Gentoo Linux Security Advisory 201502-2 - Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code. Versions less than 11.2.202.442 are affected.
161a28d824679a10cb26a89058034ddfbab2a5f38bb3fae624e5f50e91a59513
WordPress Holding Pattern theme version 0.6 suffers from a remote shell upload vulnerability.
4503be5e6f6cad5fb8d27275f1d74553eea67b809e8d1c508e90a7b2d37b7114
EMC Captiva Capture releases a security fix to address sensitive information disclosure vulnerability where password of a SQL user for the InputAccel (IA) database may potentially be logged in plaintext within the DAL log files after the InputAccel Database (IADB) installation. Versions 7.0 and 7.1 are affected.
9c9819d594e47ef65f0e9771171a6a1915e74cbae99e6c1440655eb02228e934
Red Hat Security Advisory 2015-0140-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities are detailed in the Adobe Security Bulletin APSB15-04 listed in the References section. Multiple flaws were found in the way flash-plugin displayed certain SWF content. An attacker could use these flaws to create a specially crafted SWF file that would cause flash-plugin to crash or, potentially, execute arbitrary code when the victim loaded a page containing the malicious SWF content.
00e4c57be048c3984d26fb81bf81ebd3e574148d5f09cd709fd55fc51ccf9870
Gentoo Linux Security Advisory 201502-1 - A vulnerability has been found in mpg123, which could result in arbitrary code execution. Versions less than 1.18.1 are affected.
eef975830d2491b2d427e2b661a86261ba9c42afe4f97529246a50eb128e11e0
dirs3arch is a simple command line tool designed to brute force the discovery of directories and files in websites.
e63196b74351b6abbf4bf01e9e844dba18cdf4286d747b7b8f89ff9dbcdef354
The e2fsprogs package is a set of open source utilities for ext2, ext3 and ext4 filesytems. The libext2fs library, part of e2fsprogs and utilized by its utilities, is affected by a boundary check error on block group descriptor information, leading to a heap based buffer overflow. A specially crafted filesystem image can be used to trigger the vulnerability. Versions prior to 1.42.12 are affected.
f36fd29dba36b61b27140d5e0db103cf8b564838924976443f54919358a022f8
The WhatsApp iOS application appears to suffer from a buffer overflow condition when receiving a malicious location message.
c8cbbfa784fa9dc86d64bfc86141fcad9c0be3d44088932960751c9fa3ec7913
SEARCH-LAB Ltd. discovered a serious security vulnerability in the On Screen Phone protocol used by LG Smart Phones. A malicious attacker is able to bypass the authentication phase of the network communication, and thus establish a connection to the On Screen Phone application without the owner's knowledge or consent. suffers from a bypass vulnerability.
6c5f9b3a483b2488fd33286b1d8b13298108615893ce571ef447baedf300e177