Cisco Security Advisory - Cisco Prime Central for Hosted Collaboration Solution (HCS) Assurance contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. Exploitation of this vulnerability could interrupt the monitoring of voice services. Cisco has released free software updates that address this vulnerability.
e8692d8dda3a665c7dd9de2f03a19590613ddcdb2a9380e15c20c121a14f0f14
Cisco Security Advisory - Cisco Unified Presence Server (CUPS) contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. Cisco has released free software updates that address this vulnerability. A workaround is available to mitigate this vulnerability.
ded8e06b112e526831baf871d743d44d2c103cdf2681b8cd24634286b21672da
Ubuntu Security Notice 1753-1 - Sebastian Krahmer and Bastien Nocera discovered that DBus-GLib did not properly validate the message sender when the "NameOwnerChanged" signal was received. A local attacker could possibly use this issue to escalate their privileges.
9ce1ac4e5f067377afdafd7442b6e3c1e4f0943a1f5f93e3180598e214b52378
Debian Linux Security Advisory 2633-1 - Helmut Grohne discovered multiple privilege escalation flaws in FusionForge, a web-based project-management and collaboration software. Most of the vulnerabilities are related to the bad handling of privileged operations on user-controlled files or directories.
887259b32ee22a9f8e0e8da18d4e9a19414ef7433786583622bc92c771b98ed4
Debian Linux Security Advisory 2634-1 - Several vulnerabilities have been discovered in python-django, a high-level python web development framework.
8377d247b2330890d79f474d182321f1f3ac22f1b48dd7ed09f05e3891683554
Drupal Creative Theme third party theme version 7.x suffers from a cross site scripting vulnerability.
7bd2d548ef1246483a1fd41308d4a1e69523c2b176e17fc4f0b8011557748495
Drupal Fresh Theme third party theme version 7.x suffers from a cross site scripting vulnerability.
e3de67fa58d409a4f1ed295ca09c1ef3fd1d3ad772b98508639e2367e7725fef
Joomla! versions 3.0.2 and below suffer from a PHP object injection vulnerability in highlight.php.
b92a59cc11acf090199faddc39dc367a4ca15c89eb182aeebe087497a2bb2b43
Ubuntu Security Notice 1752-1 - Nadhem Alfardan and Kenny Paterson discovered that the TLS protocol as used in GnuTLS was vulnerable to a timing side-channel attack known as the "Lucky Thirteen" issue. A remote attacker could use this issue to perform plaintext-recovery attacks via analysis of timing data.
1cfa24fa1e2257b80843bb7496808728d5ace2f7a980167a435ad01d16cc82ea
Ubuntu Security Notice 1751-1 - Mathias Krause discovered a bounds checking error for netlink messages requesting SOCK_DIAG_BY_FAMILY. An unprivileged local user could exploit this flaw to crash the system or run programs as an administrator.
be2d43a9f5f1464ceb14a292a1fb9499c7f7c6dd60431ec4fe7bf9ee6b73c602
This whitepaper is the story of Silent Signal LLC sharing a case study on achieving remote user-level access on an AIX server.
ef219a1b45e5d89670ecbe8a2b660a4c77111ecc02a5108596fadb9bec7c4141
WordPress Comment Rating plugin version 2.9.32 suffers from vote limitation bypass and remote SQL injection vulnerabilities.
f3eff5dbde08320f1b9d6c19ee7a8ff2b8c4264d0143262e0b8d26506831ed4e
This whitepaper is the story of Silent Signal LLC sharing an experience of performing a client-side attack.
ac604eb1b18ace0ce59f47fbe848d4bb02d97b8fd31bc2e768bd586989f649d1
Red Hat Security Advisory 2013-0570-01 - Oracle Java SE 6 will no longer receive updates after February 28, 2013. The Oracle Java SE 6 packages on the Red Hat Enterprise Linux 5 and 6 Supplementary media and Red Hat Network channels will continue to be available after February 28, 2013.
4b23dec91c0294f5db6ca888ca2eda4fa491bd1b5db966987a7953f62d50fdba
Red Hat Security Advisory 2013-0569-01 - JBoss Enterprise SOA Platform is the next-generation ESB and business process automation infrastructure. JBoss Enterprise Portal Platform is the open source implementation of the Java EE suite of services and Portal services running atop JBoss Enterprise Application Platform. An attack technique was found against the W3C XML Encryption Standard when block ciphers were used in cipher-block chaining mode. A remote attacker could use this flaw to conduct chosen-ciphertext attacks, leading to the recovery of the entire plain text of a particular cryptogram by examining the differences between SOAP responses sent from JBoss Web Services.
2587795973b4187dc98f0e3534f371af6311704b4e1d0fe7f9329c9f572d2026
Gambas creates a directory in /tmp called gambas.UID where UID is the user id of the person running the software. Gambas does not check to see if a malicious user has already created that directory.
265512fa79bfac648de386e18f99ee937d26851f9df7995309f00539ecbf6106