Secunia Security Advisory - Slackware has issued an update for pcre. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.
0cbdef8071c3808430ee0dc93b6be87dd4c2c32732464d562cb61d31dd664c16
Secunia Security Advisory - A vulnerability has been reported in NetWare, which can be exploited by malicious people to cause a DoS (Denial of Service).
c67776773ee5155334525756a0bd90482c8d265b23485de1b8d36cbcb9917007
Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya PDS (Predictive Dialing System), which potentially can be exploited by malicious people to bypass certain security restrictions.
9c31b7a629dcc476b7cd5be0f22e90eb182f6399d27352a14ab849e6e0186c81
Secunia Security Advisory - Avaya has acknowledged a vulnerability in openssl included in some products, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
cc4e557d995e2691b6ce338fe5450eed194838332b1bc814b6602eccaebf35ff
Secunia Security Advisory - Avaya has acknowledged a vulnerability in gzip included in some products, which potentially can be exploited by malicious people to extract files to arbitrary directories on a user's system.
f3c0c73406b39d1cd96749eab7f6908169125b2d1cce16e1ecad996690435aa1
Helpdesk software Hesk 0.92 suffers from an authentication bypass vulnerability.
015c0e8f5ed0a8fa2fd0ec87e5cbbbdaf6a4f79f1c25055bdd117bebf497361a
Secunia Security Advisory - SUSE has issued an update for pcre. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.
8415252bddb3e5edfdf491d95f0118cd12aaae38e06711a6ca2427c5c0de486f
Secunia Security Advisory - SUSE has issued updates for php4 and php5. These fix some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system.
3c84d665a11b945112c49ef4be2a683d31e42513981290f5d569486717df05f8
Secunia Security Advisory - Gentoo has issued an update for phpgroupware. This fixes some vulnerabilities, which can be exploited by malicious administrative users to conduct script insertion attacks, or by malicious people to bypass certain security restrictions or compromise a vulnerable system.
7e171c4f78c5fa7d4566e6eabc3845ba2d1c1c80fb2034683a11a8d8db0735fc
Secunia Security Advisory - Gentoo has issued an update for lm_sensors. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
d4bb10811b2b1b91bd4f7146b3d800a8f52d8c5aa0084f278417957f8821fc90
Secunia Security Advisory - Slackware has issued an update for php. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system.
f6c90550f97977d476fa62861d1af6837ce1b4bb4e3109d073754f4f45ca267f
Secunia Security Advisory - Slackware has issued an update for gaim. This fixes a vulnerability and two weaknesses, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system.
5ceecea2b4fe7421213cfb60c409411fee62ce15f04eef34f48e204dc7b6c61a
Gentoo Linux Security Advisory GLSA 200508-20 - phpGroupWare improperly validates the mid parameter retrieved via a forum post. The current version of phpGroupWare also adds several safeguards to prevent XSS issues, and disables the use of a potentially vulnerable XML-RPC library. Versions less than 0.9.16.008 are affected.
d33de08c4298350651ca1c385fd6272325c50069a0e5c4e6069ba07eeb7605fd
Gentoo Linux Security Advisory GLSA 200508-19 - Javier Fernandez-Sanguino Pena has discovered that lm_sensors insecurely creates temporary files with predictable filenames when saving configurations. Versions less than 2.9.1-r1 are affected.
31b4d798b9de178a17a1c9460c42068a441d78e850787dc18cf3a51cb443e327
Debian Security Advisory DSA 791-1 - Max Vozeler discovered that the lockmail program from maildrop, a simple mail delivery agent with filtering abilities, does not drop group privileges before executing commands given on the commandline, allowing an attacker to execute arbitrary commands under with group mail privileges.
584cfb606501f55a12f62374974c15e0a1de581a87b4f136e5a4aa5a0d9d4e73
e107 version 0.6 has an input validation flaw in forum_post.php that allows attackers the ability to create topics in non-existing forums.
54ebb505ef7de3a47c44cc973d59da1fe31893292a35300fb1af1a1046ebe05e
iDEFENSE Security Advisory - Local exploitation of a design error in the Symantec AntiVirus 9 Corporate Edition may allow a user to gain elevated privileges. Exploitation can occur when a user chooses the right click Scan for viruses option. The Symantec scan file interface allows the user to launch a help window through the use of a toolbar icon. If the user then right clicks the help window title bar they can choose the Jump to URL menu option, which will then allow them to browse the local file system and execute files as the SYSTEM user.
4c4c53312ff3be87fe0e66e5f442ebce8f831cd5fb132dd1575a49517cbbc92b
iDEFENSE Security Advisory - Local exploitation of a design error in Adobe Systems, Inc. Version Cue allows local attackers to gain root privileges. Version Cue includes a setuid root application named VCNative which is vulnerable to a symlink attack. The vulnerability specifically exists due to the use of predictable log file names. VCNative uses a format such as VCNative-[pid].log for the filename and stores the file in the current working directory. Attackers can easily predict the created filename and supply user-controlled data via the -host and - port options. A carefully supplied value can cause a crafted log file to be written. Crafted strings written to root-owned files can lead to arbitrary code execution with root privileges.
411dc375de7e880373b5415079f07e6ba80c1cdda2a6b6a1c38e1aa35c6407ac
iDEFENSE Security Advisory - Local exploitation of a design error in Adobe Systems, Inc. Version Cue allows local attackers to gain root privileges. Version Cue includes a setuid root application named VCNative which contains a design error that allows local attackers to gain root privileges. The vulnerability specifically exists due to an unchecked command line option parameter. The -lib command line option allows users to specify library bundles which allows for the introduction of arbitrary code in the context of a root owned process. The init function in a shared library is executed immediately upon loading. By utilizing the -lib argument to load a malicious library, local attackers can execute arbitrary code with root privileges.
4df7fce995e778869fe2e236a60a050ada95134690b5bfce30b5fc73c86389d1
BFCommand and Control Server Manager are both susceptible to multiple bugs. BFCC versions 1.22_A and below and BFVCC versions 2.14_B and below are susceptible to full anonymous login bypass and various manipulation flaws.
82d511d1562e6896e98ab485a7698bc6c3577ea5c73c093677372f083c030e8c
Debian Security Advisory DSA 788-1 - Several security related problems have been discovered in kismet, a wireless 802.11b monitoring tool.
2da369bca44b6d64e712261b8e7bfd3eda1b78c5bc20947a4d194f98a54d4914
Secunia Security Advisory - Alexander Gerasiov has reported a security issue in phpLDAPadmin, which can be exploited by malicious people to bypass certain security restrictions.
df7dc1a276065204206babdcd62214ff177b7bbb077a3ee35064efc5ff43edad
Secunia Security Advisory - Sowhat has discovered a vulnerability in BNBT EasyTracker, which can be exploited by malicious people to cause a DoS (Denial of Service).
0b8a62a0b46c6f3bfb6dc6578c3d1bb0f4b4226ec44339f85e3c081c333caebd
Secunia Security Advisory - vade79 has discovered a vulnerability in Gopher client, which can be exploited by malicious people to compromise a vulnerable system.
50bcf8a16f5e21a7b20a90180232741714c21f38727cfc022f016f7f0654d010
Secunia Security Advisory - Kutbuddin Trunkwala has reported a vulnerability in BlueWhaleCRM, which can be exploited by malicious users to conduct SQL injection attacks.
b24efbe0dd772d918caafd9e5255560eee7735275bf2f5921f220a09a2c7bc75