Debian Linux Security Advisory 3635-1 – Two use-after-free vulnerabilities were discovered in DBD::mysql, a Perl DBI driver for the MySQL database server. A remote attacker can take advantage of these flaws to cause a denial-of-service against an application using DBD::mysql (application crash), or potentially to execute arbitrary code with the privileges of the user running the application.
Monthly Archives: July 2016
WebKit TypedArray.copyWithin Memory Corruption
WebKit suffers from a memory corruption vulnerability in TypedArray.copyWithin.
Kaspersky Safe Browser Man-In-The-Middle
Kaspersky Safe Browser suffers from a man-in-the-middle vulnerability.
Fotoware Fotoweb 8.0 Cross Site Scripting
Fotoware Fotoweb version 8.0 suffers from a cross site scripting vulnerability.
WebKit TypedArray.fill Memory Corruption
WebKit suffers from a memory corruption vulnerability in TypedArray.fill.
Microsoft Wireless Desktop 2000 Insufficent Verification / Mouse Spoofing
Microsoft Wireless Desktop 2000 suffers from insufficient verification of data authenticity and mouse spoofing vulnerabilities.
Bugtraq: [SYSS-2016-044] Logitech K520 – Insufficient Protection against Replay Attacks
[SYSS-2016-044] Logitech K520 – Insufficient Protection against Replay Attacks
Bugtraq: [SYSS-2016-046] Perixx PERIDUO-710W – Missing Protection against Replay Attacks
[SYSS-2016-046] Perixx PERIDUO-710W – Missing Protection against Replay Attacks
Bugtraq: [SYSS-2016-047] Perixx PERIDUO-710W – Keystroke Injection Vulnerability
[SYSS-2016-047] Perixx PERIDUO-710W – Keystroke Injection Vulnerability
Bugtraq: [SYSS-2016-059] Microsoft Wireless Desktop 2000 – Insufficient Verification of Data Authenticity (CWE-345)
[SYSS-2016-059] Microsoft Wireless Desktop 2000 – Insufficient Verification of Data Authenticity (CWE-345)