Secunia Security Advisory - IBM has acknowledged a vulnerability in AIX, which potentially can be exploited by malicious people to compromise a vulnerable system.
5d66805cfa0f0b2919aae3a7148d400ba5052bc130f09826e5e54447f455ef8c
Proof of concept exploit for id3lib development versions that are susceptible to an array overflow vulnerability.
dc37fbea7778b059b0601ac75c29c0d3d4d67f6a1ec91d3995767e86c2958fd3
id3lib development versions are susceptible to an array overflow vulnerability.
c6d8a1b0b199376dfd9f40a8bc6a844fc8300a057011db9aba2741f845c58bdf
Debian Security Advisory 1435-1 - Several remote vulnerabilities have been discovered in the Clam anti-virus toolkit. It was discovered that an integer overflow in the decompression code for MEW archives may lead to the execution of arbitrary code. It was discovered that on off-by-one in the MS-ZIP decompression code may lead to the execution of arbitrary code.
ea12bfb463bbc6e401eff39774a965c72afcf5c7fc89d285cf70cd1baa962a0b
Cisco Security Advisory - A vulnerability exists in the Cisco Firewall Services Module (FWSM) that may result in a reload of the FWSM. The only affected FWSM System Software Version is 3.2(3).
631cf02236b3a565a1297094d985ceb21ded8e2680207b60f5922f3f61f870c3
Ubuntu Security Notice 558-1 - A slew of vulnerabilities have been addressed for the linux-source-2.6.17/20/22 packages.
bdcb9487e60c084ceee2d88ce21a1854691f47e8f5612e67b0f4b24ebf3ee448
Ubuntu Security Notice 557-1 - Mattias Bengtsson and Philip Olausson discovered that the GD library did not properly perform bounds checking when creating images. An attacker could send specially crafted input to applications linked against libgd2 and cause a denial of service or possibly execute arbitrary code.
ed13d4e056ae666b4f0da0b2ba5ce53640bb831f56b258edea93cdd51e515516
Technical Cyber Security Alert TA07-352A - Apple has released Security Update 2007-009 to correct multiple vulnerabilities affecting Apple Mac OS X and Mac OS X Server. Attackers could exploit these vulnerabilities to execute arbitrary code, gain access to sensitive information, surreptitiously initiate a video conference, or cause a denial of service.
0409532c23b7f5d094163549001661f9a6e7407b83eae543ad8df86346e43fff
Symantec Vulnerability Research SYMSA-2007-015 - The Perforce P4Web is susceptible to a denial of service condition via resource starvation.
bfe8c04d73a7f234220539b93e7b249fa18b8c376a21250a1acd6cd0e84a2e1a
OpenStego is a command line tool for image based steganography. It supports embedding of messages or files in 24bpp images.
d56ab1159ce31353355397cfcb231af2563dc5f065e55785d4c660fca1129470
Systrace enforces system call policies for applications by constraining the application's access to the system. The policy is generated interactively. Operations not covered by the policy raise an alarm, allowing the user to refine the currently configured policy. After a policy has been sufficiently constructed, further alarms often indicate security problems. Policies can also be generated automatically for sandboxing purposes.
9e78877257749add3df4931f4b5bc202ae2724551e22146d28cc40440144f990
xeCMS version 1.x suffers from a remote file disclosure vulnerability in view.php.
c155e2111b1ce15d16150f5af9e105b9ca95c7632cae58e90cfa832277efc9f2
phpMyRealty version 1.0.x suffers from a remote SQL injection vulnerability in search.php.
f3bc0816092f6cbacd7530954bbbe3ad66b3330eb3f44f1ca8eb2b01c2893188
Apple Mac OS X mount_smbf stack based buffer overflow exploit.
3b6c24e9c635497ed8020ede7812b2da10e9b4d8877d0ac90fc7701b326c05da
3Proxy versions below 0.5.3h remote buffer overflow exploit that takes advantage of a vulnerability in logurl().
926292037e0da8602004851e43faaf9a45ad65581dc592a0d00794c9a0e267b9
Secunia Security Advisory - Gentoo has issued an update for e2fsprogs. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise an application using the library.
7b987bf1f00d3dcda320157036047b431cd480f16303ad9afc3d479449bd7cbf
Secunia Security Advisory - rPath has issued an update for the kernel. This fixes a vulnerability with an unknown impact.
9c9da5e46486f3219ccd5dc10d8506228bd7e96f914aa96cb22dbe16c5ac4339
Secunia Security Advisory - rPath has issued an update for tetex. This fixes some vulnerabilities, which can be exploited by malicious, local users to disclose and manipulate sensitive information and by malicious people to potentially compromise a vulnerable system.
e5403f765cc29f41603e1a23af0e80dd8114c557eb8d4cf2e4c0d155893467e1
Secunia Security Advisory - Michael Brooks has discovered a vulnerability in WordPress, which can be exploited by malicious people to bypass certain security restrictions and to disclose sensitive information.
b38d9cd642a76c2dc66d48b5664c13b7d60418a947fa49a094a08127304fca38
Secunia Security Advisory - Beenu Arora has discovered two vulnerabilities in Mambo, which can be exploited by malicious people to conduct cross-site scripting attacks.
6e0dad24b513b9dae42e823d3773f7a0494bd32f18fc006a2fa9035ed6f05beb
Secunia Security Advisory - Ubuntu has issued an update for libgd2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.
cbf1598785b91d3a8be0e95af401174cf70da4d5a9876c0e6eac2f75b3ab4d44
Secunia Security Advisory - Some vulnerabilities have been reported in Sun Ray Server Software, which can be exploited by malicious, local users or malicious people to manipulate certain data or cause a DoS (Denial of Service).
6e158d51a49327248920b5cdd62cf34eb8a035a0a2410c1a3a1125569f5b1957
Secunia Security Advisory - A security issue has been reported in Asterisk, which can be exploited by malicious people to bypass certain security restrictions.
8421eb4b2285204ee54acae14136da21fbd35a2f5f5e75a977e7c0b1baa6b0f2
Secunia Security Advisory - A security issue has been reported in Sun Management Center, which can be exploited by malicious people to bypass certain security restrictions.
64ca72a1a9e42a644b64d9bba030d2f212bc6b9b47b05ee07c9e36e2e31a399f
Secunia Security Advisory - A vulnerability has been discovered in Dokeos, which can be exploited by malicious users to compromise a vulnerable system.
c3fcf21d8a8d578f5d027c49ca81bfb7f86ec716564bdf6d2e08b5fbddac0b76