Apple Safari remote denial of service exploit for the iPhone / OSX / Windows.
bcf3762c17722ccbd9badf01735132e76fff0d22715bdb3bc81c0734638e143f
fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.
918dfe42d7a552e44b74c2bf3ba49f7a160d0c31f093cfbdc4efdf4bd73fc1f8
TorK is a Tor Controller for KDE. It allows you to configure, run, and update Tor. It also allows you to view the Tor network and choose how you would like to interact with the it.
0f819824a6043ea8e3f66d646952337db258b0c3deaecbae4e103fab419307bc
The XOOPS Dictionary module versions 0.94 and below suffer from a remote SQL injection vulnerability.
31333bb113a958e0af1445f3e9c07732898581c43718ea91b0cf3b3c076efa21
The Joomla com_guide "category" component suffers from a remote SQL injection vulnerability.
68c2434d2943c1e9d88aeecd7833954217268f502d2aa138d797f0b7d8e9aef6
PHPauction GPL Enhanced version 2.51 suffers from multiple remote file inclusion vulnerabilities.
134968da030c8de9559de132307e292098bd9c93afa5ed87eef3115311ba444b
Debian Security Advisory 1519-1 - It was discovered that the Horde web application framework permits arbitrary file inclusion by a remote attacker through the theme preference parameter.
8aea956be722bc6e913c627aa8a53df918f3a96617a8147c3806e747e4223c0b
Debian Security Advisory 1518-1 - Micha Lenk discovered that backup-manager, a command-line backup tool, sends the password as a command line argument when calling a FTP client, which may allow a local attacker to read this password (which provides access to all backed-up files) from the process listing.
7004acb50d0316022acf24f265c0b8e0cdb288af5dce6fd947c8be10c0efc3b0
Debian Security Advisory 1517-1 - Don Armstrong discovered that ldapscripts, a suite of tools to manipulate user accounts in LDAP, sends the password as a command line argument when calling LDAP programs, which may allow a local attacker to read this password from the process listing.
5625b83dcf90139802961cb24b80bc09923d212d1f26a78c1a0b09226c9c29dd
Gentoo Linux Security Advisory GLSA 200803-23 - Temporary files are handled insecurely in the files wml_backend/p1_ipp/ipp.src, wml_contrib/wmg.cgi, and wml_backend/p3_eperl/eperl_sys.c, allowing users to overwrite or delete arbitrary files with the privileges of the user running the program. Versions less than 2.0.11-r3 are affected.
07671863f85e01c5df4c87bfa17db9834feb97b078d5401ba2ffcb4152c1fe9c
XNview version 1.92.1 suffers from a long filename overflow vulnerability.
7b8a6ad02f41fefeecc8fd3eca8752372fa7974dda692e938ae56ed8db055fa2
Secunia Security Advisory - Some vulnerabilities have been reported in various F-Secure products, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.
07c18ef7b5311afab53ac2ee4f2b144976da3edbd211bbac92cf4cf6517f6e9b
Secunia Security Advisory - Krystian Kloskowski has reported a vulnerability in CA BrightStor ARCserve Backup, which can be exploited by malicious people to compromise a user's system.
56e7ad2a97ec0bf9395064322e6db7667f57be8911b7f83939db9bc76fb01e25
Exero CMS version 1.0.1 suffers from multiple local file inclusion vulnerabilities.
2a70fbb893bff9341723b83c9bb777e804a2ad6d57684280a66943d004a03f9d
phpBP versions RC3 (2.204) FIX 4 and below suffer from a remote SQL injection vulnerability.
ffd494c1667f902e95ac5c20f79af2a2078a9faf92a6d59ceca09b7765376b7e
Multiple Timesheets versions 5.0 and below suffer from directory traversal, cross site scripting, and cookie manipulation vulnerabilities.
e34a62e6f674af12e6915569eba5d910bf80a65d08a36f860b76a1c2d1135bce
CA BrightStor ARCserve Backup version r11.5 ActiveX remote buffer overflow exploit.
686426ea3916584ba4cadfae8aaf21ecc6342864c5ae1657f6404f85c6eaeb16