html5_snmp version 1.11 suffers from a remote SQL injection vulnerability.
7ee3213e4330e5f27f801cdda4caa33219cee0e2e4845d294191583c10fc7894
html5_snmp version 1.11 suffers from a persistent cross site scripting vulnerability.
a1066567bceba1b9f0f33851557a2ddf92740b11150490753a787281a747b15d
XNU has an issue where missing locking in checkdirs_callback() enables a race condition with fchdir_common().
95a3930fb861862d1fc4d07fbe47e96c19c11dc95352a6bd0f5aaec35a64ddf7
WebKit suffers from a universal cross site scripting vulnerability in JSObject::putInlineSlow and JSValue::putToPrimitive.
4f0600af672414346b14f07861a388881c06c9b650e59c8f9b6e0c60300565e6
SD.NET RIM version 4.7.3c suffers from a remote SQL injection vulnerability.
91cf0d8dd2c468a0203b666fecfa9e4eaeb757d8c45608c37af4972171b9e164
Ubuntu Security Notice 4175-1 - It was discovered that Nokogiri incorrectly handled inputs. A remote attacker could possibly use this issue to execute arbitrary OS commands.
a2e1e51c35eafb2241a9982ad73256727df781cc09219462ad915418b1623a40
Ubuntu Security Notice 4171-4 - USN-4171-2 fixed a vulnerability in Apport. The update caused a regression in the Python Apport library. This update fixes the problem for Ubuntu 14.04 ESM. Kevin Backhouse discovered Apport would read its user-controlled settings file as the root user. This could be used by a local attacker to possibly crash Apport or have other unspecified consequences. Various other issues were also addressed.
81caad2d46344b540abb520d2403bf96350e49f383817970934e6e91fd5bd73f
Ubuntu Security Notice 4174-1 - It was discovered that HAproxy incorrectly handled certain HTTP requests. An attacker could possibly use this issue to a privilege escalation.
4cefaa55cc8320976b4a98b63684739e029b2b7a4a59edd20899b3b3f7d77df1
Ubuntu Security Notice 4171-3 - USN-4171-1 fixed vulnerabilities in Apport. The update caused a regression in the Python Apport library. This update fixes the problem. Kevin Backhouse discovered Apport would read its user-controlled settings file as the root user. This could be used by a local attacker to possibly crash Apport or have other unspecified consequences. Various other issues were also addressed.
96f750c6e9b3e3e67dd29ea832ab6e5faf8732a5a2359aecf00407b69bd6837f
Debian Linux Security Advisory 4558-1 - Several vulnerabilities have been discovered in the webkit2gtk web engine.
124827b95c3ad80644486b1f6071dedab7939b6d39e5b4506c46d2ec8fd675af
Slackware Security Advisory - New libtiff packages are available for Slackware 14.2 and -current to fix security issues.
f004439b7e30a2821a8fc39cda51c8dbbf80290cd0e3f4c3fb1328b4541a2404
Ubuntu Security Notice 4170-3 - USN-4170-1 fixed a vulnerability in Whoopsie and USN-4170-2 fixed a subsequent regression. That update was incomplete and could still result in Whoopsie potentially crashing when uploading crash reports on some architectures. This update fixes the problem. Various other issues were also addressed.
dd96c9cf5abc86f5283966f5e3fb0fd95d5abd9889d02f6e18937c6ca856cc92
JSC suffers from a type confusion vulnerability during bailout when reconstructing arguments objects.
762e61444c8ff7e2cb5b183d57fbdd52d862a600247e6dd7cb87b54328d97054
thrsrossi Millhouse-Project version 1.414 suffers from a persistent cross site scripting vulnerability.
c0e75b6375afdf1949eb96c895ec59d3de9595d253be4d27d7462bcd98cf5331
rimbalinux AhadPOS version 1.11 suffers from a remote SQL injection vulnerability.
fa25db08fbb302d0fa264980292e8c200292e45eb24ab33aeba67aaf64415a95
File Optimizer version 14.00.2524 suffers from a denial of service vulnerability.
b1510b7efbf59fffa8aa925d23e7782b414dff856b6365aa9a97eee31b685830
Network Inventory Advisor version 5.0.26.0 suffers from a niaservice unquoted service path vulnerability.
8251b6daaf4a5682f7b5d0b0ee7ca77ebbf03c586885e8b5c66863e66f252abf
Blue Stacks App Player version 2.4.44.62.57 suffers from a BstHdLogRotatorSvc unquoted service path vulnerability.
b07d37141500d94c4ec52a7d7894387a665e3aa131eab0bfb88f39abec99a1c7
thejshen Globitek CMS version 1.4 suffers from a remote SQL injection vulnerability.
c6bea69a3985c49472e2c06b9508fae7b9c168bc771ad1cea7374605078d11a3