delimiter, which means that the extracted filename here can be "a/b/c/...", leading to a buffer overflow. Additionally, this function has no stack cookie.
d534aa5dbfaaf39a96770f8f3d77175a1058baafc21fe140187d747f2c80d76a
The DxgkDdiEscape handler for 0x5000027 accepts a user provided pointer, but does no checks on it before using it.
ad8c4174f1e08e6564d58aa2d42e1e83d8e014e6a4e5db8020415f6aba4ec946
NVIDIA suffers from a missing bounds check in escape 0x100010b.
0ac6c7ff8137b4f4210690565bb24e9090b98312b19fb5b9f81228ab56b1211c