Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges and by malicious people to cause a DoS.
1ac46333ff166a7e50faed98f6ac0c14412d9290bd74d0d1aa1ea7641465fc67
Secunia Security Advisory - Debian has issued an update for krb5. This fixes a vulnerability, which can be exploited by malicious people to conduct spoofing attacks.
aa7afb25e562ad2b911d7926c513538d2c104f523de7abc72180173328fd8005
Secunia Security Advisory - Debian has issued an update for libxml2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
e7d14f9b422323f7de2aa81afe40e80d28c4c73c907f1a217075d09d587213ca
Secunia Security Advisory - Red Hat has issued an update for acroread. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system.
5e658d10a0a2c378cd66bf2b1c794b55fbc5480b7b26ab8835abc3adc35fb045
Secunia Security Advisory - Multiple vulnerabilities have been discovered in Etomite, which can be exploited by malicious people to disclose potentially sensitive information and conduct cross-site scripting and SQL injection attacks.
3aa7f0e6679a9d6adeb17b53341263e57f715d79e2bee662e76eadafad74bbdb
Secunia Security Advisory - A vulnerability has been reported in Palm Pre WebOS, which can potentially be exploited by malicious people to compromise a vulnerable device.
066744e851fd90abd56dbaeb8bab92e99102bf35e6ea3ab50301f60451378004
Secunia Security Advisory - Fedora has issued an update for udev. This fixes a vulnerability, which can be exploited by malicious users to disclose sensitive information.
0ef976577923b56e640c64c832c14631e8c8ad432ab8ef027a74b3061f60ce73
Secunia Security Advisory - A vulnerability has been discovered in Kindle for PC, which can be exploited by malicious people to compromise a user's system.
58aa85146f240ec86f8e0d9212943a5aeebabbe274932d8da078bd133ad098bc
Secunia Security Advisory - A vulnerability has been reported in CGI.pm, which can be exploited by malicious people to conduct HTTP response splitting attacks in an application using the library.
dbab3741764751c3e0d79c7a269b0977764a2ada0fd836e827cf8518544ac7bf
Secunia Security Advisory - A vulnerability has been reported in CGI.pm, which can be exploited by malicious people to conduct HTTP response splitting attacks in an application using the library.
12fe5cc321de499b4c4ac2bed60985ab3ef0891b106efaf0c9b809ae229ebb2f
Secunia Security Advisory - A vulnerability has been reported in VMware Workstation, Player, Fusion, ESX, and ESXi, which can be exploited by malicious, local users to bypass certain security restrictions.
3df2d5b8f0e7a34aa850af175c95b8f3198ebccdab53aac3965b034c0410c21e
Secunia Security Advisory - A vulnerability has been reported in VMware Movie Decoder, Workstation, and Player, which can be exploited by malicious people to compromise a user's system.
41def1fb3f6352affebc1769a143f405049fb244a8d45818b2dabe62579b7fc3
Secunia Security Advisory - A vulnerability has been reported in CGI::Simple, which can be exploited by malicious people to conduct HTTP response splitting attacks.
f6a25770ef2854239d581fac65e8cd16c93f08ac71ed6da620e6ef43c2d3967c
Secunia Security Advisory - A vulnerability has been reported in OpenSSL, which can be exploited by malicious people to bypass certain security restrictions.
71a54b845512e48f66bfe5f2b50fc742494e57dd8c88366e8e946b072066b230
Secunia Security Advisory - Some security issues and vulnerabilities have been reported in VMware Server, which can be exploited by malicious, local users to gain escalated privileges and bypass certain security restrictions, and by malicious people to compromise a user's system.
03da43b11422abb7cbbd1505403b0d27e4a4abd2512011014a408b84e4a0ec8e
PHP-Nuke versions 8.1.0.3.5b and below remote SQL injection exploit.
05e63928fc305f563a74456aa0be649395c46ed7d865d04070b9345a2d45f23a
iFTPStorage versions 1.3 and below for iPhone / iPod Touch suffers from a directory traversal vulnerability.
00b4737be909d2bfd4df4fb50f30c4cda6b4d5be428fb3debfc4f058131fed7f
NGS Secure has discovered an enumeration vulnerability in (Cisco) Cisco VPN Concentrator, Cisco PIX and Cisco Adaptive Security Appliance.
36fee32442875e7c34fe81340c8ce76a9f75d1183377a5043c7a1e10371a76c1
Contenido CMS version 4.8.12 suffers from cross site scripting vulnerabilities.
295afa5a968f3ec34ddd15adc8eea30ebae93a56a5c086e2903dd0a38bb786e0
Etomite version 1.1 suffers from cross site scripting, path disclosure and remote SQL injection vulnerabilities.
6f52a24509ae2e81469d56756df7f088e4cf10c72749e61da030d1eef693f392
Image Viewer CP Gold version 5.5 Image2PDF() buffer overflow exploit for the Metasploit framework.
252daa9b232cf4206a206b09ed17e6a0ea18aef48cbf465b085fa64638775fe1
ProFTPD version 1.3.3c compromised source remote root trojan code.
2b3de844c19ee4976c43fb307f8a5ad677fb8b4b2968ed884a2b2c49ff518797
This Metasploit module allows remote attackers to place arbitrary files on a users file system by abusing the "Comp_Download" method in the SAP KWEdit ActiveX Control (kwedit.dll 6400.1.1.41).
c028aa1aba49bcdf2f915cc27582fb2f1fa7090e144741d9f3a5d81e7227f5a8
This Metasploit module exploits a malicious backdoor that was added to the ProFTPD download archive. This backdoor was present in the proftpd-1.3.3c.tar.[bz2|gz] archive between November 28th 2010 and 2nd December 2010.
17094d8d6cc795f560232204708dd66d83a3dfa1fbf4de49a332bb625e731aef
MediaCoder version 0.7.5.4795 .m3u buffer overflow exploit that binds a shell to port 5555.
bf8f3644d8f8cd77a3a296576a8e23dd0c5fbeb8dc984e3014786b7e84f228e8