Secunia Security Advisory - NT has reported a vulnerability in exoops, which can be exploited by malicious people to disclose sensitive information.
705b58195a86feeb14e4eab0687cf4840131151242c2a3e0bb42df9fee96d609
Secunia Security Advisory - A vulnerability has been reported in LTris, which can be exploited by malicious, local users to gain escalated privileges.
0b41f7a104b397b75a758f3bea3929f0f2d85b9f4e034cf67b806b8c07f8e9ee
Secunia Security Advisory - Some vulnerabilities have been reported in the Linux kernel. One has an unknown impact, and the others can be exploited to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
407304cc1e0d1a73481b0c624354726b51a728e49b422bb6fad81b7e4a8d0266
Secunia Security Advisory - NOAA NCIRT Lab has reported some vulnerabilities in NotifyLink Enterprise Server, which can be exploited to disclose sensitive information, bypass certain security restrictions, and conduct SQL injection attacks.
4d408d715d9dbc5c8eed6df38cca8d883baead0561a686a58bafea47b4a9b46d
Secunia Security Advisory - Kozan has discovered a security issue in iPool and iSnooker, which can be exploited by malicious, local users to disclose sensitive information.
511c4d2b830897f78141ded7e95575bf1a6b366acdfc28da11c748a8850df4d5
Secunia Security Advisory - Secunia Research has discovered a vulnerability in My Firewall Plus, which can be exploited by malicious, local users to manipulate the content of arbitrary files on a vulnerable system.
28ebc6dc665677204d84fe2ab1c3bfd0805156e4637441988221a7d193660885
Secunia Security Advisory - ISS X-Force has reported a vulnerability in multiple McAfee products, which can be exploited by malicious people to compromise a vulnerable system.
9f665a32d8c9ab32dd957fe6016cf226e5bbb273af5fbbf817f3d0a976c29488
fwknop is a flexible port knocking implementation that is based around iptables. Both shared knock sequences and encrypted knock sequences are supported. In addition, fwknop makes use of passive OS fingerprinting signatures derived from p0f to ensure the OS that initiates a knock sequence conforms to a specific type. This makes it possible to allow, say, only Linux systems to connect to your SSH daemon. Both the knock sequences and OS fingerprinting are completely implemented around iptables log messages, and so a separate packet capture library is not required.
cc78b9428e15e70890d6f053d4858871508416a5f26d141773d0f19d695197be
Os-sim attempts to unify network monitoring, security, correlation, and qualification in one single tool. It combines Snort, Acid, MRTG, NTOP, OpenNMS, nmap, nessus, and rrdtool to provide the user with full control over every aspect of networking or security. Supported platform is Linux.
5a9a9d3c040925a64cb058fee06106c436cbfdebe6217dfa97a7e514e06327a6
Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.
85bbb5384f314f1326bb3aa5d7c2532903781c593606a941c95238ae5e163a2b
alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.
ffcfcd3e9b911f6b3a0cddae8d5c9a361d3e7e7fa4b171ce091fb47a3ee0ca4c
The Umbrella security mechanism implements a combination of process-based Mandatory Access Control (MAC) and authentication of files through Digital Signed Binaries (DSB) for Linux based consumer electronics devices ranging from mobile phones to settop boxes. Umbrella is implemented on top of the Linux Security Modules (LSM) framework. The MAC scheme is enforced by a set of restrictions on each process. This policy is distributed with a binary in form of execute restrictions (in the file signature) and within the program, where the developer has the opportunity of making a restricted fork.
f2a02dad61810591cd43f457b9e8da66eaad90f9f495027ac6ebe526104545fd
PHPOpenChat version 3.x is susceptible to multiple cross site scripting vulnerabilities.
eb640f8cd71386f8b9bcd2ff6d49201c80d343e38dfeb94f3d88ebb58c229c92
Linux kernel versions up to and including 2.6.11 has various bugs in the ISO9660 filesystem handler code that can cause denial of service conditions. Script included that tests for this.
3b9fb06993c1ae8e5272ced026e456981eb915235b15ab9645b2d41729a0dc8d
Denial of service exploit that makes use of a format string vulnerability in MailEnable Standard Edition 1.8.
8a00478be0a8dc102229ae0af5901d3d9b81f6f9a086a712f08d589f8d2b366a
Secunia Security Advisory - Piotr Bania has reported a vulnerability in IDA Pro, which can be exploited by malicious people to compromise a user's system.
3408ab6fe8135801ed51c86b127361d703b329c58c8651d3829dd647c7e5ae71
Gentoo Linux Security Advisory GLSA 200503-21 - Joseph VanAndel has discovered a buffer overflow in Grip when processing large CDDB results. Versions less than 3.3.0 are affected.
521305c4cd1409fa5f3c639d54fcd771ed2be1d2a91d11aefc6fc4696b31de82
Secunia Security Advisory - A vulnerability has been reported in Novell Netware, which can be exploited by malicious people to bypass certain security restrictions.
3e58ad013d4bc3e44a921cb403340fbfebfe88b5bc14de646c8886a87f3e3914
Secunia Security Advisory - A vulnerability with an unknown impact has been reported in Initial Redirect.
eba00e223d0fbe84550de71fdbf67b2a8e2424c8976673607423735109fd4c96
Secunia Security Advisory - Michael Starks has discovered a vulnerability in Servers Alive, which can be exploited by malicious, local users to gain escalated privileges.
6a5d8deac4de4d6d500385128f3746c3f86713b7e3ea2996a19d606d4f333234
The Windows 200 GDI32.DLL GetEnhMetaFilePaletteEntries() API is susceptible to a denial of service attack via a specially crafted EMF file.
78e2a3948f1c55339a125f4f6c9aa0b3d4c43370c7310ab6f84798a227ddd5f7
ACS Blog versions 0.8, 0.9, 1.0, and 1.1b are susceptible to a cross site scripting attack.
9634efdc4bce5f31e9237587c749bc7aa0fdaed90c7aac12c14dda7f5166353e
Secunia Security Advisory - A vulnerability has been reported in LSH, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).
f6c2cb39f34752ec1298b55be290a6afbe18b29d84cc60b9217b79bbd396e94e
The Includer is susceptible to a classic directory traversal flaw.
54583911fad5c3ca95b65240cb846e00bae518d346af5e082ed018982f1ffc47
mcNews versions 1.3 and below suffer from a remote file inclusion vulnerability.
f9e9ec34c301312d7e617b7e6cf832abe7df9d917c55413d2e0a5d1891281851