Whitepaper called Introduction to Remote Administration and Monitoring systems. Includes various tools including a GUI for remote administration.
1a63f69ca3ec0755ddd8aea45c79ac0559dd5374f1984dc3781895ea1bea71f9
South River Technologies WebDrive Service suffers from a local elevation of privileges vulnerability due to a bad security descriptor.
c0a7a33879d58e0b1fb77cd684d6a63295fdc965e0ca666eb2e239fe86762199
EMC RepliStor Server (rep_serv.exe) version 6.3.1.3 remote denial of service proof of concept exploit.
3fb7ad99e71a35c5c0610b7f72ea615330423379e059dd3f947376c780cd7d80
Boxalino suffers from a directory traversal vulnerability.
0a3067e68ce7fd0db1ed4911a248d499b3e01861f98d99a85c7a95cdff82abc3
A restricted shell break out is possible in Overland Guardian OS that allows a user to achieve uid 0 privilege escalation.
2fcbf55ed90b6c1ac64c15e2923351d5f40d54f6ed8ddfbc08d525b344c37b46
Gentoo Linux Security Advisory 200910-1 - An error in the X.509 certificate handling of Wget might enable remote attackers to conduct man-in-the-middle attacks. The vendor reported that Wget does not properly handle Common Name (CN) fields in X.509 certificates that contain an ASCII NUL (\\0) character. Specifically, the processing of such fields is stopped at the first occurrence of a NUL character. This type of vulnerability was recently discovered by Dan Kaminsky and Moxie Marlinspike. Versions less than 1.12 are affected.
e19b1568c90378a3d70151fe317843af4d60f22b3c3395301e1bcc36f4edb4fd
Mandriva Linux Security Advisory 2009-285 - The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.0, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third party information. Added two upstream patches to address a bypass vulnerability in open_basedir and safe_mode. Additionally on CS4 a regression was found and fixed when using the gd-bundled.so variant from the php-gd package. This update fixes these vulnerabilities.
0f9fafc0e066c87e3931727d57f745abeda0ec109f761ad0f41e73a0b3468629
Mandriva Linux Security Advisory 2009-284 - The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.0, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third party information. This update fixes this vulnerability.
f7c936c3bb43f90da77951b9c5818106b16b74bd40b7a9c8f4b3c300eb92ea6d
Mandriva Linux Security Advisory 2009-283 - cups suffers from denial of service, integer overflow, and buffer overflow vulnerabilities. This update corrects the problems.
6a986cbe02b428640424c30a7a68682178e6cab0da2aafa9fc12a51bfb358d7e
Mandriva Linux Security Advisory 2009-282 - Multiple integer, heap, and buffer overflows exist in cups. This update corrects the problems.
894087aa72d5132ae4eaa82907f81fb6b4b5b4bc92b2685ec5a5b710fa25d155
Mandriva Linux Security Advisory 2009-281 - cups suffers from multiple integer overflow and denial of service vulnerabilities. This update corrects the problems.
70b330e06ed183e1d579b9f88c26bf0a69cb7fdc044fab15f618e408b8f63a91