Package: otrs2
Version: 2.0.4p01-17
Severity: normal
Tags: security
Hi,
According to CVE-2007-2524 :
| Cross-site scripting (XSS) vulnerability in index.pl in OTRS (Open
| Ticket Request System) 2.0.x allows remote attackers to inject
| arbitrary web script or HTML via the Subaction parameter i
Package: sun-java5
Version: 1.5.0-10-3
Severity: normal
Tags: security
Hi,
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102881-1
| A security vulnerability in Java Web Start may allow an untrusted
| application to elevate its privileges. For example, an application may
| grant itsel
Package: xine-ui
Severity: normal
Good day,
My understanding is that this CVE Candidate is buggy, but in case I have
missed something I prefer to let you know, just closed the bug if you
agree with me.
>From CVE-2007-0254 :
| Name: CVE-2007-0254
| Status: Candidate
| URL: http://cve.mitre.org/
Package: totem-mozilla
Version: 2.16.4-2
Severity: critical
Justification: breaks the whole system
Hi,
This morning I wanted to see how the new Apple IPhone looks like, so I
pointed my iceweasel to :
http://files.macbidouille.com/news/200701/iPhone_H264.mov
this give me the error :
You do not
Package: thunderbird
Severity: normal
Tags: security
Good day,
CVE-2006-0836 :
| Mozilla Thunderbird 1.5 allows user-complicit attackers to cause an
| unspecified denial of service by tricking the user into importing an
| LDIF file with a long field into the address book, as demonstrated by a
Package: php5-curl
Severity: normal
Tags: security patch
Good day,
CVE-2006-2563 :
| The cURL library (libcurl) in PHP 4.4.2 and 5.1.4 allows attackers to
| bypass safe mode and read files via a
| file:// request containing null characters.
More info (and an exploit) is available from :
htt
Package: php4-curl
Severity: normal
Tags: security patch
Good day,
CVE-2006-2563 :
| The cURL library (libcurl) in PHP 4.4.2 and 5.1.4 allows attackers to
| bypass safe mode and read files via a
| file:// request containing null characters.
More info (and an exploit) is available from :
http
Package: netpanzer
Severity: normal
Tags: security
Good day,
CVE-2006-2575 :
| The setFrame function in Lib/2D/Surface.hpp for NetPanzer 0.8 and
| earlier allows remote attackers to cause a
| denial of service (crash) via a client flag (frameNum) that is greater
| than 41, which triggers an ass
Package: nuauth
Version: 1.0.16-1
Severity: normal
Tags: security
Good day,
Quoting http://www.nufw.org/+NuFW-1-21-minor-security-fix+.html :
| This release fixes an issue related to a misuse of GnuTLS. An
| authenticated user using a specially modified client could by generating
| a lot of ne
Package: stlport5
Version: 5.0.0-1.1
Severity: normal
Tags: security
Good day,
>From CVE-2006-0963 :
| Multiple buffer overflows in STLport 5.0.2 might allow local users to
| execute arbitrary code via (1) long locale environment variables to a
| strcpy function call in c_locale_glibc2.c and
Package: bind9
Severity: normal
Tags: security
Good day,
> From CVE-2006-0987 :
> The default configuration of ISC BIND, when configured as a caching
> name server, allows recursive queries and provides additional
> delegation information to arbitrary IP addresses, which allows remote
> att
Package: bind
Version: 1:8.4.6-1
Severity: normal
Good day,
>From CVE-2006-0987 :
> The default configuration of ISC BIND, when configured as a caching
> name server, allows recursive queries and provides additional
> delegation information to arbitrary IP addresses, which allows remote
> a
Package: sysstat
Version: 5.0.6-4
Severity: minor
Tags: patch
Good day,
I have notice that /etc/init.d/systat doesn't use the test program to
check $ENABLE :
if "$ENABLED" = "true" ; then
This is ok if $ENABLE is set to true or false but if (like me) you put
accidentaly "yes" in $ENABLE then
Package: uim
Severity: normal
Good day,
>From CAN-2005-0503 :
| uim before 0.4.5.1 trusts certain environment variables when libUIM is used in
| setuid or setgid applications, which allows local users to gain privileges.
This have been fixed in uim 0.4.5.1
More info is available here :
http
Package: xerces25
Severity: normal
Good day,
>From [CAN-2004-1575] :
| The XML parser in Xerces-C++ 2.5.0 allows remote attackers to cause a
| denial of service (CPU consumption) via XML attributes in a crafted
| XML document.
This problem have been fixed in version 2.6 of Xerces.
It's not cl
15 matches
Mail list logo