Secunia Security Advisory - SUSE had released an update for mariadb. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
1f577e8496390fbe5233d121f131288cc988757163001a4b52481c372819efa3
GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.
5a3f99d43688d818995fcbb02f31c1a995d47379b8b81fa12708c6b3e47823d2
HP Security Bulletin HPSBOV02833 SSRT101043 - Potential security vulnerabilities have been identified in Java Runtime Environment (JRE) and Java Developer Kit (JDK) running on OpenVMS Integrity Servers. These vulnerabilities could allow remote unauthorized access, disclosure of information, and other exploits. Revision 1 of this advisory.
67fab78b1e2f733577923b7a2d7943654d0b5fd4af2e8843287d1be1685a0b77
Ettercap versions 0.7.5.1, 0.7.5, and 0.7.4 and below suffer from a stack overflow vulnerability. Version 0.7.4.1 is not affected.
441cfdeb1206f31b83110efd5e60a48cc510f71789d13efdc3787ca345080ca6
The Foxit Reader plugin for Firefox suffers from an overly long query string remote stack buffer overflow vulnerability in npFoxitReaderPlugin.dll. Versions 5.4.4.1128 and below are affected.
6a542e992542383195aaa18e60759b3a2bfb1211b67ab8744bdec617dbce8df3
The LoginActivity of the Facebook for Android application has an improper intent handling flaw that allows for malicious Android applications to perform private file theft. Version 1.8.2 was released to address this vulnerability.
bfd6840f9cf9dfaa8007ee516aa404c4986914448f276af4a47c918238fb498d
Symbolic links can be used for spoofing Content-Type of local files and this enables malicious Android applications the ability to steal Chrome's cookie file. Version 18.0.1025308 was released to address this vulnerability.
20dd3d870f049909a9ad1c797062381c1dafee9065f6baad9f3348dc65d0e398
Chrome for Android's Same-Origin Policy for local files (file: URI) can be bypassed by using symbolic links. It results in theft of Chrome's private files by malicious Android applications. Version 18.0.1025308 was released to address this vulnerability.
31b4f82055384f1f95a84986da35e99a7077219bca1316b3a7026760d9c6556a
The Nuit Du Hack Call For Papers has been announced. It will be held June 22nd, 2013 at the Disneyland Paris Conference Centre.
2db234b3fad1226b1e44f8f4e233e8ee8ef993f2b031c5d51cff148c0b5b3167
By abusing Java objects exposed to JavaScript, malicious web pages can execute arbitrary commands on Chrome for Android, if the accessibility setting of the device is enabled. Version 18.0.1025308 was released to address this vulnerability.
95e692ac40350a557feb45c1ae2225015502f27f4e789618b992e21f7de06b96
Chrome for Android suffers from an issue where a malicious application has the ability to steal private information. Version 18.0.1025308 was released to address this vulnerability.
d32b410ecbaee0bf30696c5cc4ecfbba670e0931bde59217b08a9f1e54df5589
Gentoo Linux Security Advisory 201301-1 - Multiple vulnerabilities have been found in Mozilla Firefox, Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may allow execution of arbitrary code or local privilege escalation. Versions less than 10.0.11 are affected.
741702614c26339e63b97a9b8ab9a9381edca7bbd021557829522edcdfbddb9c
Red Hat Security Advisory 2013-0141-01 - JBoss Enterprise Portal Platform is the open source implementation of the Java EE suite of services and Portal services running atop JBoss Enterprise Application Platform. It comprises a set of offerings for enterprise customers who are looking for pre-configured profiles of JBoss Enterprise Middleware components that have been tested and certified together to provide an integrated experience. Multiple reflected cross-site scripting flaws were found in GateIn Portal. If a remote attacker could trick a user, who was logged into the GateIn Portal interface, into visiting a specially-crafted URL, it would lead to arbitrary web script execution in the context of the user's GateIn Portal session.
dd8b8eebab027cc88f0d34936c9de553d9a2da9de3741d89e5b7be8c91fd7df0