There is a trick which may permit the bypassing of policies in technologies which do syscall filtering on the Linux x86_64 kernel. The trick is made possible by the fact that the 32-bit and 64-bit kernel tables are different, combined with the fact that a 64-bit process can make a 32-bit syscall and visa versa. The syscall "number" check can get confused and permit a syscall it did not intend to.
71f9f1ada6ae634228b54736464e7a4841b30f48b31c56977488fe81bf3eae53
Zero Day Initiative Advisory 09-009 - This vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of EMC AutoStart. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Backbone service (ftbackbone.exe) which listens by default on TCP port 8042. The process trusts a DWORD value from incoming packets which it arbitrarily calls. Exploitation of this issue leads to code execution under the context of the SYSTEM user.
03168685d09c641385efb9932f5f392b3a0f9d6eb6f7f074e45cd4620617038d
Oblog suffers from a cross site scripting vulnerability in err.asp.
62a649fb4053db569005a950fbaf9c6275827cf0a61f6c7c462615949fc08cd3