Secunia Security Advisory - Luigi Auriemma has reported a vulnerability in TinCat, which can be exploited by malicious people to compromise a vulnerable system.
322cf44be8ff87620d4f2b34bb9aa7b603469d22c37e75c76ce5c1e004b950d1
Secunia Security Advisory - Diabolic Crab has reported some vulnerabilities in PhotoPost PHP Pro, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
9d1251930cef06dc9b96f758bac21d611c582fbce27e9f2e6a43abd1934287e3
Secunia Security Advisory - Chris Rock has reported a vulnerability in NetComm NB1300, allowing malicious people to cause a DoS (Denial of Service).
e3700bf8f764493dea523cfed304de0764eb1271047ec2dc239a88f4be95f61f
Secunia Security Advisory - Isamu Noguchi has reported two vulnerabilities in Symantec Norton AntiVirus, which can be exploited by malicious people to cause a DoS (Denial of Service).
44e061bde973e6d0fd3ec625d27b10cc456040a9dda91ed775aa5c98e3ba4769
Secunia Security Advisory - Frank brOmstar Reissner has reported a vulnerability in EncapsBB, which can be exploited by malicious people to compromise a vulnerable system.
e1fde4d03f21104f9f25ddac79bcc14352a50cf8480524dbf66f1de99311e292
Secunia Security Advisory - Diabolic Crab has reported some vulnerabilities in Valdersoft Shopping Cart, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
01a6dd376229849dc0d4b8eb6d1fa4916dcbe37b1aa50f520d5ac3c809c16948
Secunia Security Advisory - Two vulnerabilities have been reported in Antigen for Domino, which can be exploited by malicious people to cause a DoS (Denial of Service).
7b37f7a1d2a645760389860ef3076b8085209415b443e3d736c9c7490dbfb437
Secunia Security Advisory - infamous41md has reported some vulnerabilities in Smail-3, which potentially can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a vulnerable system.
c1152da0d57a90998194a52a5bec57b5c1d0272a7f8aefe714a7a34140d6b07d
Secunia Security Advisory - Multiple vulnerabilities have been reported in the Linux kernel, which can be exploited to disclose information, cause a DoS (Denial of Service), gain escalated privileges, or potentially compromise a vulnerable system.
e77fd343861a3eeef712bcbd9fd174789b244fa0f8fb8fcd0619aaeb02c6b1b3
Secunia Security Advisory - Multiple vulnerabilities have been reported in WackoWiki, which can be exploited by malicious people to conduct cross-site scripting attacks.
d5c5e2f6e116679a75f589628445fff0b5f3b0eb683396fe3ce43ff3a61e10ca
Secunia Security Advisory - Donnie Werner has reported a vulnerability in E-Data, which can be exploited by malicious people to conduct cross-site scripting attacks.
97e3bac1d56bac5d4427900a7fd74464dc471bef67d261ab7d47889acca2edb7
Secunia Security Advisory - Luigi Auriemma has reported a vulnerability in Sacred, which can be exploited by malicious people to compromise a vulnerable system.
fcc85ddccaa3037be324238d4ec5030f90993855d85dff57990d37cbad458b27
Secunia Security Advisory - Luigi Auriemma has reported a vulnerability in The Settlers: Heritage of Kings, which can be exploited by malicious people to compromise a vulnerable system.
59735ed172f228e6eef49b6eac899527784bc2f72b8d71668ba0d3385dd018d0
MIT krb5's supplied telnet client is vulnerable to buffer overflows in the functions slc_add_reply() and env_opt_add(). These can be exploited by a malicious server to which the client is trying to connect.
e4c1476ad7afba11079985f9690f65b19a9f0750826a16ff4f4d3bf05f3d8da9
Secunia Security Advisory - A vulnerability has been reported in Smarty, which can be exploited by malicious people to bypass certain security restrictions.
f5001cf5cd35592cacc83ae523ab9aa51805228767b10545dbb32eb310544cf7
Secunia Security Advisory - Gael Delalleau has reported two vulnerabilities in Kerberos V5, which can be exploited by malicious people to compromise a vulnerable system.
8d77c0524576df8beefe2fa2340b441c05a2f186b4492e6fd771811835f33ac6
Whitepaper discussing the use and setup of SFTP in the business place.
052c8fbeded90b605ab6795770b8ba0e89ec1e1dae6c1741e49090e771529bb1
Iron Bars SHell is a restricted Unix shell. The user can not step out of, nor access, files outside the home directory. Two ASCII configuration files are used for more control. The system administrator can define which commands may be executed by the user. No other executables are allowed. The admin also has the opportunity to define what kind of files the user may create. If a file has a certain extension (such as .mp3, .c, etc.), ibsh automatically erases it.
9a2cef47abd5caa27076db8a28060b9ab94e7678e57aad299fdce735b7b099ae
The Linux Intrusion Detection System (LIDS) is a patch which enhances the kernel's security by implementing a reference monitor and Mandatory Access Control (MAC). When it is in effect, chosen file access, all system/network administration operations, any capability use, raw device, memory, and I/O access can be made impossible even for root. You can define which programs may access specific files. It uses and extends the system capabilities bounding set to control the whole system and adds some network and filesystem security features to the kernel to enhance the security. You can finely tune the security protections online, hide sensitive processes, receive security alerts through the network, and more.
565021bb9e0539ec81c98acd63a4c0549afb0521bf1f38458fe8c4be5711574d
Wepdecrypt is a wireless LAN tool based on wepattack that guesses WEP keys using an active dictionary attack, a key generator, a distributed network attack, and some other methods.
3db0be559dbe7bcd566eec14bbe223bce313111a82237de8b8433c43779a53ec
Multiple SQL injection and cross site scripting vulnerabilities have been discovered in AspApp. Sample exploitation provided.
03e90c2cb4195bc7bc382495197baedd3e0d909a18bcfb755d1062bb38afca07
Multiple SQL injection and cross site scripting vulnerabilities have been discovered in PortalApp. Sample exploitation provided.
ef8774a270f7cf5c3c385dd44115e3f3ab80760745b1a26d5d9c111db428ebee
ACS Blog version 1.1.1 is susceptible to multiple cross site scripting attacks.
0c6942c90bd3e4344142bcb9a42ec2ca5feae9635b10587ede08a046069e3c05
Remote root exploit for the preparse_address_1() heap buffer overflow in Smail versions 3.20.120 and below.
03fa4cf4484ee5197112b1be3896401a73baeca9c53af9ffcfb129454017221e
Photopost PHP Pro Photo Gallery software is susceptible to multiple cross site scripting and SQL injection attacks. Detailed exploitation provided.
37b9312ab67645bf7aa36fdc72203dd12b60bfbd3bfb1f48fa1936e2f2486c61