Secunia Security Advisory - Some vulnerabilities have been reported in Kerberos, which can be exploited by malicious users and malicious people to conduct spoofing attacks and bypass certain security features.
547ad1e52d3851db366ac0f8bcfe2b597ac5d2378385c41928bf0c9b9158c84a
Secunia Security Advisory - Red Hat has acknowledged a vulnerability in Red Hat Enterprise MRG, which can be exploited by malicious people to compromise a vulnerable system.
542b84a5b8037f7173dcb85eda64734499a78ba4af949b08280c205b40fcfdac
Secunia Security Advisory - A vulnerability has been reported in Sleipnir, which can be exploited by malicious people to bypass certain security restrictions.
85abb50321578db03d6536eda5873609f6cae8d949729c22b9f6662c37522f75
Secunia Security Advisory - Red Hat has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to conduct spoofing attacks and bypass certain security features.
9b9c1210f8c6ffa94f1b839860085ff3443cbe999e4472f74c539c43ab706daa
Secunia Security Advisory - A vulnerability has been reported in WordPress, which can be exploited by malicious users to conduct SQL injection attacks.
68f1650d71d1ee86ced28e88053db4b0d79af6d70a300cf6df7fb41bbf560302
Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in Enano CMS, which can be exploited by malicious people to conduct SQL injection attacks.
e6abde4d8458dc22b22619f7fdabe019c975286a635072224f4b2e43d3ec2b94
Secunia Security Advisory - Ubuntu has issued an update for openjdk-6. This fixes a security issue, which can be exploited by malicious people to disclose system information.
d7b64d49c8fa06d9ffbaf8ba5442e9b29c7ccdbe620f09e20c4fc4e09eb5f1b0
Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in DynPG CMS, which can be exploited by malicious users to disclose sensitive information.
c597cf97c62b29851f82bef824a6ba3cb72a5dcdf0dfa95e3f2050f4ba04c97c
Secunia Security Advisory - A vulnerability has been discovered in CA Internet Security Suite Plus, which can be exploited by malicious, local users to gain escalated privileges.
c86e6d61bb0ff1c002c8a233ae26be4d4c27bd99f9f2ec21b4c82b86edb9e21a
Ubuntu Security Notice 1024-1 - It was discovered that certain system property information was being leaked, which could allow an attacker to obtain sensitive information.
d536d1c3772a901154f93877a09a04517c521bebc417710a7db9a52744f9593c
Mandriva Linux Security Advisory 2010-244 - It was possible to conduct a XSS attack using spoofed request on the db search script. This upgrade provides the latest phpmyadmin versions which is not vulnerable to this security issue.
747b71c3a55edd1c7a62796628741469aea301ac212ffd60c33db791c98ea99d
Microsoft Outlook 2007 suffers from an email file attachment denial of service vulnerability.
5ff440e06d3826b5ad64b771f85361f08fc18abc456122bf32184c64955ed1b7
Orbis CMS version 1.0.2 suffers from a remote shell upload vulnerability.
d4b7b1878d5a8080f457e7f8608df2b81ad078416af0eabf6d752cc3cdb32eba
Apache Archiva versions 1.0 through 1.0.3, 1.1 thorough 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1 suffer from a cross site request forgery vulnerability.
6b5fdc7ee2bcaee35a141963912a60ecb1403a705140c6032418873569face0d
FreeBSD Security Advisory - A race condition exists in the OpenSSL TLS server extension code parsing when used in a multi-threaded application, which uses OpenSSL's internal caching mechanism. The race condition can lead to a buffer overflow. A double free exists in the SSL client ECDH handling code, when processing specially crafted public keys with invalid prime numbers.
8cfb790813185171ffd5ee2585fb00786a32d5a0a08c54131d90d05b0270c73a
Wernhart Guestbook suffers from a remote SQL injection vulnerability.
da7a3df7234479cba2cbdf182574070ecd8af6dca5fcaaf3f7d4f05a979de3fe
This is a small write-up discussing how to mess with SIP.
2a3df45ec1da80a98c2693540f29fcb9861c53dfe978a1792c51f023472e81af
Twitter.com suffered from a graphic manipulation and upload vulnerability.
05b047f7fddea8f8aec9b3c7ca57644b7226f3fe0a12521b5c8b364b9a1af404
This archive contains all of the 352 exploits added to Packet Storm in November, 2010.
5aaee2527ee35653b753bc0a8e8a53a0f267e823331569f0a74e035249819a5c
Nightwing allows the creation of quickly deployed wireless networks without the need to make complicated configurations. With the implementation of a Mesh technology called B.A.T.M.A.N, Nightwing allows the extension of wireless networks with a simple way of adding devices that works with minimal human intervention. It has public and private connection interfaces, and the ability to filter content using OpenDNS. It is designed with security in mind, and has low hardware requirements.
edc718e01715b179ff93cb241ea8bec4e6bf0e42ae225f889ac98cd85026b591
Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.
83a683d51eceb5aaf0c249efb3d9d95aa4fd8bbc1f05817ab7b1030f6d84d059
VMware Security Advisory 2010-0017 - ESX Service Console OS (COS) kernel update. This patch updates the Service Console kernel to fix a stack pointer underflow issue in the 32-bit compatibility layer. Exploitation of this issue could allow a local user to gain additional privileges.
c383897ffa5b5838bac181865a4e4211051098bbfcbd3855b2b85a5ac456837f
Ubuntu Security Notice 1023-1 - Nelson Elhage discovered several problems with the Acorn Econet protocol driver. A local user could cause a denial of service via a NULL pointer dereference, escalate privileges by overflowing the kernel stack, and assign Econet addresses to arbitrary interfaces.
c5ff5a6e5e4b198be085501cd53b40be735c01cd2e4a0d980f2a27f2b5713c47
LFImap is a python script that tests leverages local file inclusion vulnerabilities to figure out the root of a file system, looks inside of some files and more.
541dc1657012d42d82d1363b528f66bb2d6a2ccf0c083443b1475b4be48908c5
This Metasploit module exploits a stack buffer overflow in Xion Audio Player prior to version 1.0.126. The vulnerability is triggered when opening a malformed M3U file that contains an overly long string. This results in overwriting a structured exception handler record.
b6618a2b52819051d42df306ace385517bd41863a129b2db684203c2451025e3