Secunia Security Advisory - Debian has issued an update for gdk-pixbuf. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system.
bffb84adcbdef57bf63bb38252cf1bb7c8fac1254118f270e0da6f23bd78a4d4
Secunia Security Advisory - Some vulnerabilities have been reported in MXChange, which potentially can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
c0a372e715671bb517726eb6d3b19ef43ee1ca21aec5f386d14b342ff519b0e4
Secunia Security Advisory - Debian has issued an update for horde2. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.
7d922ce58d22aac9461631dc9d2072c027b803177eab377c5b4a3bf5a9db5ae7
Secunia Security Advisory - Jack Louis has discovered a vulnerability in Perl, which can be exploited by malicious people to cause a Denial of Service.
c0e59c95fe0d6bbe1296f619b16fc9db831e6e46b81e3b82871f5ba07184009f
Secunia Security Advisory - Ubuntu has issued an update for w3c-libwww. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).
dd1c986a8866394aa4d471eb3534d4cd0d8a03f87aa8ae5a767e4104d99997ff
Secunia Security Advisory - r0t has reported a vulnerability in Extreme Search Corporate Edition, which can be exploited by malicious people to conduct cross-site scripting attacks.
2300a1d1fa68cdb9565ed815c07b37c64684105e03d5e1718b9ebda69cd82c76
Secunia Security Advisory - A vulnerability has been reported in some Citrix products, which can be exploited by malicious people to conduct cross-site scripting attacks.
57589f1e7c0a1b90593d97c18490d7b6e56c620b7e80aed89721e1ac4129bb5d
Secunia Security Advisory - Ubuntu has issued an update for ipsec-tools. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
12b70fd2ec08aaaaedd6d6614dbbb10b80e65b875e6769a5a6049b0ad988a994
Secunia Security Advisory - Some vulnerabilities have been reported in Drupal, which can be exploited by malicious people to bypass certain security restrictions, and conduct script insertion and HTTP response splitting attacks.
ee1686b397a6e34b37c803eb5dbcad22e6f1cc8f1d0e5632f0164c1d0cb87bdd
Secunia Security Advisory - A vulnerability has been reported in Avaya Media Gateway TN2602AP IP Media Resource 320, which can be exploited by malicious people to cause a DoS (Denial of Service).
09e4f48a9419d01b80d12ad40575f7f6494b47e88f8027d3642b3b60a3420005
Secunia Security Advisory - Mandriva has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges, or by malicious people to disclose potentially sensitive information and cause a DoS.
392eae75f8033335997eec059a74058281577eb1ef7719b44395763a483eeb3b
Secunia Security Advisory - Mandriva has issued an update for netpbm. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system.
998591edf7f58a0d829f13535d29c71bf4e996914b02f6e6e57a27a7c1c12e63
Secunia Security Advisory - Kevin Fernandez Siegfried has reported a vulnerability in DotClear, which can be exploited by malicious people to conduct SQL injection attacks.
dec7e6fe20cc78483e5c5d57959d694921174c3d4e847bb27182cec7d440ec07
Secunia Security Advisory - jeffbearer has reported a security issue in SunShop Shopping Cart, which can be exploited by malicious people to disclose system information.
b90aa7d5c3c737d441bfcf6db7f9edf841bf677d5a618545b88aec78344d9215
Secunia Security Advisory - Astaro has issued an update for Astaro Security Linux. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
49c91b2cf55dc6bef8416fb4c5cec8bcf88ecfe12edeefe075e80aff2fc7c618
Secunia Security Advisory - r0t has reported two vulnerabilities in Instant Photo Gallery, which can be exploited by malicious people to conduct SQL injection attacks.
a198515dd48829715676082ec6118766aa3dacbc5af44b1b1eb4db31c608cf93
Secunia Security Advisory - r0t has reported a vulnerability in Lore, which can be exploited by malicious people to conduct SQL injection attacks.
90af4eb9b408aee87df9fe00edda12247421659f455809e78af521c764a490f2
Engine_pkcs11 is an implementation of an engine for OpenSSL. It can be loaded using code, config file, or command line and will pass any function call by openssl to a PKCS#11 module. Engine_pkcs11 is meant to be used with smart cards and software for using smart cards in PKCS#11 format, such as OpenSC. Originally this engine was a part of OpenSC, until OpenSC was split into several small projects for improved flexibility.
bf6f49203912cb77f92db55c146117312abf9244ba49e78649e4a7da22448e54
Libp11 is a library that implements a small layer on top of the PKCS#11 API to make using PKCS#11 implementations easier.
8f91d1a7aa2c84b43013c758dea761450b6c11b4ce8aec24a1a7717a1aeb5ce4
Vuurmuur is a middle-end and front-end for netfilter and iptables that is aimed at system administrators who need a decent firewall, but do not have netfilter specific knowledge. It converts human-readable rules into an iptables ruleset (or optional a bash script), makes netfilter logs readable, and includes an ncurses GUI.
2b9b3982d8836e4fc3b380a645e46e89424a72c6738bbd903d7d9fb038f8537f
SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all developer related files.
01881b005618743fa254d6ddfdc120c2dba1e317d180d8edb5f68dd6329a2beb
Microsoft Windows Distributed Transaction Coordinator remote proof of concept exploit for the flaw listed in MS05-051.
5a516d222a183472ce165846622b1deb7443c5cc0b80551438fb933e3bac6c4d
Microsoft Windows Distributed Transaction Coordinator remote proof of concept exploit for the flaw listed in MS05-051.
ffaeef19db3c4daa82885e504f38a1055423d7b036404e4e4a8f846eccf60364
NetBSD/i386 2.0, callback shellcode (port 6666);
985380f3d689bef3424d8fbcad233c5443e4fe61f00063be20e410f22ba6af7e
SCO_SV scosysv 3.2 5.0.7 i386, execve("/bin/sh", ..., NULL); shellcode.
6f20ae95aa944bb69a3659723893bfc98b10c2c3adaac83025e81d739a068104