secure rm (srm) is a command-line compatible rm(1) which completely destroys file contents before unlinking. The goal is to provide drop in security for users who wish to prevent command line recovery of deleted information, even if the machine is compromised.
3be77158b62873659de9d458f87993537c93bbd32a86d5543290a0cf4ab24f61
Linux Kernel versions 2.6.13 through 2.6.17.4 sys_prctl() local root exploit.
5efb14525ba9f4cb8aefb22893eda96c74fc409c3de28d462630484299a60fe1
The Linux kernel recently incorporated a protection which randomizes the stack making exploitation of stack based overflows more difficult. This paper presents an attack which works on exploiting static addresses in Linux.
41d9db52ae0c4b277a6c37905951774ebd9c05e187937bdf18e72fd8198f3cdb
Ottoman CMS versions 1.1.3 and below remote file inclusion exploit.
d14b55cf733c347883249ed68cf5e87f8e518603ebf7afad2707ad33baa27d2f
Sabdrimer PRO version 2.2.4 suffers from a remote file inclusion vulnerability.
352d4c1402a7fc6c74f80f45f8e1582838f95b1211064405fc7703e3bb7dfa8d
SQuery versions 4.5 and below remote file inclusion exploit.
fba540a7019aeaf82d64284be38cdab2ab7705a312d639e7ff76edc3094c43a7
EJ3 TOPO version 2.2 remote command execution exploit.
ac44a1b4d3443dae78da19d6cae880fa7ee1eb9a1d5bd2ab49dcd22d31a2ebc6
Microsoft Internet Explorer 6 denial of service exploit that makes use of a heap overflow.
bb94a8e7eb24de12abbc309ece1e4fdf7ec96b1b0207f02670534a407e3e3c19
Advchk (Advisory Check) reads security advisories so you do not have to. Advchk gathers security advisories using RSS feeds, compares them to a list of known services, and alerts you if you are vulnerable. Since adding hosts and services by hand would be quite a boring task, advchk leverages nmap for automatic service and version discovery.
2b851eb6af088365188b6b91e8861626ba23db195e3e829b9edac5f059841ff4
afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.
24812075724e456c4d9024c9ee9dd279f4ac196626517eab95e785e3c6a40556
Secunia Security Advisory - rPath has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service).
0a70c34a509f56543993e47f0e6f991e9d26c0495d03d2eb48eea2382ba25173
Secunia Security Advisory - A vulnerability has been reported in Adobe Acrobat and Adobe Reader, which can be exploited by malicious, local users to bypass certain security restrictions or gain escalated privileges.
7292c39b59f0dfe18732d4449ed430a10d6149c8f19bc15660e093453cf55f33
A remote code execution vulnerability exists in Excel using a FNGROUPCOUNT value. An attacker could exploit the vulnerability by constructing a specially crafted Excel file that could allow remote code execution. Affected products include Microsoft Office 2000 SP3, XP SP3, 2003 SP1/SP2, Microsoft Works Suites, Microsoft Office X for Mac, Microsoft Office 2004 for Mac.
7e170a0ddb9ebcdf71cd28c1c7a522755c2b4ce84c61d85adab4ad42ff9c7f59
An array boundary condition in Microsoft Office may be violated by a malicious .xls file in order to redirect execution into attacker-supplied data. Exploitation requires that the attacker coerce or persuade the victim to open a malicious .xls file. Affected products include Microsoft Office 2000 SP3, XP SP3, 2003 SP1/SP2, and possibly others.
fb609c739271a9ebe6e5cec1b2eae2fa37472dc298a788c5b6d84cdea012300d
Local root exploit for the linux kernel PRCTL core dump handling vulnerability. Affected kernel versions greater than or equal to 2.6.13 and below version 2.6.17.4.
677603aff112604786b2a169c6c42470daa27928b5f9c17dc183f7ed1be5cd7d
Technical Cyber Security Alert TA06-192A - Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, IIS, and Office. Exploitation of these vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on a vulnerable system.
eb4aca720e4573573cc899c3f02a365c674ba498fae834cf94734dbbc079e425
An information disclosure vulnerability exists in the Microsoft Server service that could allow an attacker to retrieve fragments of memory from an affected host via the host's SMB server. Affected products include Microsoft Windows 2000, Microsoft Windows XP with Service Pack 1, Microsoft Windows XP with Service Pack 2, Microsoft Windows Server 2003, and Microsoft Windows Server 2003 with Service Pack 1.
cf894ff8c6ca42cce5295a939abdf2e99274c7a324d9f99877c347bc5b1efefc
A vulnerability in the rebuilding of malformed cell comments allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office. Exploitation requires that the attacker coerce the target into opening a malicious .XLS file. Affected products include Office Excel 2003, Office Excel Viewer 2003, Office Excel 2002, Office Excel 2000, Office Excel 2004 for Mac, and Office Excel version X for Mac.
336d03ea4338b7765f5740d24e314ad6032273ea70a38737372c2014a577cd5c
The Microsoft SRV.SYS driver suffers from a memory corruption flaw when processing Mailslot messages. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Microsoft Windows operating system. Authentication is not required to exploit this vulnerability and code execution occurs within the context of the kernel.
7ecbc9c470fe349666dc38c15db04ebb879ba6bf0f07f04da1973e974ec14ce4
A remote buffer overflow vulnerability has been identified in Microsoft Windows DHCP-Client service. Affected include Microsoft Windows 2000 SP4 and below, Microsoft Windows XP SP2 and below, and Microsoft Windows 2003 SP1 and below.
f0b8a04ebf77fe02b596538c5c1cb68e368d924a0210b5216832db0dd11aeda9
The Finjan Appliance version 5100/8100 NG suffers from a clear text password exposure issue when creating a backup file.
657da14335d4b0704013738bb59cf2ba832578e158ac8b62b9896348abf77c9a
Ubuntu Security Notice 311-1 - A race condition was discovered in the do_add_counters() functions. Processes which do not run with full root privileges, but have the CAP_NET_ADMIN capability can exploit this to crash the machine or read a random piece of kernel memory. In Ubuntu there are no packages that are affected by this, so this can only be an issue for you if you use third-party software that uses Linux capabilities. John Stultz discovered a faulty BUG_ON trigger in the handling of POSIX timers. A local attacker could exploit this to trigger a kernel oops and crash the machine. Dave Jones discovered that the PowerPC kernel did not perform certain required access_ok() checks. A local user could exploit this to read arbitrary kernel memory and crash the kernel on 64-bit systems, and possibly read arbitrary kernel memory on 32-bit systems. A design flaw was discovered in the prctl(PR_SET_DUMPABLE, ...) system call, which allowed a local user to have core dumps created in a directory he could not normally write to. This could be exploited to drain available disk space on system partitions, or, under some circumstances, to execute arbitrary code with full root privileges. This flaw only affects Ubuntu 6.06 LTS.
7561e7fc801390c8838f1fe27efaf5483ef09bccc24d1fcccab73c2e3b1b9963
Mandriva Linux Security Advisory MDKSA-2006-120 - A vulnerability in samba 3.0.x was discovered where an attacker could cause a single smbd process to bloat, exhausting memory on the system. This bug is caused by continually increasing the size of an array which maintains state information about the number of active share connections.
9bb59a98529b1fc81ba23bc2229795f95b2f671eee07b546fa91372db4fee0cc
Mandriva Linux Security Advisory MDKSA-2006-119 - Marcus Meissner discovered that pppd's winbind plugin did not check for the result of the setuid() call which could allow an attacker to exploit this on systems with certain PAM limits enabled to execute the NTLM authentication helper as root. This could possibly lead to privilege escalation dependent upon the local winbind configuration.
36852726ff1d921e9c1dbf43b6531ae00a2a00531bfab03c69cf1d98750fc3c9
Debian Security Advisory 1108-1 - It was discovered that the mutt mail reader performs insufficient validation of values returned from an IMAP server, which might overflow a buffer and potentially lead to the injection of arbitrary code.
1e56fc2538540ec240b6a31031c084ab33202cde0a9061b8579e657c651a242e