Gentoo Linux Security Advisory GLSA 200803-22 - Luigi Auriemma reported a signedness error in the parseRTSPRequestString() function when processing short RTSP queries. Versions less than 2008.02.08 are affected.
4f90258c6e34fa0292e5dfea6a912fa6170afc0f4cf6c8516bcc85ec428ddfd5
Cisco Security Advisory - CiscoWorks Internetwork Performance Monitor (IPM) version 2.6 for Sun Solaris and Microsoft Windows operating systems contains a vulnerability that allows remote, unauthenticated users to execute arbitrary commands. There are no workarounds for this vulnerability.
7c562f4b0573fd19e0a5ab47a3e4702136300d49ba3a54d0136f6d6719202652
The Plone CMS is susceptible to cross site request forgery attacks and suffers from other vulnerabilities such as credentials being stored in cookies, a lack of authentication state on the server side, and session cookies never changing.
9fa210737534dab70aad652659316b887c987b046c5b5aec3193ff894d27743d
Secunia Security Advisory - Multiple vulnerabilities and a security issue have been reported in Roundup, some of which have unknown impacts, while others can be exploited by malicious users to bypass certain security restrictions.
b913d10598cefa49a09c3e821b2fde1790a9419235f6542407799c2b6086df4b
Secunia Security Advisory - TurkishWarriorr has discovered a vulnerability in Fully Modded phpBB, which can be exploited by malicious people to conduct SQL injection attacks.
2aa5806f787a8c3b747d62a7926a7bedae3382110687739714881991ff630860
Secunia Security Advisory - S@BUN has discovered a vulnerability in the Bama Galerie module for eXV2, which can be exploited by malicious people to conduct SQL injection attacks.
2d88f2c22559d768f5a66059cf73828584ea552d17bebd47d8ce158635f0b20e
Secunia Security Advisory - A security issue has been reported in IBM WebSphere MQ for HP NonStop, which can be exploited by malicious, local users to bypass certain security restrictions or manipulate certain data.
103aaf99e4bd76c0b50c93e6f2e83a7a3bbf28c32239939c036c91d271cca253
Secunia Security Advisory - SCO has issued an update for openssh. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
431e08b480b4a57ef8406fdd809f8d271a65d0fb83218f9d0fc2d37db8e54e84
Secunia Security Advisory - JosS has discovered some vulnerabilities in EasyGallery, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
bfe64139e974ed835114e1c43110e2b36f881d2675136ec1d421b8e4bf1f074b
A vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of IBM's Informix Dynamic Server. User interaction is not required to exploit this vulnerability. Authentication is not required to exploit this vulnerability. The specific flaw exists in the oninit.exe process that listens by default on TCP port 1526. During authentication, the process does not validate the length of the supplied user password. An attacker can provide a overly long password and overflow a stack based buffer resulting in arbitrary code execution.
038b952b4d4c38bb5b9fe96d3a86b06cb7fdad307057f55efd702ead3d4cf0ba
A vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of IBM's Informix Dynamic Server. User interaction is not required to exploit this vulnerability. Authentication is required in that an attacker must have database connection privileges. The specific flaw exists in the oninit.exe process that listens by default on TCP port 1526. During authentication, the process does not validate the length of the DBPATH variable. An attacker can provide a overly long variable name and overflow a global buffer, overwriting function pointers leading to arbitrary code execution.
3bbfa7caf389cdef4af467f022332a2ed124566ec3ac8a93befc8d5dbde297db
Mandriva Linux Security Advisory - Jurgen Weigert found a directory traversal vulnerability in fastjar versions prior to 0.93. This vulnerability allows user-assisted attackers to overwrite arbitrary files via a .jar file containing filename with ../ sequences.
531c8da2219ca0ccdd4759c4f7568606afbca82acbfdf9f531715c9f22a6cccf
Zabbix is susceptible to a resource consumption denial of service vulnerability when the zabbix_agentd is told to checksum a device (like /dev/urandom, etc).
07ff47d111d798cea7ea00b8e5ff81f1da28e22add238ff094da27d557ae2897
MDaemon IMAP server version 9.6.4 FETCH command remote buffer overflow universal exploit that binds a shell to port 4444.
46172680402d72918d7c2218e17716c08edb90bc46bac08874a8277b85c54ab2
EdiorCMS version 3.0 suffers from a directory traversal vulnerability in search.php.
4452365c6c892e1fd3d92958b54a135b2aaa2ff02b654eb29d10fb57fb90820d
Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in McAfee ePolicy Orchestrator, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.
4e894908292d14b0dfed530eb025e4500707c23818df9a784e51173a1b439711
Secunia Security Advisory - A vulnerability has been discovered in eXV2, which can be exploited by malicious people to conduct SQL injection attacks.
f4a533e915f08631fbc2e43d27ab421e0e6a7ff22a92024b897b48afb0027203
Secunia Security Advisory - A vulnerability has been reported in Sun Solaris, which can be exploited by malicious people to bypass certain security restrictions.
2b39862fcf4085b9b3a58f45aa7159f70563498ca807540fadee59ecf2c1b4d0
Secunia Security Advisory - Fedora has issued an update for roundup. This fixes some vulnerabilities with unknown impacts, and a security issue, which can be exploited by malicious users to bypass certain security restrictions.
a973d1029c4b7e720ebd74be14e9a6b81ff485c6c4a556155e24e60fea86c6f8
Proof of concept exploit for McAfee Framework versions 3.6.0.569 and below which suffer from a format string vulnerability.
aaa7b87a3284f8aa51d7739e1e12127bed27b76b5b29286de02ebbc2fe29c93d
McAfee Framework versions 3.6.0.569 and below suffer from a format string vulnerability.
96ad84a9cff5cd7be99c946d1033654d49d93153f4257024fbfd01cd49780e7b
Gentoo Linux Security Advisory GLSA 200803-21 - Sarg doesn't properly check its input for abnormal content when processing Squid log files. Versions less than 2.2.5 are affected.
37d80f57f35df313124957531ae1abd28bfb3eeb4113f4a7440404e0ce27bcf5
Secunia Security Advisory - Red Hat has issued an update for java-1.4.2-bea. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose potentially sensitive/system information, cause a DoS (Denial of Service), manipulate data, or compromise a vulnerable system.
980ead72d140424d2cfb3a8a7f72829b4077cfe14ec6e6b3e82afd89ea3456bb
Secunia Security Advisory - A vulnerability has been reported in Red Hat Directory Server, which can be exploited by malicious, local users to gain escalated privileges.
588dac3e9da598bfe45554478c56e9481c21710e316d075aec482f7c07dbb5b6
Secunia Security Advisory - A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
e1d1d5056fddab6cf40894a89d4b01a45b572c5259dbfead996b220d8ed5ff5d