Debian Security Advisory 1530-1 - Several local/remote vulnerabilities have been discovered in cupsys, the Common Unix Printing System. A heap-based buffer overflow in CUPS, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions. A double free vulnerability in the process_browse_data function in CUPS 1.3.5 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via crafted packets to the cupsd port (631/udp), related to an unspecified manipulation of a remote printer.
a5eff4c1aab8b289dee26fb4d18a9997f81a42a145ae3628aace65ddeda08ded
Aeries Browser Interface (ABI) version 3.8.3.14 suffers from SQL injection and cross site scripting vulnerabilities.
1fe15ab8dcf2cc124a23e29d5a6aa18293483b78dca241f06b311443b63086e8
MPlayer sdpplin_parse() array indexing proof of concept buffer overflow exploit.
684a2796a778ac2b15397d7c15749a0d175808503c567e94c02271e1c597ff70
The e107 My_Gallery plugin version 2.3 suffers from an arbitrary file download vulnerability.
2ef4312d97e534f6c07bbe36d7a3a2078377c54b2fcec8d9d17470dfdfafce4b
The Joomla AlphaContent component versions 2.5.8 and below suffer from a SQL injection vulnerability.
238d16b3c8e2871ad7f7704abfe459b1c1b2df50d662f1c5c788c6a7c4cf679f
Secunia Security Advisory - laurent has reported two vulnerabilities in D-Link DI-524, which can be exploited by malicious people to cause a DoS (Denial of Service).
3dec807c77ff0e32eca7708e6124e36f1f0cf6d7fd4ee4bfab67135765e45a81
Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in ASUS Remote Console, which can be exploited by malicious people to compromise a vulnerable system.
6d3920237824a6a0df4a4ceb5ba29536f980b446d87982cab6263a5826a99451
Secunia Security Advisory - A vulnerability with unknown impact has been reported in bzip2.
c3517e34022d4d7ce13db9af0bd75f1aedff04093390b0faeeba17569f31fdc5
Secunia Security Advisory - A vulnerability with unknown impact has been reported in 7-zip.
e4edcf2252401ac7e20ff9d77c279916581a8b168a04bb67f1bdd334aa017726
Secunia Security Advisory - Fedora has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), or potentially compromise a vulnerable system.
0c6441504c8b2e3c27b43f1d95e35ed9d7c85bfbf844d31b5471fab23faaa1cf
Secunia Security Advisory - Fedora has issued an update for xine-lib. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.
a55875887920ad03615c691ad6ca1f07cc6f0148531ba4e9473b72922ea00004
Secunia Security Advisory - A vulnerability has been reported in Novell eDirectory, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.
aa3c92155cb9715f6fa785b5d2226b004ce4ed3a3f411e058a26ee265bdef64e
Secunia Security Advisory - bd0rk has discovered a vulnerability in the eXtreme Styles module (XS-Mod) for phpBB, which can be exploited by malicious people to disclose sensitive information.
cfdc249f72d38551e18dc835ae0492e6b18d8e34ff7b88ea85aab085b1293243
Secunia Security Advisory - Some vulnerabilities and a security issue have been reported in DotNetNuke, which can be exploited by malicious users to gain escalated privileges or to compromise a vulnerable system, and by malicious people to bypass certain security restrictions.
8b31012cf25843b19499c2b88d6b1df19a2c161fa2a76a98f5f9d40481b9d6ef
Secunia Security Advisory - A vulnerability has been reported in eGroupWare, which can be exploited by malicious people to bypass certain security restrictions.
bb9ec4158df5ffd4e88fa04de32149128b2b7ed8d2e0e0fb6e07e181f79f814b
Secunia Security Advisory - Matthias Bethke has reported a vulnerability in Apache::AuthCAS, which can be exploited by malicious people to conduct SQL injection attacks.
b58296eaac06d10d553592a4bc269807da3a186e126269782c78ddaf65f67151
Secunia Security Advisory - rPath has issued an update for unzip. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.
4b3d85c11360e2e866081abcd2108a71637262df70c58a3669529299e34335c3
Secunia Security Advisory - RMx has reported a vulnerability in Efestech E-Kont
4c803fa76b2f4dbaec9b4331c92760fe42e0f35128498b1fbc064fd2c3d266fa
Secunia Security Advisory - A vulnerability has been reported in VLC Media Player, which potentially can be exploited by malicious people to compromise a user's system.
f63817b98799393e058a7aae0ace5401b4719cc3531ac99ede5c744e09753a0b
Secunia Security Advisory - IBM has acknowledged a vulnerability in IBM WebSphere Application Server for z/OS, which can be exploited by malicious people to conduct cross-site scripting attacks.
15cdf4d58964bd5dec263f13c2934e891b5755d8f1bf09cd6087349007c44589
Secunia Security Advisory - Sniper456 has discovered a vulnerability in the rekry!Joom component for Joomla!, which can be exploited by malicious people to conduct SQL injection attacks.
f579d96ecf634878d76a69b7ac129b854778f44958ddbd49d5f6dceea0635f1c
Secunia Security Advisory - 0x90 has discovered two vulnerabilities in phpAddressBook, which can be exploited by malicious people to disclose sensitive information.
cfa0ababf86e1ddabaeef258e14e4aac658c61fc7def0544faf421fb5da43ff5
Secunia Security Advisory - Sniper456 has discovered a vulnerability in the Custompages component for Joomla!, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system.
197469980beccac1b81b16bc94741ff5d838aa7ccad6650088d2f4989a2c3010
Secunia Security Advisory - A vulnerability has been reported in Novell eDirectory, which can be exploited by malicious people to disclose potentially sensitive information or cause a DoS (Denial of Service).
bb43ba82b2c29bbab6e30e5fb1163b31eda43ce0fcbf28dcb06493ad1050a41e
Secunia Security Advisory - Gareth Heyes has reported a vulnerability in D-Link DSL-G604T, which can be exploited by malicious people to conduct cross-site scripting attacks.
2072d3ddc8a2ef1ee1f2b8b45217cf1527da2b01ed2ad93e8587d21b1fe642b5