Debian Security Advisory 1158-1 - Ulf Harnhammer from the Debian Security Audit Project discovered that streamripper, a utility to record online radio-streams, performs insufficient sanitizing of data received from the streaming server, which might lead to buffer overflows and the execution of arbitrary code.
79b17945e83f816d8035ffde0a69190a4c687d09b4a110f7462c9d0311ef6878
Debian Security Advisory 1157-1 - Several vulnerabilities have been discovered in the interpreter for the Ruby language, which may lead to the bypass of security restrictions or denial of service.
80f0c222dedc9f7ade77c3e9a5db07f4a0afb9e56c2f6e35d20d8ec5a70b59bc
Debian Security Advisory 1156-1 - Ludwig Nussel discovered that kdm, the X display manager for KDE, handles access to the session type configuration file insecurely, which may lead to the disclosure of arbitrary files through a symlink attack.
7a3174cbb354a44f382da2a695d7fbcbcb184aea1ea2108b8518fe21141298a4
PinoyInfosec Advisory - Web500 does not have proper input validation in the fronteditor script which allows an attacker to execute arbitrary SQL commands. This allows an attacker to manipulate data on the CMS by passing specially crafted SQL statements through the Dbcountry variable. Version 2.80 is affected.
c21efbbbf9fd70686ef57f3fc963c25651d1b660b64e1078d6560f06bd2f90d5
Gentoo Linux Security Advisory GLSA 200608-24 - AlsaPlayer contains three buffer overflows: in the function that handles the HTTP connections, the GTK interface, and the CDDB querying mechanism. Versions less than or equal to 0.99.76-r3 are affected.
586936fc7a5a278e9e2591603a785b1dfa14bd40b0d331fc9b1683518e541742
AlstraSoft Video Share Enterprise suffers from a remote file inclusion vulnerability.
44f4de33c2139c98322515851a2d18dddf44ad04de2c284de32a575ae621c24a
Bigace version 1.8.2 suffers from a remote file inclusion vulnerability.
f015a2f71f0026b6fc7d567962c9db3976c0cc94831ca0bb6fda61f3c78983ea
The Mambo/Joomla com_comprofiler component versions 1.0 RC2 and below suffer from a remote file inclusion flaw.
58f08abd605ae986060aaebd3c96cdfb32811b3ae797f3bc7981f3682fb844dd
The Cisco NAC appliance (formerly Cisco Clean Access) versions 3.6.4.1 and below suffer from an agent installation bypass vulnerability.
f2be702b7454c6348869203ef0cfa6c04914797d53c56d08d225f268c708633a
Jetbox CMS suffers from a remote file inclusion flaw in search_function.php.
f6684f3e2bf0edc185b1c2a86096fe0ad530b962cc219ae60b367d232ba93f38
Jupiter CMS version 1.1.5 suffers from a remote file inclusion flaw in index.php.
b205a17e47e4e3db6d3b2661eedbd410b5e58dda86ee689c0c733611daff4d84
Xoops version 2.0.14 suffers from a SQL injection flaw.
49ed5fad7c363db7fdcee0f73adf8e43078a555168a78a8906d37787401a5f3c
Mambo 4.6 RC2 and Joomla 1.0.10 both suffer from SQL injection flaws.
97dcb1422bb569b80b8886a497adaf2c74b10c2253535c14120e6aefba507552
Mandriva Linux Security Advisory MDKSA-2006-152 - Vulnerabilities in the SCSI, DHCP, and SSCOP dissectors were discovered in versions of wireshark less than 0.99.3, as well as an off-by-one error in the IPsec ESP preference parser if compiled with ESP decryption support.
0f85f842e1a82ec97af5a9d241d008298bfeef91b08d5de2ce089c3e3b651f8a
Cutenews version 1.3.x suffers from a remote file inclusion flaw.
1425de171552fe0ccd641fa80972dd6143192c3bee9061454bed919f10ca9f54
Mandriva Linux Security Advisory MDKSA-2006-151 - A number of vulnerabilities were discovered and corrected in the Linux 2.6 kernel.
680348d121ac7b42411ce9054f7d9429cb1c6b07902bddcdb5d5922ba71849e2
Mandriva Linux Security Advisory MDKSA-2006-150 - A number of vulnerabilities were discovered and corrected in the Linux 2.6 kernel.
95cb78e528ef2037f49b5da2f654ac4a5ab2b3f77b110479c99934493514a192
Indiana University Security Advisory - The Fuji Xerox Printing Systems print engine suffers from multiple vulnerabilities. An FTP bounce attack is possible when FTP printing is enabled. The embedded HTTP server allows unauthenticated access to system configuration and settings.
f924478b950d6fb6b8647ac3645dfe999c02dd5415fe9a6e9d89290b47cae2b9
YaPiG version 0.95b suffers from a cross site scripting flaw in thanks_comment.php.
a982a9b5ba5887ea81861b13af1b6c9cc66c2bd6a188b82d880f450e5ed84e25
The NSFocus Security Team has discovered a buffer overflow in Internet Explorer 6.0SP1 which allows for remote code execution via an overly-long URL.
31fc275e9263e8f91f3d87e178c5156ac1db384edfb575d3dd5c89172145c2ef
Mandriva Linux Security Advisory MDKSA-2006-149 - MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user's privileges are revoked for the original table, which might violate intended security policy. MySQL 4.1 before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.
8a5deb764b1c633185695ddebb9ec526a1ef11db250cce81099d1e2987c38884
eEye Digital Security has discovered a heap overflow vulnerability in the MS06-042 cumulative Internet Explorer update that would allow an attacker to execute arbitrary code on the system of a victim who attempts to access a malicious URL. Only Windows 2000 and Windows XP SP1 systems running Internet Explorer 6 SP1 with the MS06-042 patch applied are vulnerable.
140740018944f8f8fb1cd1ce93819ababbcebc675a58daa37730a7bec43591c1
Mandriva Linux Security Advisory MDKSA-2006-148 - An integer overflow flaw was discovered in how xorg-x11/XFree86 handles PCF files. A malicious authorized client could exploit the issue to cause a DoS (crash) or potentially execute arbitrary code with root privileges on the xorg-x11/XFree86 server.
4bfdace4d2c45d019c5faecffdce1d7bf2feddcabcafb04dd6297b54ff0ec5f7
Gentoo Linux Security Advisory GLSA 200608-23 - Yan Rong Ge discovered that the peel_netstring() function in cl_netstring.c does not validate the length parameter of user input, which can lead to an out-of-bounds memory access when processing certain Heartbeat messages. Furthermore an unspecified local DoS issue was fixed. Versions less than 2.0.7 are affected.
d82d1245d8c7ce45caa059dbffc4d0bb4951f3f0b19756cc6dad5c14c2fa28a4
The Zend Platform versions 2.2.1 and below suffer from multiple vulnerabilities.
0719bf1fa509737c893eafff775c3b21608acd3ee922f69666634439f10bd5b7