Under some configuration conditions, a user of RSA Authentication Agent 7.1 for Windows or RSA Authentication Client who has privilege to access a desktop or a server is incorrectly able to do so with only Windows credentials.
5a9444bd17d38c5e1f3c2a5ce0ae8642
IFOBS suffers from cross site scripting and cross site request forgery vulnerabilities.
f5a95bb79b80681cce9798f4319344b7
Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86_64 version.
8bd834f03e393fd346b04e1688b0de04
Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86 version.
efc12187fdcdb1322d667c0e4907bc6b
Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. MIPS version.
29be91cbbea1d49e48c1dff1e615773b
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
0b79c1fb3a4a836cc56644e4bc3d6490
ipset allows administration of sets of IP addresses/networks, ports, MAC addresses, and interfaces, which are stored in hash or bitmap data structures. These can then be used in conjunction with iptables to do fast presence lookups.
70f2d4c054592236dcda285855a4ee58
Ubuntu Security Notice 1581-1 - Marc Schoenefeld discovered that Ghostscript did not correctly handle certain image files. If a user or automated system were tricked into opening a specially crafted file, an attacker could cause a denial of service and possibly execute arbitrary code with user privileges.
2b06664821f21d56efe5814d81015ef5
Gentoo Linux Security Advisory 201209-6 - Multiple vulnerabilities have been found in Expat, possibly resulting in Denial of Service. Versions less than 2.1.0_beta3 are affected.
8bc7845bc16ff6a87259c1ef6916c090
Gentoo Linux Security Advisory 201209-5 - Multiple vulnerabilities have been found in LibreOffice, allowing remote attackers to execute arbitrary code or cause a Denial of Service. Versions less than 3.5.5.3 are affected.
44b9182331c07f97b324ae81e5f38065
Debian Linux Security Advisory 2551-1 - Glen Eustace discovered that the ISC DHCP server, a server for automatic IP address assignment, is not properly handling changes in the expiration times of a lease. An attacker may use this flaw to crash the service and cause denial of service conditions, by reducing the expiration time of an active IPv6 lease.
ad74b5d5e908f783b36e4a0dd4627a94
Gentoo Linux Security Advisory 201209-4 - Multiple vulnerabilities have been found in BIND, the worst of which may allow remote Denial of Service. Versions less than 9.9.1_p3 are affected.
772058c5f68b14e9fad5087d7b1a9380
Gentoo Linux Security Advisory 201209-3 - Multiple vulnerabilities were found in PHP, the worst of which lead to remote execution of arbitrary code. Versions less than 5.3.15 are affected.
3a7b11ddafda5c0c062b3746c3db17dd
Gentoo Linux Security Advisory 201209-2 - Multiple vulnerabilities in libTIFF could result in execution of arbitrary code or Denial of Service. Versions less than 4.0.2-r1 are affected.
b1e333c1e644cbcc9addafc4e21e030b
Secunia Security Advisory - A weakness and a vulnerability have been reported in IBM Installation Manager, which can be exploited by malicious people to conduct spoofing and cross-site scripting attacks.
1b02207a83ae7f83039c8bb45b9e4e27
Secunia Security Advisory - Gentoo has issued an update for php. This fixes a weakness, a security issue, and multiple vulnerabilities, which can be exploited by malicious people to conduct brute force attacks, disclose certain sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system.
3a438f5efce42bd3a406527b35f6442e
Drupal version 7.15 suffers from multiple path disclosure vulnerabilities.
fe65325d48ea82b24f25a6a0918cf121
Sites designed by TapIn Solutions LLC, LetUsPlay, and SmartCreations suffer from a remote SQL injection vulnerability. Sites designed by infobigs suffer from a local file inclusion vulnerability. Sites designed by Morgane and mc-creation suffer from a cross site scripting vulnerability. Note that these findings house site-specific data.
7c3b4c0cb18b56065e26c2263d2d0bb3
Secunia Security Advisory - Ubuntu has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users, by malicious, local users in a guest virtual machine, and by malicious people to cause a DoS (Denial of Service).
c13f40f1eab088118ea311bdbbd4e269
Secunia Security Advisory - Gentto has issued an update for tiff. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise an application using the library.
1efaa94e967a96f85be77572c8eae4e7
Secunia Security Advisory - Debian has issued an update for isc-dhcp. This fixes a security issue, which can be exploited by malicious people to cause a DoS (Denial of Service).
6dbfc42db50a7fd0cfb30cdb15a1b1e8
Secunia Security Advisory - A vulnerability has been discovered in the Notices Ticker Plugin for WordPress, which can be exploited by malicious people to conduct cross-site request forgery attacks.
c0d5cfa128d71bcbd690755869898160
Secunia Security Advisory - Gentoo has issued an update for libreoffice. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information and compromise a user's system
dfd57cbbf26228d2bd496e718949cbea
Secunia Security Advisory - Gentoo has issued an update for expat. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).
0fbd496f7b5a1b0fad6ea896cee60559
Secunia Security Advisory - A vulnerability has been reported in gpEasy CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.
d2489c2fba42b19fee58f352eb1efc36