AVG Remote Administration version 13.0.0.2892 suffers from authentication bypass, remote code execution, missing entity authentication, and use of static encryption key vulnerabilities.
ceb5d04708b6157050ac25449b0b9e11964628e323bd6dc10d4cab4e2224dd97
RedTeam Pentesting discovered an information disclosure vulnerability in OrbiTeam's BSCW collaboration software. An unauthenticated attacker can disclose metadata about internal objects which are stored in BSCW. Versions 5.0.7 and below are affected.
e0f660572f84c74eb890b10b761c3a1cf4c4bc6d50e313b9c433d650c7357df1
VM Turbo Operations Manager version 4.5.x suffers from a directory traversal vulnerability.
6867fe8f56ce9106aae72c2e15cb5ae941497b017368ba4f683eb31f8d8d2f21
HP Security Bulletin HPSBMU02935 3 - Potential security vulnerabilities have been identified with HP LoadRunner Virtual User Generator. The vulnerabilities could be exploited to allow remote code execution and disclosure of information. Revision 3 of this advisory.
bfba7ce6c6917e40b8047472aad88c43a8e3fe407f35822281f3d1cebd4d38e5
Red Hat Security Advisory 2014-0477-01 - Oracle Java SE development and runtime software packages will be removed from the Red Hat Enterprise Linux Supplementary media and RHN channels. These packages will be relocated to a new set of channels that are dedicated to delivering Oracle Java software. Customers are advised to reconfigure their systems to use the new channels to ensure that they are receiving the latest updates to Oracle Java software. Oracle Java software packages will be removed from Red Hat Enterprise Linux Supplementary media and RHN channels on May 8, 2014. Oracle Java will be available for online download via the new RHN channels.
0f2f3f93ba7fa2bfd4319dbc98bd646a3fcff6305cefe74ab52835e9683c200a
Red Hat Security Advisory 2014-0476-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A buffer overflow flaw was found in the way the qeth_snmp_command() function in the Linux kernel's QETH network device driver implementation handled SNMP IOCTL requests with an out-of-bounds length. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. A flaw was found in the way the Linux kernel's Adaptec RAID controller checked permissions of compat IOCTLs. A local attacker could use this flaw to bypass intended security restrictions.
9f8cfd3ecd56c7f75c28a03d7928d9e6b483e023a407fb82e78912301cbd97c3
Red Hat Security Advisory 2014-0475-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel's netfilter connection tracking implementation for Datagram Congestion Control Protocol packets used the skb_header_pointer() function. A remote attacker could use this flaw to send a specially crafted DCCP packet to crash the system or, potentially, escalate their privileges on the system. A flaw was found in the way the Linux kernel's Adaptec RAID controller checked permissions of compat IOCTLs. A local attacker could use this flaw to bypass intended security restrictions.
d11f1789310cad87908144e149842aaeeb43c7ec9cbc6c39580ed4aa67644a5c
Ubuntu Security Notice 2209-1 - It was discovered that libvirt incorrectly handled symlinks when using the LXC driver. An attacker could possibly use this issue to delete host devices, create arbitrary nodes, and shutdown or power off the host. Marian Krcmarik discovered that libvirt incorrectly handled seamless SPICE migrations. An attacker could possibly use this issue to cause a denial of service. Various other issues were also addressed.
8939815c2944317f51d9cd1820cc2d58ddf2132fb2a7e08c06d91e8d4d7d1a0a
Debian Linux Security Advisory 2925-1 - Phillip Hallam-Baker discovered that window property values could be queried in rxvt-unicode, resulting in the potential execution of arbitrary commands.
e147a9a3c73f73ff8f86e3fb55e725719b80cc3ccde7c5d170dfe92148972078
Ubuntu Security Notice 2210-1 - Sebastian Krahmer discovered that cups-browsed incorrectly filtered remote printer names and strings. A remote attacker could use this issue to possibly execute arbitrary commands. Johannes Meixner discovered that cups-browsed ignored invalid BrowseAllow directives. This could cause it to accept browse packets from all hosts, contrary to intended configuration.
0b16105b8b33ff36b1db4a057326e8023261374b25d506af1b6b9ac1eb4aa6c5
Mandriva Linux Security Advisory 2014-083 - Login CSRF issue in MediaWiki before 1.22.5 in Special:ChangePassword, whereby a user can be logged into an attackers account without being aware of it, allowing the attacker to track the user's activity. XSS vulnerability in MediaWiki before 1.22.6, where if the default sort key is set to a string containing a script, the script will be executed when the page is viewed using the info action. MediaWiki has been updated to version 1.22.6, fixing this and other issues.
5a6c7bc4a4b122fb358c0ade3b8277baa7f5e4453ec69320728a2f11b9ceabbf
Mandriva Linux Security Advisory 2014-082 - Jakub Wilk discovered that temporary files were insecurely created (via mktemp()) in the IptcImagePlugin.py, Image.py, JpegImagePlugin.py, and EpsImagePlugin.py files of Python Imaging Library. A local attacker could use this flaw to perform a symbolic link attack to modify an arbitrary file accessible to the user running an application that uses the Python Imaging Library. Jakub Wilk discovered that temporary files created in the JpegImagePlugin.py and EpsImagePlugin.py files of the Python Imaging Library were passed to an external process. These could be viewed on the command line, allowing an attacker to obtain the name and possibly perform symbolic link attacks, allowing them to modify an arbitrary file accessible to the user running an application that uses the Python Imaging Library.
20074e33fc3fe22b282a72195ec6dbdd6404e404e77e25da3bade5c67a1b51ae
Mandriva Linux Security Advisory 2014-080 - A null pointer dereference bug in OpenSSL 1.0.1g and earlier in so_ssl3_write() could possibly allow an attacker to cause generate an SSL alert which would cause OpenSSL to crash, resulting in a denial of service.
b9ee5e54aed8abf274affc4d1458419a6b1b09e7eb5a2ed031d7dbe6a4799a14
Mandriva Linux Security Advisory 2014-081 - Martin Holst Swende discovered a flaw in the way mod_security handled chunked requests. A remote attacker could use this flaw to bypass intended mod_security restrictions, allowing them to send requests containing content that should have been removed by mod_security.
33a877d1162e50e7aa29807e7ffd1e6c026c203d59f9ccd296a439d912e03154
Openfiler version 2.99.1 suffers from multiple persistent cross site scripting vulnerabilities.
c690ccedae1c74a42f999bf09b3b8e0b27e3f56ff4ca39f4cc4ee3d3b9e2d937
Openfiler version 2.99.1 suffers from a remote arbitrary code execution vulnerability.
f39eaef0643faa98d3ea0b5cbd3b47b64d2654876e82be326b67d25a90209d9f
Collabtive version 1.12 suffers from a remote SQL injection vulnerability.
23b430229e0bd82a0650c317d93f8650db871e9c49ef9fbd09dfe4dc15d19e99
GOM Player version 2.2.57.5189 suffers from a memory corruption vulnerability.
dfa5ffc08ce3ba5b6107594f21b73725d321cebcef7699a6b77983be79668e48
Cobbler versions 2.4.x through 2.6.x suffer from a local file inclusion vulnerability.
2e95e8c1d7b784a8a867b18e9c0497e669454dba4841fb5be6e965abdc4b7b32
CMS Touch version 2.01 suffers from remote SQL injection and cross site scripting vulnerabilities. Note that this finding houses site-specific data.
c655b6f45eb784269e8b7fa2be84b760ebc6980d5e6c56eeba90e163b5294d09
Enquete yS version 1.0 suffers from a remote SQL injection vulnerability.
c8d2e2d5d89b0d778cdf2b3e7843e7fbcf459acd5e151d5c728af63f22dce0a6