Debian Essential And Critical Security Patch Updates - Page 286
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Dan Jacobson noticed a problem in noffle, that leads to a segmentation fault. It is not yet clear whether this problem is exploitable.
The KDE team discovered several vulnerabilities in the K DesktopEnvironment. In some instances KDE fails to properly quote parametersof instructions passed to a command shell for execution.
The KDE team discovered several vulnerabilities in the K DesktopEnvironment. In some instances KDE fails to properly quote parametersof instructions passed to a command shell for execution.
The KDE team discovered several vulnerabilities in the K DesktopEnvironment. In some instances KDE fails to properly quote parametersof instructions passed to a command shell for execution.
The KDE team discovered several vulnerabilities in the K Desktop Environment.
The KDE team discovered several vulnerabilities in the K Desktop Environment.
The KDE team discovered several vulnerabilities in the K Desktop Environment.
The KDE team discovered several vulnerabilities in the K Desktop Environment.
By carefully crafting such data an attacker might be able to execute arbitary commands on a vulnerable sytem using the victim's account and privileges.
By carefully crafting such data an attacker might be able to execute arbitary commands on a vulnerable sytem using the victim's account and privileges.
By carefully crafting such data an attacker might be able to execute arbitary commands on a vulnerable sytem using the victim's account and privileges.
On servers which are configured to allow anonymous read-only access, this bug could be used by anonymous users to gain write privileges.
Multiple vulnerabilities were discovered in the Common Unix Printing System (CUPS).
The Internet Software Consortium discoverd several vulnerabilities during an audit of the ISC DHCP Daemon.
Two vulnerabilities have been discovered in Bugzilla, a web-based bug tracking system, by its authors.
Using carefully crafted URLs a remote attacker is able to inject SQL code into SQL queries without proper user authentication.
Using carefully crafted URLs a remote attacker is able to inject SQL code into SQL queries without proper user authentication.
There are multiple vulnerabilities in libmcrypt including a buffer overflow and a memory leak.
The SuSE Security Team reviewed critical parts of openldap2 and found several buffer overflows and other bugs remote attackers could exploit to gain access on systems running vulnerable LDAP servers.
iDEFENSE discovered an integer overflow in the pdftops filter from the xpdf and xpdf-i packages that can be exploited to gain the privileges of the target user.