Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.
8cd4ffd3e9ce8c519665215549971586b664385a5392246824a5eb3b4b4ba121
Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference.
094a54277805905742060da5052c713064a686d8a1ae4245817b9312a8c8ac12
GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.
5881882f4da120ce1c71da64468392704b391ca7652ddc512bc4f1d8968f0d1c
Firewall Builder consists of a GUI and set of policy compilers for various firewall platforms. It helps users maintain a database of objects and allows policy editing using simple drag-and-drop operations. The GUI and policy compilers are completely independent, which provides for a consistent abstract model and the same GUI for different firewall platforms. It currently supports iptables, ipfilter, ipfw, OpenBSD pf, Cisco PIX and FWSM, and Cisco routers access lists.
e1a0294b875443b04d6afa8dded2a8dfb102925040bd6b177ab2a628a10231ec
Anantasoft Gazelle CMS suffers from a cross site request forgery vulnerability.
a14362560ff7768b718cea04d0245c6a007f69091c2e9368fbba77276da41755
Secunia Research has discovered security issue in Employee Timeclock Software, which can be exploited by malicious, local users to disclose sensitive information. The security issue is caused due to the application passing the database password via the command line to the "mysqldump" utility, which potentially can be exploited to disclose the password via the process list. Version 0.99 is affected.
c121eab4b6b14b7e6b0057b834916031f50a684b99bfd9ae840f8820a4494bc8
Secunia Research has discovered some vulnerabilities in Employee Timeclock Software, which can be exploited by malicious people to conduct SQL injection attacks. Input passed to the "username" and "password" parameters in auth.php and login_action.php is not properly sanitized before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Version 0.99 is affected.
5795aa2f7b68c3c5da9b0bfedba7c22c43d0eb18d3b5231dfd1bb899c4d043f4
The MS HTML Help control activex is prone to a remote CHM help file hijack vulnerability when applications invoke help. Multiple built-in applications are vulnerable to this. The impact of the vulnerability is the loading of the incorrect CHM help file when it resides in the same directory the application invoking help starts in. This proof of concept exploit leverages Notepad to demonstrate the vulnerability.
d554dfbaf395542e7dbce75391389ccf6d9ee1129f374497120bd915602e661e
GNU Tar and GNU Cpio suffer from a heap-based buffer overflow vulnerability. Tar versions prior to 1.23 and Cpio versions prior to 2.11 are affected.
d24150b634cab2351df08efe4449b09dfe98932abdb966b3ab00c97293fcd9c2
ispCP Omega versions 1.0.4 and below suffer from a remote file inclusion vulnerability.
922baf86deec0ef3869626898eb0df9096550f52df4a9958aa6bdb9dea17a9ce
Secunia Research has discovered security issue in Employee Timeclock Software, which can be exploited by malicious people to disclose sensitive information. The database backup functionality stores the database backup with a semi-predictable file name inside the web root. This can be exploited to download the backup by guessing the file name. Version 0.99 is affected.
791197339282ae1c20bc6bc0ce2857c777981663ae904b29ba627e0864d2d08b
Httpdx version 1.5.3 remote break services exploit.
b8808a28a386f0d8c3d59aba63de1cbb3609069df25b542a052e8ac8dd7877b7
Softbiz Jobs and Recruitment script suffers from a remote SQL injection vulnerability.
70d6542d3bfa7b4b543751a1e4201dd5c80a482d5106d8ac17aa17f93a9a3875
Campsite version 3.3.5 suffers from a cross site request forgery vulnerability.
eb0d01c2a930fc31d717fa16a939f6a78c269961cbbb5fd5db5f784cfc57e10a
iDefense Security Advisory 03.09.10 - Remote exploitation of a heap overflow vulnerability in Microsoft Corp.'s Excel could allow an attacker to execute arbitrary code with the privileges of the current user. This vulnerability occurs when parsing an MDXTUPLE record inside of the Excel Workbook globals stream. This record is used to store metadata for external data connections in the workbook. The vulnerability occurs when a MDXTUPLE record is broken up into several records. This could allow an attacker to trigger a heap based buffer overflow by controlling both the allocation size of a heap buffer and the number of bytes copied into this buffer. iDefense has confirmed the existence of this vulnerability in Excel versions 2007 SP0, SP1, and SP2. Previous versions do not appear to be affected as they do not support parsing the record that triggers the vulnerability. A full list of vulnerable Microsoft products can be found in Microsoft Security Bulletin MS10-017.
0ce96e514152fd2e39a14f6d90a2f11df679f07a29a783acaf69ad7b35b46079
iDefense Security Advisory 03.09.10 - Remote exploitation of a heap overflow vulnerability in Microsoft Corp.'s Excel could allow an attacker to execute arbitrary code with the privileges of the current user. This vulnerability occurs when parsing an MDXSET record inside of the Excel Workbook globals stream. This record is used to store metadata for external data connections in the workbook. The vulnerability occurs when a MDXSET record is broken up into several records. This could allow an attacker to trigger a heap based buffer overflow by controlling both the allocation size of a heap buffer and the number of bytes copied into this buffer. iDefense has confirmed the existence of this vulnerability in Excel versions 2007 SP0, SP1, and SP2. Previous versions do not appear to be affected as they do not support parsing the record that triggers the vulnerability. A full list of vulnerable Microsoft products can be found in Microsoft Security Bulletin MS10-017.
77193ef3d20874264fedaa93e9df41c77a445408a2adbf53e0f52c7a05ed79da
iDefense Security Advisory 03.09.10 - Remote exploitation of an uninitialized memory vulnerability in Microsoft Corp.'s Excel could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability occurs due to Excel using a local function variable without properly initializing it. This error occurs when parsing several related records inside of an Excel worksheet. When Excel parses certain records in a particular order, a stack variable may not be initialized properly. If an attacker can control the area of memory used for this variable, then it is possible to execute arbitrary code on the targeted host. iDefense has confirmed the existence of this vulnerability in Excel versions 2003 SP3, 2007 SP0, SP1, and SP3 . Previous versions do not appear to be affected. A full list of vulnerable Microsoft products can be found in Microsoft Security Bulletin MS10-017.
afa32145630344b33f79a25b11bebbadfa235ce38636dab4c79747202fc7a5aa
60cycleCMS suffers from a cross site scripting vulnerability.
1c69f37ffd88f7490f360b12e525ef5c98f2e57f042a7e9801d91d5b7b542713
iDefense Security Advisory 03.09.10 - Remote exploitation of a type confusion vulnerability in Microsoft Corp.'s Excel could allow an attacker to execute arbitrary code with the privileges of the current user. This vulnerability is a type confusion vulnerability that occurs when parsing several related Excel record types. In this case, the type confusion is due to multiple records containing fields that identify the type of an object shared between them. By controlling memory outside of the bounds of the allocated heap chunk, an attacker can control a C++ object pointer used in a virtual function call. This can result in an area of memory being treated as a different type of object than it actually is, resulting in access outside of the bounds of the allocated object. iDefense has confirmed the existence of this vulnerability in all currently supported versions of Excel (2007 SP1/SP2, 2003 SP3, XP SP3), and also the currently unsupported Excel 2000 SP3. A full list of vulnerable Microsoft products can be found in Microsoft Security Bulletin MS10-017.
c520fac0cdcddff6b7b4da53bb2adfa8b2b1a95fa9ea34bc2f2783cc46550ee5
Friendly-Tech FriendlyTR69 CPE remote management version 2.8.9 suffers from a remote SQL injection vulnerability.
58ccac000cdd3134afda51cec0b760989d3af73eaba4ecc1194b1016dcfa7bd1
Hydra CMS suffers from cross site scripting and remote SQL injection vulnerabilities.
7ae091808029de57dae5ca81b731c5d50b7cabf9a9cc60641fdd0bbdb3afd67c
Debian Linux Security Advisory 2009-1 - It was discovered that tdiary, a communication-friendly weblog system, is prone to a cross-site scripting vulnerability due to insufficient input sanitizing in the TrackBack transmission plugin.
cdca26ab67f9ac1397b3b3bac93f82b4d5e9f6681824ba915f69fb788823a63a
Secunia Security Advisory - Fedora has issued an update for curl. This fixes a security issue, which can potentially be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library.
c2f2fafaf0080eae469ddb3344957bb02f2937f571fccb93be1c76717a466376
Secunia Security Advisory - A security issue has been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
5697b5fef706b4fbc0289cc51a7ebe9b05fd54169c1611793cdec3f16de4765b
Secunia Security Advisory - Fedora has issued an update for bournal. This fixes multiple security issues, which can be exploited by malicious, local users to disclose sensitive information and to perform certain actions with escalated privileges.
e77a8dac2e6a1bb2a27496c3da182b53e3bb42784dc329303bb2e150a0ad595c