Mandriva Linux Security Advisory 2013-173 - If a filename which contains a newline character is committed to a repository using the FSFS format, the resulting revision is corrupt. This can lead to disruption for users of the repository. Subversion's svnserve server process may exit when an incoming TCP connection is closed early in the connection process. This can lead to disruption for users of the server. This advisory provides the latest versions of subversion which is not vulnerable to these issues.
50c8c44f1eab2d1796f92a255fc5042d9727bfb18f38fae6d72dab763b883643
Debian Linux Security Advisory 2707-1 - Alexandru Cornea discovered a vulnerability in libdbus caused by an implementation bug in _dbus_printf_string_upper_bound(). This vulnerability can be exploited by a local user to crash system services that use libdbus, causing denial of service. Depending on the dbus services running, it could lead to complete system crash.
fb5bad9b488ef75a4798c0f7f03287659999cfefa71cf20cbca6fc3ee8f108ec
The NextGEN Gallery WordPress plugin version 1.9.12 suffers from a remote shell upload vulnerability.
e4da0456940eac980ba66f39ac8327f978be1d3372621aac3b5a422f93502487
Deserialization of a maliciously crafted Apache OpenJPA object can result in an executable file being written to the file system. An attacker needs to discover an unprotected server program to exploit the vulnerability. It then needs to exploit another unprotected server program to execute the file and gain access to the system. OpenJPA usage by itself does not introduce the vulnerability.
32303c32cb83248176a31128df26e37e6c705dd40e339118c8a2a427536a4fa1
WordPress version 3.5.1 suffers from a denial of service vulnerability.
8e2c088a4ade7372a68b67aa23ce8a75e4e2b2019ed85bb2c3c7ff84c7f61988
TP-LINK TL-SC3171 IP cameras suffer from an authentication bypass vulnerability.
f6d178a063dd3ed0597d4ff68aeb5b7ce510edc4d8a50b381af599f1db6c358c
Sony CH and DH series IP cameras suffer from a cross site request forgery vulnerability.
9e658a5b83d50db1e5e4c948a459169998ff90278655f84b9593726e88a23faa
Samsung Series IP cameras suffer from a cross site scripting vulnerability.
4c5b582e1c83bbe4a08f2d523174e2ff9cc7fe524dff9b42bca797c55f903609
Grandstream Series IP cameras suffer from backdoor, cross site request forgery, and cross site scripting vulnerabilities.
c0ee4c59497c448a83542eeb8df6d6ae710b3a6d5d8f377a64d34ef028d08d25
Brickcom 100ap Series IP cameras suffer from authentication bypass and cross site request forgery vulnerabilities.
d7701a35ff508516595ba457e8080c4cc4d6d2153918179e97536a7ee0671226
AXIS Media Control suffers from an ActiveX file corruption vulnerability. The vulnerability exists due to the ActiveX control including insecure "StartRecord()", "SaveCurrentIm age()" and "StartRecordMedia()" methods in "AxisMediaControlEmb.dll" DLL. This can be exploited to corrupt or create arbitrary files in the context of the current user.
2c7f0f9dc413f306ab4175eaf1c5a26e6f9f46c26e980683a1c746fe13d1344a
Airlive IP cameras suffers from information disclosure, clear text storage of sensitive information, cross site request forgery, denial of service, and path traversal vulnerabilities.
8baad92f7fdb0f5d591127fce7424949455fbfbf4e26902a240495904f81868f
PHP Secure Communications Library is a set of pure PHP implementations of DES, 3DES, RC4, Rijndael, AES, RSA (PKCS#1 compliant [v2.1]), SSH-1, SSH-2, and SFTP.
810e7c0f6802c95bb2891c4d7239b4781d0dccd2f5d6b8ee3a87c09f0d9bae08
This Metasploit module exploits a flaw in the Web Start component of the Sun Java Runtime Environment. Parameters intial-heap-size and max-heap-size in a JNLP file can contain a double quote which is not properly sanitized when creating the command line for javaw.exe. This allows the injection of the -XXaltjvm option to load a jvm.dll from a remote UNC path into the java process. Thus an attacker can execute arbitrary code in the context of a browser user. This flaw was fixed in Oct. 2012 and affects JRE <= 1.6.35 and <= 1.7.07. In order for this module to work, it must be ran as root on a server that does not serve SMB. Additionally, the target host must have the WebClient service (WebDAV Mini-Redirector) enabled. Alternatively an UNC path containing a jvm.dll can be specified with an own SMB server.
03e81d85cf7b77c63f98b9875e24d7c92e3dd03261f33f78773cc25fedd945f5
This Metasploit module exploits an integer overflow vulnerability on Internet Explorer. The vulnerability exists in the handling of the dashstyle.array length for vml shapes on the vgx.dll module. This Metasploit module has been tested successfully on Windows 7 SP1 with IE8. It uses the the JRE6 to bypass ASLR by default. In addition a target to use an info leak to disclose the ntdll.dll base address is provided. This target requires ntdll.dll v6.1.7601.17514 (the default dll version on a fresh Windows 7 SP1 installation) or ntdll.dll v6.1.7601.17725 (version installed after apply MS12-001).
f2191edac3137a6b3823d086c1f17193130422c73f5e897f52c93a6ab9e66486