Gentoo Linux Security Advisory GLSA 200709-15 - An integer overflow vulnerability exists in the embedded ICC profile image parser (CVE-2007-2788), an unspecified vulnerability exists in the font parsing implementation (CVE-2007-4381), and an error exists when processing XSLT stylesheets contained in XSLT Transforms in XML signatures (CVE-2007-3716), among other vulnerabilities. Versions less than 1.5.0.11_p1 are affected.
7fdb4e744b2a4eb445e22ef57bcd9e629f2d1b917854102595d6f84a97a47497
New bypass shell for Linux servers. What you don't want to find lying around in your webroot.
406bc0cd44ee8416796f2a5e638f43e920086a09ef3a7eed8c7939e13adc3115
It appears that the Greek Web Election System suffers from remote file inclusion vulnerabilities.
aabdc11833b1cc110827e42ff3b3f3ba808474f20075dc62e8d901c3587f6e60
The GDI engine in Windows Live Messenger suffers from a malformed file overflow when handling specially crafted JPG/WMF/GIF/DOC/ICO files. Details on remote exploitation included.
bfc4c881be73b29f5578000f0b6ddc62a7a0e8d320bce7c318c403f6ec9ecd0b
Earlier versions of the Wordpress 2.0 branch are susceptible to two vanilla cross site scripting vulnerabilities in wp-register.php.
926d18fafb32a71ceede629f6854b332e6b8a3443676de42044243d4caab339d
Mandriva Linux Security Advisory - Numerous vulnerabilities were discovered in the PHP scripting language that are corrected with this update. Not just a couple, not a few, but many.
01d42bfc7015b848897634663e966d52f46f75ad839abd6b538db6357c46f4f2
eEye Digital Security has discovered multiple vulnerabilities within CA ARCserve for Laptops & Desktops (L&D), an enterprise-level backup software suite designed for workstations. The vulnerabilities can be utilized by an attacker to execute arbitrary code on a remote system anonymously over TCP/1900.
2c3fbc7b2a14abfd5c6627658fb14d28b20b7c63ec81bf6bcd5dcc180cd1adfc
iDefense Security Advisory 09.20.07 - Remote exploitation of multiple buffer overflow vulnerabilities in Computer Associates Inc.'s ARCServe Backup for Laptops and Desktops allows attackers to execute arbitrary code with SYSTEM privileges. The LGServer contains multiple vulnerable functions that handle network requests, several of which contain more than one vulnerability. All together there are nearly 60 buffer overflows in the LGServer. The majority of these are the result of copying remotely supplied strings into fixed-size buffers without validating that enough space is available. iDefense has confirmed the existence of these vulnerabilities in ARCServe Backup for Laptops and Desktops version 11.1 (Build 900) for Windows. Other versions may also be affected.
72c9521d69485fd2d5531c5609c4b4e539ccce5161f2e3b44db5b10798d90e23
iDefense Security Advisory 09.20.07 - Remote exploitation of an authentication bypass vulnerability in Computer Associates Inc.'s ARCServe Backup for Laptops and Desktops allows attackers to execute arbitrary code with SYSTEM privileges. This vulnerability specifically exists since the command handlers that service network requests do not check to see if the peer is authenticated. iDefense has confirmed the existence of this vulnerability in ARCServe Backup for Laptops and Desktops version R11.1 Build 900. Other versions may also be affected.
db8962587606f6d38f4340dd8301702ef16a85232946715121dda60d20bdfd7a
iDefense Security Advisory 09.19.07 - Remote exploitation of a sign extension vulnerability in ImageMagick, as included in various vendors' operating system distributions, allows attackers to execute arbitrary code. iDefense Labs confirmed that ImageMagick version 6.3.4 is vulnerable. It is suspected that other versions of ImageMagick are also vulnerable.
f15006e42c189c3db2bf727e6128cafe43dfd9f11ab3e04f180f7aaa700c2726
iDefense Security Advisory 09.19.07 - Remote exploitation of multiple denial of service vulnerabilities in ImageMagick, as included in various vendors' operating system distributions, allows attackers to consume excessive CPU resources on the target system. The first vulnerability exists in the ReadDCMImage() function. Since the return value of ReadBlobByte() is not properly checked, it can enter an infinite loop. The second vulnerability exists in the ReadXCFImage() function. Since the return value of ReadBlobMSBLong() is not properly checked, it can enter an infinite loop. iDefense Labs confirmed that ImageMagick version 6.3.4 is vulnerable. It is suspected that other versions of ImageMagick are also vulnerable.
0a5c70db502c3a5cf0ea526562f6fa2b0f92c51300e22a74037a7ad48f2d63fc
iDefense Security Advisory 09.19.07 - Remote exploitation of an off-by-one vulnerability in ImageMagick, as included in various vendors' operating system distributions, allows attackers to execute arbitrary code. iDefense Labs confirmed that ImageMagick version 6.3.4 is vulnerable. It is suspected that other versions of ImageMagick are also vulnerable.
6e14652fd891c0ae053226ed97e3c1707acb9c431d9f1925d4a9ea997f01bbd4
iDefense Security Advisory 09.19.07 - Remote exploitation of multiple integer overflow vulnerabilities in ImageMagick, as included in various vendors' operating system distributions, allows attackers to crash applications using the ImageMagick library, and in some cases, execute arbitrary code. Several integer overflow vulnerabilities have been identified in ImageMagick's handling of various file formats. By creating a specially crafted DCM, DIB, XBM, XCF, or XWD image file, an attacker can cause a heap buffer of insufficient size to be allocated. This results in a heap-based buffer overflow. iDefense Labs confirmed that ImageMagick version 6.3.4 is vulnerable. It is suspected that other versions of ImageMagick are also vulnerable.
5b1330bd7f39749529500cc92bdb0c3b934975d17ff694e3d5b0edf375532508
GreenSQL is susceptible to a permanent cross site scripting vulnerability.
6ee0756407142504541c0f700584615598beaa3a0403bd66dae0a00a9a3793e4
CA ARCserve Backup for Laptops and Desktops contains multiple vulnerabilities that can allow a remote attacker to cause a denial of service condition or execute arbitrary code.
5454620d885de990b879969d7c8d672b34a987080f8b5bfd71c41320e3bc6593
A vulnerability allows remote attackers to extract IP addresses visited through the SOCKS4 Proxy on vulnerable ISA Server installations. Authentication is not required to exploit this vulnerability. This specific flaw exists when an empty packet is sent to the SOCKS4. The server will return a packet containing the last IP address it proxied to.
f30d0f1e2eb43b479f7d970aebd91125dc694b6b614b48a7bc103ad84491b0bc
The NetSupport Manager client that listens on TCP port 5405 does not properly handle authentication sessions. It is possible to pose as the NetSupport Manager, associate to a client, and then issue commands without performing the authentication sequence. Both the basic and advanced authentication schemes can be bypassed in the same manner. When properly exploited, this flaw will results in a complete compromise of the target system. Version 10.20 is susceptible.
a7aa7a89ba82c8c08a48411e2af71abe65594cf6df8a1bfd651ca4314c53d9df
The Barracuda Spam Firewall with firmware version 3.4.10.102 suffers from a cross site scripting vulnerability.
73c210a75e96db9b0ef220f0c9d717f3b8fe755f378c8347463d89062fd2a53e
Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.
a46610fc761e61f4f85750693f6e17aafa3a47e24e8cef76401f67d25e94d186
EB Design Pty Ltd suffers from multiple remote vulnerabilities in EBCRYPT.DLL version 2.0.
64e9cfc0021a7f031209234997abfa4c823ce8ce2d3a653528c729abb2ce4d12
AskJeeves Toolbar version 4.0.2.53 ActiveX remote buffer overflow exploit.
0a3890122c69043fae4c5cc4605243b6dec0e894f55f72492fb37a47c1822c75
Xitami Web Server version 2.5 remote buffer overflow exploit that spawns calc.exe.
60660998d133283bc88a1ec5a304f2ebfe9239ed5de4ef86b8b7f70b2f86b6e5
EasyMail MessagePrinter Object buffer overflow exploit that makes use of emprint.DLL version 6.0.1.0.
ef38c253e5f6159950c93daca6f0f601d24318dd711729c8dcbe93c1154b92d0
IPSwitch IMail Server version 8.0x remote heap overflow exploit with connect-back shellcode.
a5363271012a058fb9a6669c3d86455f5a9b0066909dd74798b8d10d90c59905
sk.log versions 0.5.3 and below suffer from a remote file inclusion vulnerability.
e83dfae8de90183d56fb0d14e9b13c0fb45ef971e4f6a2e8690734777a513adc