Secunia Security Advisory - A vulnerability has been reported in NASM, which potentially can be exploited by malicious people to compromise a user's system.
b310d3d19728f2dbdd9029d56a0892dc80cd5992c51301a8c6ce8a391566f359
Secunia Security Advisory - HP has issued an update for Apache and Tomcat with PHP. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise a vulnerable system.
314abde0fa0673049eb82fed146ccd89bb0af4e0586fc71e5c02580406e5890c
Secunia Security Advisory - Two vulnerabilities have been reported in TYPO3, which can be exploited by malicious people to conduct cross-site scripting attacks, and by malicious users to compromise a vulnerable system.
974f174d5905da48b34d650d2e8604c5d2ff22bb6970817e6adb817aebb0733f
iDefense Security Advisory 06.11.08 - Local exploitation of an information disclosure vulnerability in the X.Org X server, as included in various vendors' operating system distributions, could allow an attacker to gain access to sensitive information stored in server memory. The vulnerability exists when creating a Pixmap in the fbShmPutImage() function. The width and height of the Pixmap, which are controlled by the user, are not properly validated to ensure that the Pixmap they define are within the bounds of the shared memory segment. This allows an attacker to read arbitrary areas of memory in the X server process. iDefense has confirmed the existence of this vulnerability in X server 1.4 included with X.org X11R7.3, with all patches as of 03/01/08 applied. Previous versions may also be affected.
f996dc34179e536c8cec80e7e1ab0c8b3841cce7dc4a40b66986828681ff031d
iDefense Security Advisory 06.11.08 - Local exploitation of multiple memory corruption vulnerabilities in the X.Org X server, as included in various vendors' operating system distributions, could allow an attacker to execute arbitrary code with the privileges of the X server, typically root. iDefense has confirmed the existence of these vulnerabilities in X server 1.4 included with X.org X11R7.3, with all patches as of 03/01/08 applied. Previous versions may also be affected.
23de174b019234410fd1fed2d2601eac065e96395b47d5efd0aa7b395e84b241
iDefense Security Advisory 06.11.08 - Local exploitation of an integer overflow vulnerability in the X.Org X server, as included in various vendors' operating system distributions, could allow an attacker to execute arbitrary code with the privileges of the X server, typically root. iDefense has confirmed the existence of this vulnerability in X.org X11 version R7.3, with all patches as of 03/01/08 applied. Previous versions may also be affected.
01fb73cd7aa428fb3937fe703ea544212b782097950d51a7c35ef592e91f7208
iDefense Security Advisory 06.11.08 - Local exploitation of an integer overflow vulnerability in the X.Org X server, as included in various vendors' operating system distributions, could allow an attacker to create a denial of service (DoS) condition on the affected X server. The vulnerability exists within the ProcRenderCreateCursor() function. When parsing a client request, values are taken from the request and used in an arithmetic operation that calculates the size of a dynamic buffer. This calculation can overflow, which results in an undersized buffer being allocated. This leads to an invalid memory access, which crashes the X server. iDefense has confirmed the existence of these this vulnerability in X.org X11 version R7.3, with all patches as of 03/01/08 applied. Previous versions may also be affected.
8ee084f756e81279ec599dbaa545459efdc06ef3a6da7b39b149058126cb1b07
iDefense Security Advisory 06.11.08 - Local exploitation of an integer overflow vulnerability in the X.Org X server, as included in various vendors' operating system distributions, could allow an attacker to execute arbitrary code with the privileges of the X server, typically root. The vulnerability exists within the AllocateGlyph() function, which is called from several request handlers in the render extension. This function takes several values from the request, and multiplies them together to calculate how much memory to allocate for a heap buffer. This calculation can overflow, which leads to a heap overflow. iDefense has confirmed the existence of this vulnerability in X server 1.4 included with X.org X11R7.3, with all patches as of 03/01/08 applied. Previous versions may also be affected.
8af2a005f2bcb28930e75e027ff46599b31bf9c3361ab9c6cb6a2f8bbff1df5d
Syzygy CMS version 0.2.2 suffers from a local file inclusion vulnerability.
c2723df804ffefd144244ed162daa665f7bc98f77ebbfec54041ebb427a93ed5
Debian Security Advisory 1594-1 - Stefan Cornelius discovered two buffer overflows in Imlib's - a powerful image loading and rendering library - image loaders for PNM and XPM images, which may result in the execution of arbitrary code.
fbf8fd0c02278843b6f777e8167523433a53cd0698790bc57f9e0c8b89197723
Products from Xigla, such as Absolute Live Support XE, Absolute News Manager XE, Absolute Banner Manager XE, Absolute Form Processor XE, Absolute Image Gallery XE, Absolute Poll Manager XE, and Absolute Control Panel XE all suffer from cross site scripting and/or SQL injection vulnerabilities.
b097b8dc49b923f478afb2ab38d9012e47c350bf2a68d830775e86f79407e4cd
Secunia Security Advisory - A vulnerability has been reported in NetScout Visualizer and InfiniStream, which can be exploited by malicious users to perform certain actions with escalated privileges.
a2dd5ca89700b456f3dcab9244fbbd027e7b5acc9139be2460879c18c0ae97b9
Secunia Security Advisory - A vulnerability with an unknown impact has been reported in IBM OS/400.
19f02d8f6841b510cad7fc6ce61c86841abba36a153edb6ceaa1003575683cf5
Secunia Security Advisory - Some vulnerabilities have been discovered in Todd Woolums ASP News Management, which can be exploited by malicious people to disclose potentially sensitive information and conduct SQL injection attacks.
2e0b065111b80cba51ee36c064faac19624148217826c615796d9306d4383d81
Secunia Security Advisory - Tan Chew Keong has reported a vulnerability in net2ftp, which potentially can be exploited by malicious people to disclose sensitive information, delete certain files, and compromise a vulnerable system.
aad9ea26dd89c66f9046ffefbcac5111443be6fcfc3b38c0fa704172c46690c2
One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.
15b8515de677f63423d3d174fb60d055cc8de74c354127b75834a87bb27d455f
One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.
6b5da090df24ba0f79cb3eeed5c758f29812549afc802e9259cabefba68d8a71
One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.
7e46d47db702acacd501a6abe5b7eafb0ea0642bc0bdea15b8f0bf28a04ce865
One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.
89a88638ec65d54f58fd3a0a40046b10440b44df56340aa134d164065449b661
One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.
e7b9886ff3a26ac9d151ccebacb427ad90f13c41ee7167e7fda012c307c2db08
One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.
ad85996c9f1da29ecf1af16ed8a0f2e0956d841cc11f9ee5a5480c2446ceb0bb
One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.
395daee97eeb077d8551ab16db1d21a459650c084f6a45e1d8d715404e61c14d
One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.
096dcf6a87e56adf0aac64e919d78890397942753cf169654275e6db1f5eb6a8
PHP GUI for the Xplico open source network forensic analysis tool.
5024a4a5896276b861c8306e55bd136b54baca47cab0878ca55ff8dc58c98957
Xplico is an open source Network Forensic Analysis Tool (NFAT) that allows for data extraction from traffic captures. It supports extraction of mail from POP, IMAP, and SMTP, can extract VoIP streams, etc.
1a4ab3b53f981aa4022c3313865763c8b67fd5e63f859c3c62366a437817e5bc