Secunia Security Advisory - A vulnerability has been discovered in the Simple File Upload module for Joomla!, which can be exploited by malicious people to compromise a vulnerable system.
150d39d7c8956d5d0d546b9857000788b7320713679a949fa9216f014d28f092
Secunia Security Advisory - A vulnerability has been discovered in the Simple File Upload module for Joomla!, which can be exploited by malicious people to compromise a vulnerable system.
af82d9f9b5fb3aae9b01dc8c5fa0e7f42f007c255c1a528950b835710fd42f7a
Pmcma aims at automating exploitation of invalid memory writes (being them the consequences of an overflow in a writable section, of a missing format string, integer overflow, variable misuse, or any other type of memory corruption).
7544c62a0e04880da65bbb1977d91d5cb2dcf6333c762b966c6abb657c436896
ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.
ec63ef47d8f4cb8af21a3bc84ff1de6968805146682dd7f10982bde975d9bb5d
WordPress SearchAutocomplete plugin versions 1.0.8 and below suffer from a remote SQL injection vulnerability.
e9ef8b9c05d946a09cc2c37a2e8ae3354835abbb82dedd580d2f8c3962e3d7fc
Dotclear version 2.3.1 suffers from a shell upload vulnerability.
6eec6a310607ec86faeec4485e4ae5322aaa9043664ad28d9cfd1300cbfbd544
Secunia Security Advisory - Some vulnerabilities have been reported in bcfg2, which can be exploited by malicious people to compromise a vulnerable system.
2119976f9fc09091d5522fddebd4ba2a6e8ca2b9f7be703bc8a5fd376828aaeb
Secunia Security Advisory - A vulnerability with unknown impacts has been reported in Ingres.
0e3aed61f5cb5f1c53ada649987aa0e6e75c385a834f08a2a9842a62691cbcf4
Secunia Security Advisory - Fedora has issued an update for ecryptfs-utils. This fixes multiple security issues, which can be exploited by malicious, local users to disclose potentially sensitive information, bypass certain security restrictions, manipulate certain data, cause a DoS (Denial of Service), and potentially gain escalated privileges.
31a6f5b90a49a62193f3cdb18edf8f9645a8f707c7a703d11592a1a7e16cde3e
Secunia Security Advisory - Red Hat has issued an update for rsyslog. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
4fa66c6a7e4b3dc3a673083ff965546f15d95d2647ebb7ec717d359aea3a6828
Ubuntu Security Notice 1199-1 - A flaw was discovered in the byterange filter in Apache. A remote attacker could exploit this to cause a denial of service via resource exhaustion.
cef3d693fcffc7191f3c28c86664259bbdec3631aeb9935fbdd7c0d9e012da89
Red Hat Security Advisory 2011-1247-01 - The rsyslog packages provide an enhanced, multi-threaded syslog daemon that supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine grained output format control. A two byte buffer overflow flaw was found in the rsyslog daemon's parseLegacySyslogMsg function. An attacker able to submit log messages to rsyslogd could use this flaw to crash the daemon. All rsyslog users should upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, the rsyslog daemon will be restarted automatically.
32ee5a6363396d220abfb7a2aa15b03178f36efd87ad0d23da3a748135e149dd
Olonet suffers from a remote SQL injection vulnerability.
89caddbae4294349223589ba3a872c8f48a27b0d8ad57fd0ffeb129d6a74df6a