Cobbler versions 2.6.0 and below suffer from an arbitrary file read vulnerability.
497ed8c35ababfe7320d0530b3d28ddb9cfc0de530e9750bb755847db44423a6
Fog Imaging System versions 0.27 through 0.32 suffer from multiple cross site scripting vulnerabilities.
915706d7b046335ae51e5e17cfc44ac0056bd0549bdac97179ccad71b512fddd
HP Security Bulletin HPSBMU03022 2 - A potential security vulnerability has been identified with HP Systems Insight Management (SIM) bundled software running OpenSSL. This is the OpenSSL vulnerability known as "Heartbleed" which could be exploited remotely resulting in disclosure of information. The HP SIM software itself is not vulnerable to CVE-2014-0160 ("Heartbleed"). However, the software components bundled with HP SIM are impacted and should be addressed if installed. Revision 2 of this advisory.
f8fd34ad3bcea67bfeb86d0cdbcfcd93cb274574359e6f9c9d3a3b2bf2a001d5
HP Security Bulletin HPSBMU02998 4 - Potential security vulnerabilities have been identified with HP System Management Homepage (SMH) running on Linux and Windows. The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS). Also included is the OpenSSL vulnerability known as "Heartbleed" which could be exploited remotely resulting in disclosure of information. Revision 4 of this advisory.
b3fa1d0558fcbc91c2bc9655d1753596f578e24bdc3fbc14379ffefcbeff95b9
HP Security Bulletin HPSBMU02964 2 - Potential security vulnerabilities have been identified with HP Service Manager. The vulnerabilities could be remotely exploited resulting in Cross-Site Scripting (XSS), Denial of Service (DoS), execution of arbitrary code, unauthorized access, disclosure of Information, and authentication issues. Revision 2 of this advisory.
7536e013715c64e1f248c90d283d725b3de0798c35db1e550b482af5f497718f
privacyIDEA is a multi-factor authentication solution. It can manage any type of authentication device. All common OTP (one time password) devices are supported, including Google Authenticator, eToken Pass, OTP cards, and Yubikey. New devices can be added easily. Users can be retrieved from flat files, LDAP, or Active Directory. It can also handle authorization and writes all events to a digitally signed audit log, giving you basic AAA functionalities.
f6944784beba8386ece7a9621f56b9742b5e17a13432ddf8fd3104c3d102ff17
Broadcom PIPA C211 suffers from credential and information disclosure vulnerabilities.
ee47b61ba7b633b8ad56142b660fbb41b05935a1321d50bb86792758e790d055
HP Security Bulletin HPSBPI03031 2 - A potential security vulnerability has been identified in HP Officejet Pro X printers and in certain Officejet Pro printers running OpenSSL. This is the OpenSSL vulnerability known as "Heartbleed" (CVE-2014-0160) which could be exploited remotely resulting in disclosure of information. Revision 2 of this advisory.
d005211bb5acbb7f8a6cdf1f87a5552d067a89c035629f5c69c0ec728059d093
GetSimple CMS version 3.3.1 suffers from persistent and reflective cross site scripting vulnerabilities.
0fcdbbfbd22058b87a887deb45b5b6b45a9befc471e862436aaeb8b1cb980e26
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.
498e58f9f39e3922030a63cf62baf4b46a40fbda8d90b23ec0f084f4a9f9b687
SpiceWorks version 7.2.00174 suffers from persistent cross site scripting vulnerabilities.
7c80ad26db3158d28e5d0bd6e9492f2b644a2d1888bcbb2d30e4c0b2d7a18ff2
RSA NetWitness and RSA Security Analytics each contain a security fix for an authentication bypass vulnerability that could potentially be exploited to compromise the affected system. When PAM for Kerberos is enabled, an attacker can authenticate to the vulnerable system with a valid user name and without specifying a password. This issue does not affect other authentication methods. Affected include RSA NetWitness 9.8.5.17 or earlier, RSA Security Analytics 10.2.3 or earlier, and RSA Security Analytics 10.3.1 or earlier.
d3f0302f886f8021bdd615864411b0ed7d4b6997261f55f2e98ac35a06fcd19f
The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.
e7007c61c34f3bb640311e00d50e74736289c748d0c688765c28cff72710b637
SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all developer related files.
7e0c3f73471b54ba55f5ac42979ed0d642afd8ae18a973c16b2a667c6c72db56
CodeIgniter versions 2.1.4 and below and Kohana versions 3.2.3 and below and 3.3.2 and below suffer from PHP object injection, a timing attack, and a remote code execution vulnerability.
d357c2844cd74c3664747fff941d56d0608de1bd1ced834e031486b9328c8121