Ubuntu Security Notice 1223-1 - It was discovered that Puppet unsafely opened files when the k5login type is used to manage files. A local attacker could exploit this to overwrite arbitrary files which could be used to escalate privileges. Ricky Zhou discovered that Puppet did not drop privileges when creating SSH authorized_keys files. A local attacker could exploit this to overwrite arbitrary files as root. It was discovered that Puppet used a predictable filename when using the --edit resource. A local attacker could exploit this to edit arbitrary files or run arbitrary code as the user invoking the program, typically root. Various other issues were also addressed.
497e361c82045de9381e8033c477a734
FreeBSD UIPC socket heap overflow proof of concept exploit that causes a kernel panic. Tested on FreeBSD 8.2-RELEASE.
392d5e1fab7ef40059a4391fcc8e1c05b6f410d6413606f432dc4a27dfea91ba
WordPress WP Bannerize plugin versions 2.8.7 and below suffer from a remote SQL injection vulnerability.
a26b0dca0637bc62e31984202474e89d76a0405cc815d0be29c6c8a663c69398
Marinet CMS suffers from a remote blind SQL injection vulnerability.
92b2fcd576ac3cbf000b8a557f0a106d54b80e44a9a57734d3090989552636dd
Whitepaper called Busting Windows in Backtrack 5 R1 with Metasploit Framework 4.0.
b17b3bde70b97dae75d3386c74f74dbd0087c578cc9036544d4919bdf1d6204e
Ubuntu Security Notice 1222-1 - Firefox could be made to crash or possibly run programs as your login if it opened a malicious website. Benjamin Smedberg, Bob Clary, Jesse Ruderman, Bob Clary, Andrew McCreight, Andreas Gal, Gary Kwong, Igor Bukanov, Jason Orendorff, Jesse Ruderman, and Marcia Knous discovered multiple memory vulnerabilities in the browser rendering engine. An attacker could use these to possibly execute arbitrary code with the privileges of the user invoking Firefox. Boris Zbarsky discovered that a frame named "location" could shadow the window.location object unless a script in a page grabbed a reference to the true object before the frame was created. This is in violation of the Same Origin Policy. A malicious website could possibly use this to access another website or the local file system. Various other issues were also addressed.
d1fc7d9a5520c3ff7a7143e625e8f9b84dd695c464b3380d4c19e9e3d5cb3e64
Ubuntu Security Notice 1221-1 - It was discovered that mutt incorrectly verified the hostname in an SSL certificate. An attacker could trick mutt into trusting a rogue SMTPS, IMAPS, or POP3S server's certificate, which was signed by a trusted certificate authority, to perform a man-in-the-middle attack.
d5327d7489e79d924d92a0d60f8d9238e3cf7793305156d14665eb648ca81fec
Sites by Design Associates suffer from a remote SQL injection vulnerability.
ac1c5d2914eaa98ea747512d8ee2e1c1f95cd90e09a9b0f2fb8ea74032d5b7c9
Sites by MNS.it (Media and Net) suffer from a remote SQL injection vulnerability.
733e6ac7d7c04e8ffd7ee6cd3336ca3183e25ece10b8b6315279c15a87c6b01e
This report gives general recommendations as to how to configure SSL/TLS in order to provide state of the art authentication and encryption. The options offered by SSL engines grew from the early days since Netscape developed SSL2.0. The introduction of TLS made matters more challenging as servers and clients offer different sets of available options depending on which SSL engine (OpenSSL, NSS, SCHANNEL, etc.) they use. Finding the middle ground has proven difficult especially as the supported protocols and cipher suites are mostly not documented. To make matters more complicated Browsers may not use all functionality offered by the SSL stack, this report will only list functionality used by current Browsers. This report provides an overview of the currently available TLS options across Servers and Clients and allows you to offer support for a wide variety of Browsers an offer "good enough" security.
afe6f4a0ab4ce26e52bdcf64e8ae768dd81416309332ac0a348749bb8aaf5074
Secunia Security Advisory - Fedora has issued an update for Django. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose certain system information, manipulate certain data, conduct cache poisoning attacks, and cause a DoS (Denial of Service).
98711881afded92a4992b00730d14a1d2717b01ba063de97344eb5d5c0f67c84
Secunia Security Advisory - A vulnerability has been reported in the T3BLOG extension for TYPO3, which can be exploited by malicious people to conduct cross-site scripting attacks.
0127e5b17d81c1710eea0ee8e0125f08b13b4e2baba1bccb2fc3cc884dcbdd2e
Secunia Security Advisory - A vulnerability has been reported in Cisco Unified Communications Manager, which can be exploited by malicious people to cause a DoS (Denial of Service).
7d51385f7a6b867c1d44649de4ea6f8a27dd8bf5bc510b829ddd4d2d6d5f9dc4
Secunia Security Advisory - A vulnerability has been reported in Cisco Jabber Extensible Communications Platform (Jabber XCP), which can be exploited by malicious people to cause a DoS (Denial of Service).
73e5622f6500fc60786e9da0d2f01179ea18ab9ccf1fc217bf11d44d7050930f
Secunia Security Advisory - Ubuntu has issued an update for thunderbird. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.
85bd84c1ee3691798ca8ee40732c9454746a61a8b42142c9304767fefa032e33
Secunia Security Advisory - A vulnerability has been reported in Cisco Unified Presence, which can be exploited by malicious people to cause a DoS (Denial of Service).
bdd3a931a89602cb2bb231fb348980c5cee1d1c2fa7ce8843dfa85dbf1d75c57
Secunia Security Advisory - Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service).
5deab5ee419e1e34f8343175b9735c9b1200aa25b28d55f2cd8360b11c02976d