The JasPer project is an open source implementation for the JPEG-2000 codec. The library is affected by two heap-based buffer overflows which can lead to arbitrary code execution. The vulnerability is present in functions jpc_dec_cp_setfromcox() and jpc_dec_cp_setfromrgn(). A specially crafted jp2 file, can be used to trigger the overflows. Versions 1.900.1 and below are affected.
c95a0cf72de69ab82914ed27fc67d2c1c1a072016b41156b8ec7ce998588fc8d
PBBoard CMS version 3.0.1 (updated on 13/09/2014) and below suffer from multiple remote SQL injection vulnerabilities.
954dcbd38941392c4be47a9b097db9b20a4d8d3576e7832d5f789c15d577b1d0
In this paper, they authors present an implementation vulnerability found in some popular social login identity providers (including LinkedIn, Amazon and Mydigipass.com) and show how this vulnerability allowed them to impersonate users of third-party websites.
acd7f10d948ec0bd229808e6ce9cbdcb95ea98fae082067f187f1c0429619fbd
Debian Linux Security Advisory 3087-1 - Paolo Bonzini of Red Hat discovered that the blit region checks were insufficient in the Cirrus VGA emulator in qemu, a fast processor emulator. A privileged guest user could use this flaw to write into qemu address space on the host, potentially escalating their privileges to those of the qemu host process.
956182ac9fda7568c44f93e567600ed8d3ef701ad842d87e818c196f511270c4
Red Hat Security Advisory 2014-1956-01 - The wpa_supplicant package contains an 802.1X Supplicant with support for WEP, WPA, WPA2, and various EAP authentication methods. It implements key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver. A command injection flaw was found in the way the wpa_cli utility executed action scripts. If wpa_cli was run in daemon mode to execute an action script, and wpa_supplicant was configured to connect to a P2P group, malicious P2P group parameters could cause wpa_cli to execute arbitrary code.
b933e9611731ac1432b26aaa5d1d25378751279fdd0e0f3c9dcace24d5ce5efa
Red Hat Security Advisory 2014-1955-01 - The wget package provides the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols. A flaw was found in the way Wget handled symbolic links. A malicious FTP server could allow Wget running in the mirror mode to write an arbitrary file to a location writable to by the user running Wget, possibly leading to code execution. Note: This update changes the default value of the --retr-symlinks option. The file symbolic links are now traversed by default and pointed-to files are retrieved rather than creating a symbolic link locally.
51853f68b06bfa1f86977edb0079f1e01780dd7b24d5ce3fd6a4d15a80a28a6b
Debian Linux Security Advisory 3086-1 - Several vulnerabilities have been discovered in tcpdump, a command-line network traffic analyzer. These vulnerabilities might result in denial of service, leaking sensitive information from memory or, potentially, execution of arbitrary code.
4d690b880773980ed5d17e7ca82373ea26fc5b1f0b5c4659b5fb394b07206cb1
Ubuntu Security Notice 2431-2 - USN-2431-1 fixed vulnerabilities in mod_wsgi. The security update exposed an issue in the MAAS package, causing a regression. This update fixes the problem. It was discovered that mod_wsgi incorrectly handled errors when setting up the working directory and group access rights. A malicious application could possibly use this issue to cause a local privilege escalation when using daemon mode. Various other issues were also addressed.
8965efe46f7ab5e031a18546d5a1f330bfad140ccdcf5b123b25ef1469b7ea4b
Red Hat Security Advisory 2014-1959-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the permission checks performed by the Linux kernel when a netlink message was received were not sufficient. A local, unprivileged user could potentially bypass these restrictions by passing a netlink socket as stdout or stderr to a more privileged process and altering the output of this process.
558c97152fbc0d90c60cb871528b45beabb58fbd3332fc557296a8a5d14e81c1
Debian Linux Security Advisory 3090-1 - Multiple security issues have been found in Iceweasel, Debian's version overflows, use-after-frees and other implementation errors may lead to the execution of arbitrary code, the bypass of security restrictions or denial of service.
3f2e6244a591365ffae33709bcbb25d419ac8896a0f7bb28979a2bba6c2e346f
Debian Linux Security Advisory 3089-1 - Josh Duart of the Google Security Team discovered heap-based buffer overflow flaws in JasPer, a library for manipulating JPEG-2000 files, which could lead to denial of service (application crash) or the execution of arbitrary code.
20623bb1355cfeeecc681619a3c49905521dc671d736f46bcbfeadecbcd08088
Ubuntu Security Notice 2433-1 - Steffen Bauch discovered that tcpdump incorrectly handled printing OSLR packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code. Steffen Bauch discovered that tcpdump incorrectly handled printing GeoNet packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only applied to Ubuntu 14.04 LTS and Ubuntu 14.10. Various other issues were also addressed.
779744583ffb14e8dcad9404a2e695903e983a3de2b23a0e531e69e6fdd18d14
Debian Linux Security Advisory 3088-1 - Paolo Bonzini of Red Hat discovered that the blit region checks were insufficient in the Cirrus VGA emulator in qemu-kvm, a full virtualization solution on x86 hardware. A privileged guest user could use this flaw to write into qemu address space on the host, potentially escalating their privileges to those of the qemu host process.
6d51c9785cd285e16b0e7f4bd78da7adb9790d24a60222ae3d8f03e864e15afe
Ubuntu Security Notice 2432-1 - Siddhesh Poyarekar discovered that the GNU C Library incorrectly handled certain multibyte characters when using the iconv function. An attacker could possibly use this issue to cause applications to crash, resulting in a denial of service. This issue only affected Ubuntu 10.04 LTS and Ubuntu 12.04 LTS. Adhemerval Zanella Netto discovered that the GNU C Library incorrectly handled certain multibyte characters when using the iconv function. An attacker could possibly use this issue to cause applications to crash, resulting in a denial of service. Various other issues were also addressed.
ee9a58bff9d011d6367f3b45438ca35803c8316ec24d9da327b4cbbe7f9d4442
Apple Security Advisory 2014-12-3-1 - Safari 8.0.1, Safari 7.1.1, and Safari 6.2.1 are now available and address cross-origin CSS loading and multiple memory handling vulnerabilities.
6a5ce12d6de2f367ba6ec9a2bc2e6ece4ae247bd397f9e2327cc5c6e8ccf3b8f
This is a whitepaper that goes into detail on the functionality and usage of nmap for portscanning.
cffff0e67f22659f5d7c00d6e26d36df6b0e18bf9774586955949bbb52a0ced4
Whitepaper called How to Bypass SafeSEH and Stack Cookie Protection. Written in Turkish.
e050272b732f5a854bc507f634721ef4c4a1a90ef89177a48991c3eb78e4209f
Advertise With Pleasure! (AWP) versions 6.6 and below suffer from a remote SQL injection vulnerability.
72e4a5d89d9aa977743f9d3d6058c78f79f302c29bdd64e87d4ed980c34f854f
Cart66 Lite WordPress Ecommerce version 1.5.1.17 suffers from a remote blind SQL injection vulnerability.
4fb05eedaa532058269bb78223e35bd39148a0c67cf0e6bb0632b20abde31ce7
Google Document Embedder version 2.5.16 suffers from a mysql_real_escape_string bypass SQL injection vulnerability.
087cee08975e4af001863f3fcbd05f44b7c3a9b20100ba060bae9baa8d04ac88