Secunia Security Advisory - Gentoo has acknowledged a vulnerability in courier-imap, which potentially can be exploited by malicious people to compromise a vulnerable system.
f45259c47d5367e0a620e37099d5aa378aabec20040d256f947b75d0e52dd596
Secunia Security Advisory - A vulnerability has been discovered in WEBinsta FM Manager, which can be exploited by malicious people to compromise a vulnerable system or to disclose sensitive information.
a7b2e07757073159d340c7d0096fb73e4e98f310d9af46f4b8c13401fda73f8d
Secunia Security Advisory - A vulnerability has been reported in 3proxy, which potentially can be exploited by malicious people to compromise a vulnerable system.
f03199cc3db5ae902c96d7115694a14e29b85d884a0c9f9fa4b3d4ac40b3cda9
Secunia Security Advisory - Gentoo has issued an update for aircrack-ng. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.
c1c283fcd07a8259c2603ad12fc608f57a8ada56c2282e13f1b5b3f4afa278d0
Secunia Security Advisory - Marsu has discovered a vulnerability in XnView, which can be exploited by malicious people to compromise a user's system.
6e394f65bf273c0de387c42cf7bdab97b05df9de7870dede6ffb6975e9672f90
Secunia Security Advisory - Debian has issued an update for webcalendar. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.
85f661900da408437517569f55f7018743379caba2c92199a2a266dee49cf1e1
Secunia Security Advisory - Marsu has discovered a vulnerability in PhotoFiltre Studio, which can be exploited by malicious people to compromise a user's system.
4dabed05ef92113ad3b787295859cdca6977039278317c694c2da9a58926d94b
Secunia Security Advisory - Some vulnerabilities have been reported in ZomeAlarm products, which can be exploited by malicious, local users to gain escalated privileges.
f14b4fe7b83c41da402240ceb4827c6975ee0321867f6408afc9bd6622b767c2
Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya CMS / IR, which can be exploited by malicious people to cause a DoS (Denial of Service).
5b2826d34e476ea7eaf04ae352f745fc934f5346cc5f597659adfeb14253e9b1
Secunia Security Advisory - Marsu has discovered a vulnerability in ACDSee products, which can be exploited by malicious people to compromise a user's system.
f9c9d7d4c7dbed1a7338916d8d60e5fe7ff3d216e8d654054f3552f4d301b72b
Secunia Security Advisory - SUSE has issued an update for multiple packages. This fixes some vulnerabilities, which can be exploited by malicious, local users to manipulate data, cause a DoS (Denial of Service), and gain escalated privileges, and by malicious people to manipulate data, conduct cross-site scripting attacks, cause a DoS, and compromise a vulnerable system.
6b981c18cb8d3392793460523c88ef2080a4dae238f9f9a5702df0f8d156d53a
Secunia Security Advisory - Trustix has issued an update for freetype and clamav. This fixes some vulnerabilities, where one has unknown impacts, and others can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.
2bf3dc05a24ca2e657e3969cfd75dd0a12dda6eb0702029df4fae1f871ff31ac
Secunia Security Advisory - Gentoo has issued an update for 3proxy. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.
26cf37fa8b8ec643d342c39a7b99f7168c3012bfd9d4ab3e72d96b1c92848dd9
Secunia Security Advisory - A security issue has been reported in NeatUpload, which can be exploited by malicious people to gain knowledge of potentially sensitive information.
6aa9d4cd0d1b458e772318ad1ce2afdae79217c4d4462bf4c28a52f4075433e3
SynScan is a fast half-open port scanner. This tool will send TCP packets with the SYN flag to any block of destination addresses at very high speed. SynScan endeavors to send traffic as fast as the host network interface can support.
47dc879fed164cbb41bec07d33de62faf97d964d92278bce0fa318c910ca12ac
GNU SASL is an implementation of the Simple Authentication and Security Layer framework and a few common SASL mechanisms. SASL is used by network servers such as IMAP and SMTP to request authentication from clients, and in clients to authenticate against servers. The library includes support for the SASL framework (with authentication functions and application data privacy and integrity functions) and at least partial support for the CRAM-MD5, EXTERNAL, GSSAPI, ANONYMOUS, PLAIN, SECURID, DIGEST-MD5, LOGIN, NTLM, and KERBEROS_V5 mechanisms.
47dc89ff255055fae7b212c7f568126ab456bce2ad6e4ce02db71b40ab6c626a
LOMAC is a dynamically-loadable security module for Free UNIX kernels that uses Low Water-Mark Mandatory Access Control (MAC) to protect the integrity of processes and data from viruses, Trojan horses, malicious remote users, and compromised network server daemons. The LOMAC loadable kernel module can be used to harden Linux systems without any changes to existing kernels, applications, or configuration files. Due to its simplicity, LOMAC itself requires no configuration, regardless of the users and applications present on the system.
7d9fd8c887cfcaee957b0a74460ed59a171f5ee5a1b22718c47e72a0f4b192a0
cm4p version 0.6.1 suffers from a remote file inclusion vulnerability.
750747d3a9b619127bff1b9d62ad0b017b28084b2be074c64ad867cd167cbf10
MetaBB version 6 suffers from a remote file inclusion vulnerability.
2fc8ad97bffc99161d1f4d7636cd8b3f442587f0e214860bcc97d8b702a5a2b8
amsn versions 0.96 and below suffer from a remote denial of service vulnerability.
a11b18835803069e532da4cdb7e5014f4cf6c28610825a6f5a4e1d25507641c0
System account enumeration is possible when OpenSSH versions 4.6 and below have ChallengeResponseAuthentication enabled (S/KEY).
1ff367e663ad5227576fda522c34ea8d41163498f44a0745cfb6727e9de28a90
Rezervi Availability version 2.7 suffers from a remote file inclusion vulnerability.
5401fd091e537799a388f37a68ea842b522c70e155bcd5f41f0df93bd7dd9676
nipper is a Network Infrastructure Configuration Parser. nipper takes a network infrastructure device configuration, processes the file and details security-related issues with the configuration together with detailed recommendations. nipper was previous known as CiscoParse. nipper currently supports Cisco switches (IOS), Cisco Routers (IOS), Cisco Firewalls (PIX/ASA/FWSM) and Juniper NetScreen (ScreenOS). Output is in HTML, Latex, XML and Text. Encrypted passwords can be output to a John-the-Ripper file for strength testing.
8a276ed572ba90cc7ab49ab643f18c51290a4bc9979a5b90a9ddceef5007e7a1
iDefense Security Advisory 04.20.07 - Local exploitation of multiple design error vulnerabilities within multiple Check Point Zone Alarm products could allow an attacker to gain elevated privileges. iDefense has confirmed the existence of these vulnerabilities within version 5.0.63.0 of srescan.sys as installed with Check Point Zone Labs Zone Alarm Free. All other products within the Zone Alarm product line are suspected to be vulnerable. Previous versions are also suspected to be vulnerable.
83b862129517b60146e0d9b85f3dc72dbcc63462a1d0dc679845a5fee0f1a5c2
DigiOz Guestbook version 1.7.1 suffers from a remote file inclusion vulnerability.
279931bf1efcfc114f7654b849131329da7ce741c7fbb388c5eec1dc29c08861