Debian Security Advisory DSA 898-1 - Several vulnerabilities have been discovered in phpsysinfo, a PHP based host information application.
c7619e34f0202f1767d8efde397aed15459fad6c27137844169689edb036be56
KAPDA Advisory - XMB version 1.9.3 Nexus (Final) and 1.9.2 Nexus are susceptible to cross site scripting and html injection flaws.
297f8291e00f8750c205028ac1f0e9e23651d985c7c5fbfc6d74a6faf8f0d6f4
The Senao SI-680H VoIP Wifi phone has an undocumented port open that allows unauthenticated access to the phone's underlying OS.
de336cc4f4b15e32148573dbaca2b86835246eb66563ca4a8247945108b42625
The Zyxel P2000W (Version1) VoIP Wifi phone allows for unauthenticated access to data and has hardcoded DNS servers.
1e2fbed88d59e172dfe0fda2ea703ffdb67f69f212bebb47087fa4967df6a549
The UTstarcom F1000 VoIP Wifi phone suffers from multiple vulnerabilities including unauthenticated access and default logins.
f9e6e916bb0e3801a0e07f4deb65e90a49d074a92ca5c39ef38652296296a642
Hitachi IP5000 VoIP Wifi phones suffer from multiple vulnerabilities including a hard coded administrator password, an undocumented shell on tcp/3390, and management of the devices without proper credentials.
3fc76b0a8c041d6233c0d5ce2c8893ad965a07c24340c8183fa546480d2e1c69
Pop 3 scan is a full transparent proxy server for POP3 clients. It runs on a Linux box with iptables (for port redirection). It can be used to provide POP3 email scanning from the Internet to any internal network, and is ideal for helping to protect your Other OS LAN from harm, especially when used in conjunction with a firewall and other Internet proxy servers. It is designed to enable scanning of incoming email messages for viruses, worms, trojans, spam, and harmful attachments. Because viewing HTML email can enable a spammer to validate an email address (via Web bugs), it can also provide HTML stripping.
2c51185caddde414de13f7de9b94986145a6519deac1de655f38538113122329
Prelude Manager is the main program of the Prelude Hybrid IDS suite. It is able to register local or remote sensors, let the operator configure them remotely, receive alerts, and store alerts in a database or any format supported by reporting plugins, thus providing centralized logging and analysis.
a275300652ac28527c2ce208744f7d62d6631ef0a0a3f4310d71c4b7c76aca8d
strongSwan is a complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels. It interoperates with most other IPsec-based VPN products. It is a descendant of the discontinued FreeS/WAN project. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A unique feature is the use of X.509 attribute certificates to implement advanced access control schemes based on group memberships.
8195ce5c5576ba63fec4e12f23fa4f91cc90e4ca35b004b1a59bc272949b64bb
Mandriva Linux Security Advisory - Updated egroupware packages to address phpldapadmin, phpsysinfo vulnerabilities.
4c7153c16054a380d5a7b9f4b9ed2f8422a15efd41e1749ec592bb4a858174fc
HP Security Bulletin - Potential vulnerabilities have been identified with the HP Jetdirect 635n IPv6/IPsec Print Server (J7961A) . These vulnerabilities may be exploited remotely by an unauthorized user to create a Denial of Service (DoS).
696d019004f955d917c4efa764dd04b1cbf1b86dc6fea0896d29c6a6371860af
HP Security Bulletin - Potential vulnerabilities have been identified with HP-UX running IPSec. These vulnerabilities may be exploited remotely by an unauthorized user to create a Denial of Service (DoS).
9248f75065b73d052535b248ae95a08a659fa4f1cd08c0ba863bb60a294b7fa2
HP Security Bulletin - Potential security vulnerabilities have been identified with Apache running on HP-UX. These vulnerability could be exploited remotely to allow execution of arbitrary code, Denial of Service (DoS), or unauthorized access.
0c88cd43198ceaaa105ad00fd4c4738c239da351f3bb32f882c51ff2df83961b
Cisco Security Advisory - The Cisco 7920 Wireless IP Phone provides Voice Over IP service via IEEE 802.11b Wi-Fi networks and has a form-factor similar to a cordless phone. This product contains two vulnerabilities: The first vulnerability is an SNMP service with fixed community strings that allow remote users to read, write, and erase the configuration of an affected device. The second vulnerability is an open VxWorks Remote Debugger on UDP port 17185 that may allow an unauthenticated remote user to access debugging information or cause a denial of service. Confirmed vulnerable: Cisco 7920 Wireless IP Phone, firmware version 2.0 and earlier.
e804956fd97eb0bd0b7fd8794d6e295d413c65ced5fc2ad00ed87ebbad7b84a5
Mambo suffers from a code inclusion flaw.
db8e9335ae23d1277414c5b31c84a68cd19024857680ee40b771e8bf54fff983
Remote proof of concept buffer overflow exploit for the IMAP server in FTGate4 Groupware version 4.1.
407fcb6c333d58d2349fad1a8b780a19e4b7926bc74f534bc88f3a61e8b5177b
The IMAP server in FTGate4 Groupware version 4.1 is susceptible to a buffer overrun.
763f0181ed949d2cb1aaf4bdf5aa123194429ec774dbcc5a931d866e1ea72f0e
Whitepaper entitled "Database Servers on Windows XP and the Unintended Consequences of Simple File Sharing".
961bfed777c65e67a52ff50f80f30cc3225bb5fe84c5ae0b939ca30c781b8ef4
Kryptor is a graphical tool to encrypt files using the algorithm ARCS-256 bits. It is also possible to erase files by overwriting data with a pseudo-random sequence of bytes iterated three times, which will make data recovery a very complex operation.
a3705619eead095f15725a9ff0cc415932e6aad1a65535e4764adf693624bfa2
Revize(r) CMS is susceptible to SQL injection and cross site scripting attacks. Exploitation details provided.
dd1ed25f98fe01cfca72917e5e732ba9d6ca3112d046e105c1601701928ccbb6
A design flaw in PasswordSafe allows for quicker brute force cracking attempts.
5cba441313e89b00df5185e559ebc1f6aceaf29a9e02a60424f0b21d89a11067
Ubuntu Security Notice USN-216-1 - Two integer overflows have been discovered in the XPM image loader of the GDK pixbuf library. By tricking an user into opening a specially crafted XPM image with any Gnome desktop application that uses this library, this could be exploited to execute arbitrary code with the privileges of the user running the application. Additionally, specially crafted XPM images could cause an endless loop in the image loader, which could be exploited to cause applications trying to open that image to hang.
9d47bac50f9f174ef4e2eb447ba68ec38db6c3cedc45f640869d8d4239498296
PHPWebThings version 1.4 suffers from SQL injection, credential disclosure, and remote command execution vulnerabilities.
6be81293ca11a04a30ed83c549ba3d0dab5beb1adc40f38bc72c767652bbc5d7
XPFiremon is a system tray application that will monitor the settings and services associated with the Windows firewall to ensure they are running. If they are disabled a warning is popped up onto the screen and the system tray icon will turn red. The program allows the user to configure, start, and stop the firewall.
1fc4fa43f4d412ab36f7e288d5f816dadbe5f5d46fd643f8ba0309d71ed93a3b
Apple Security Advisory - Due to the way iTunes 5 for Windows launches its helper application, multiple system paths are searched to determine which program to run. This may allow a malicious user on the local system to create an environment where an alternate program will be executed by iTunes.
1ed058151d4f2e99d893d269007cc9a8a01e6bb7a95d98624cc109014b637794