Secunia Security Advisory - Two vulnerabilities have been reported in CUPS, which can potentially be exploited by malicious people to compromise a vulnerable system.
2080a48a359148a7382db5f54438163014c4b9a46183b85a232589c29dceca5b
Secunia Security Advisory - Red Hat has issued an update for cups. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system.
a53cd33915f49d355119586e9c3c3afe79ea165763325f8183266e5d89176bbf
Secunia Security Advisory - Some vulnerabilities have been reported in the Print module for Drupal, which can be exploited by malicious users to bypass certain security restrictions and conduct script insertion attacks.
ef294fad342b17f9234cff003d89f987462533638551cb9a492dc916b0aa4d1b
Secunia Security Advisory - A vulnerability has been discovered in Foxit Reader, which can be exploited by malicious people to potentially compromise a user's system.
32954b99972622ce074f28956b3d5a027d227585765565203c6856c8885e7b4e
Secunia Security Advisory - Red Hat has issued an update for java-1.4.2-ibm. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).
9a904fce0ae6cb02a451b6ac93341fe2a0efb792fc20c983acfc725ad4364ea4
Secunia Security Advisory - Michele Orru has reported a vulnerability in Eclipse BIRT, which can be exploited by malicious people to conduct cross-site scripting attacks.
378508e6d778ce586965bc3ba97b47f17e97bc2be86fd5b93f8f4d99fe18ae54
Cisco Security Advisory - Cisco Unified Presence contains two denial of service (DoS) vulnerabilities that may cause an interruption to presence services. These vulnerabilities were discovered internally by Cisco, and there are no workarounds.
5040d9da866d73909e15e2323a2ffb9e51d201c0eb74d28847da66bbd1085e58
There is a memory corruption vulnerability in TIFF file processing in Microsoft GDI+ that can be used to crash a vulnerable application and also to execute arbitrary code.
bdd741e4995e907c04dc70b34e10d128524fc033d85598a7865541896555676f
There is a vulnerability in Windows Media Audio Voice decoder distributed with Windows Media Player that allows remote code execution by opening a specially crafted web page.
b13d4b308ea79c8f831f71e5cd1f0456f63eb50ba6410288c818e83acdcbdff6
The Everfocus EDSR firmware fails to correctly handle authentication and sessions. This remote exploit takes advantages of versions 1.4 and below and lets you view the live cameras of remote DVRs.
10026da1a7949dc0eaf28f986ef241f8679e65ad5c74df580ec8f86a61a39823
Researchers from Fortinet have discovered multiple memory corruption and denial of service vulnerabilities in Adobe Reader/Acrobat versions 9.1.3 and below.
2a0cd498bdf583933e70555a6d57cafc641609db9a0074360ea0f8bb095a999e
Ubuntu Security Notice 848-1 - It was discovered that the Zope Object Database (ZODB) database server (ZEO) improperly filtered certain commands when a database is shared among multiple applications or application instances. A remote attacker could send malicious commands to the server and execute arbitrary code. It was discovered that the Zope Object Database (ZODB) database server (ZEO) did not handle authentication properly when a database is shared among multiple applications or application instances. A remote attacker could use this flaw to bypass security restrictions. It was discovered that Zope did not limit the number of new object ids a client could request. A remote attacker could use this flaw to consume a huge amount of resources, leading to a denial of service.
d0add9cad39c4f99da2ff36804eb791b22674b0688b5457ef291a078ea032baa
ttyrpld is a multi-OS kernel-level tty key and screen logger. Recorded sessions can be followed live or replayed at a later time. Supported platforms are Linux, Solaris, FreeBSD, NetBSD, and OpenBSD.
54db4eca4d95812750c8966d6a9472e23bf75860bc511adcb0649a0248e5dbe3
Python Libnet is a Python wrapper for the libnet packet injection library written in pure C.
c5fc47a5ec81df056bff7465652f4992d841ff6a05b66ed487d6453da3a7636a
Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target.
c1b84dd4036aa9f81fc4fbd527eda202e51c3767659b8f1eef12bfb3381c5b36