Kojoney is an easy of use, secure, robust, and powerful Honeypot for the SSH service. It includes other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log files.
6b1d9bedc27dd5c8d8d4633a436d52e8204bf8823bff29873c1485d25a42c5c0
Evolution suffers from several format string bugs when handling data from remote sources. These bugs lead to crashes or the execution of arbitrary assembly language code. Evolution versions 1.5 to 2.3.6.1 are affected.
ba54e3eebf62720b6c3ebeb08515844ddb5b49958567983f4409c964728c4ba3
It is possible to remotely crash the Wyse Winterm 1125SE terminal by sending a malformed packet with ip option len field set to zero.
7d6ec73bfdc62a8d48538d2a967383d4583ec5314a62df994d904a95d68f5b4d
Paper entitled "Theft of Bluetooth Link Keys for Fun and Profit?"
bab28a93e6d06017dbea2c25b0edf71991910355debb06e00d302cbb1a006e04
FUD Forum bulletin board software version 2.6.15 allows for unauthenticated access to messages.
6f46411549bf33bf6f7bed0062473c2cc53c9b0b6db070ab308e184d5abdb4b8
A sanity check failed to exist in ebillpay's unbilled-usage modules to to correlate phone numbers with accounts. This could have been used by a malicious user to mine data through Verizon Wireless' website about other Verizon Wireless customers.
f353ab176a9e04fc59c8897a00b39596a2da68f7d47cbb92dfe69650f1cefb42
Ubuntu Security Notice USN-166-1 - Ulf Harnhammar disovered several format string vulnerabilities in Evolution. By tricking an user into viewing a specially crafted vCard attached to an email, specially crafted contact data from an LDAP server, specially crafted task lists from remote servers, or saving Calendar entries with this malicious task list data, it was possible for an attacker to execute arbitrary code with the privileges of the user running Evolution.
adfe66c8078c6dbe77c997fba762f467536084c5390318202428571511bf8028
Ubuntu Security Notice USN-164-1 - Max Vozeler discovered that the the pstopnm conversion tool did not use the -dSAFER option when calling ghostscript. This option prohibits file operations and calling commands within PostScript code. This flaw could be exploited by an attacker to execute arbitrary code if he tricked an user (or an automatic server) into processing a specially crafted PostScript document with pstopnm.
e7bee8ebff81a32f1d1b893ba21274a04bb055f8c81980d772a51a23273a551d
Veritas Backup Exec Agent remote file access exploit that makes use of a logic flaw. This exploit is part of the Metasploit framework and works against all current versions of this Agent.
ce6635868c10007bb4b2fbdfee0b95f5aeb19d955c488884770156f4c69c0f4f
A privilege escalation flaw exists in Network Associates ePolicy Orchestrator Agent 3.5.0 (patch 3). Exploitation details provided.
4a189c2e780a80f5f87fb463cff8a682acc537284c383163a446215361fa9bec
Debian Security Advisory DSA 773-1 - This advisory adds security support for the stable amd64 distribution. It covers all security updates since the release of sarge, which were missing updated packages for the not yet official amd64 port. Future security advisories will include updates for this port as well.
28fec12bbb6708c83211cce4992e967545b7b8ee97d8695fc4cd36c6e3015003
Microsoft Windows 2000 Plug and Play universal remote exploit for the flaw discussed in MS05-039.
781399405050c0988fddc2a8b8e492927b774aa17316460c4c494ff7b5f37391
Remote code execution exploit for cPanel versions 9.x and below that binds a shell to port 1666.
aaf90668dff66a551d8b4f647e0e60c86fcce644a7ba3f2704c85d8761c9bf22
Microsoft Internet Explorer COM Object remote file down and execute exploit. Makes use of the vulnerability described in MS05-038.
fb75508c17a1d01407c6df35ff810bd6880a37223ff16a1e6f1e8d024a2ae186
Secunia Security Advisory - Zinho has discovered some vulnerabilities in PHPOpenChat, which can be exploited by malicious people to conduct script insertion attacks.
70cd8e7fc21fa538fcca888c97d0cba66a7151256d5abb367ca3ec9bab513a8c
Secunia Security Advisory - SmOk3 has discovered a vulnerability in MidiCart ASP, which can be exploited by malicious people to conduct SQL injection attacks.
4a4052f48a77e1a0a3b949cb06d527ed0a9571a864c9b2b893acebbd8905a79e
Secunia Security Advisory - A security issue has been reported in Gallery, which can be exploited by malicious users to bypass certain security restrictions.
462469cf29a5a7005485016971549b96c99d964e3c20eb4837d7bcf2134b76fb
Secunia Security Advisory - Ulf Harnhammar has reported some vulnerabilities in Evolution, which can be exploited by malicious people to compromise a vulnerable system.
ecc096d26115c9f59c55ea8d32bc98c9b20685a42f713f4bb21a06de6fb599cb
Secunia Security Advisory - Reed Arvin has discovered a vulnerability in Linksys WLAN Monitor, which can be exploited by malicious, local users to gain escalated privileges.
2e66dfae6176af194a09091b9f8382fca793de0b3a46d5b915f3a5b3af3dd0aa
Secunia Security Advisory - A vulnerability has been reported in gpdf, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system.
a482ccacef46e1563c27d82a350652db75de3e3536f782bbb79bce220ffcdda5
Secunia Security Advisory - HP has acknowledged a vulnerability in HP Tru64 UNIX, which can be exploited by malicious people to disclose certain sensitive information.
dd97cbafc3ea1672020fe12f7ff7d947f0de99a2c0e3c8fe4be564481093de46
Secunia Security Advisory - A vulnerability has been reported in HP ProLiant DL585 Server, which can be exploited by malicious people to gain unauthorised access to the server controls.
f8257d3fd55a3bce10d5a13b7e1211d102bde373430b0efd8e198f0ae7de0fde