Secunia Security Advisory - A vulnerability has been reported in Sun GlassFish Enterprise Server and Java System Application Server, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system.
5552555b4c1aedec266d3bb9640d2495bfea3b9c6fa512db68d9e0b8185f55ee
Secunia Security Advisory - A vulnerability has been reported in Sun Java Dynamic Management Kit, which can be exploited by malicious people to manipulate certain data.
cda058aa1b4b215a984938efb281f09997394e2ce94a57eb6638ed7b4400cf16
Secunia Security Advisory - Multiple vulnerabilities have been reported in Oracle JD Edwards EnterpriseOne Tools, which can be exploited by malicious people to conduct cross-site scripting attacks, manipulate data, gain knowledge of sensitive information, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.
1eafb91fbeb048a7b19b1f598cb4af5c80983a56cc869aa2962f7b9d0bf09c28
Secunia Security Advisory - Fl
96296a7b2adf9a72831399050428f8234316067bc6403ab1d23c1347e3bb96bc
Secunia Security Advisory - A vulnerability has been reported in Oracle Communications Messaging Server, which can be exploited by malicious people to manipulate certain data.
cdfb8526d6b90db361ddc658b6348d8debc019a98058240256b4f121ba43d044
Secunia Security Advisory - Some weaknesses have been reported in fail2ban, which can be exploited by malicious, local users to perform certain actions with escalated privileges.
d372b99abcf145d7312d04a6c4b743442140627454cd73f22ee71127f3e47cfc
Secunia Security Advisory - Oracle has acknowledged a vulnerability in Oracle iPlanet Web Server, which can be exploited by malicious people to cause a DoS (Denial of Service).
5d910da9e5c48060625a06af73445fb6125c9373ac92787b6427c68eef1d1ac2
Secunia Security Advisory - Multiple vulnerabilities have been reported in Oracle Solaris, which can be exploited by malicious, local users to gain escalated privileges, disclose potentially sensitive information, manipulate certain data, and cause a DoS (Denial of Service) and by malicious people to cause a DoS (Denial of Service).
2e739985e2148209965b8a81d316a103a15aa19239064f624425b4fe7be7bdf0
Secunia Security Advisory - Two vulnerabilities have been reported in Sun OpenSSO Enterprise and Java System Access Manager, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to manipulate certain data.
d41b3d348926669bd58dbfcf21db62c6b51b303e19fcbf5c6e1be71cd709aa63
Secunia Security Advisory - Multiple vulnerabilities have been reported in Oracle E-Business Suite, which can be exploited by malicious, local users to gain escalated privileges, by malicious users to disclose potentially sensitive information, and by malicious people to disclose potentially sensitive information and manipulate certain data.
0205bf91af0a09e81d116a9a0bc36feb54a46a11a56e70088472bb0e4aff124a
Secunia Security Advisory - IBM has acknowledged a vulnerability in Tivoli Netview for z/OS, which can be exploited by malicious people to cause a DoS (Denial of Service).
ff95c9e7a85cb721614f6f4df62131bf139335b364e6ecc2c8244abbb473ce1c
Secunia Security Advisory - Fedora has issued an update for dhcp. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.
54cd3a0ca30fd40e89db23316151fe7211b7eb72f310164efa7a81bdc66f0a07
Ubuntu Security Notice 1117-1 - Neel Mehta discovered that PolicyKit did not correctly verify the user making authorization requests. A local attacker could exploit this to trick pkexec into running applications with root privileges.
4c6944cfa8da3fb2362a0b9f983fa2667e828c17e438aa809577c054cc336f17
PPLiveAV suffers from an insecure default vulnerability that has resulted in many open proxies being available.
8792361e107fb76e1011f84afbf7b5ee794237e5428a4dfc25c74a5c3efa2287
dradis is a tool for sharing information during security testing. While plenty of tools exist to help in the different stages of the test, not so many exist to share interesting information captured. When a team of testers is working on the same set of targets, having a common repository of information is essential to avoid duplication of efforts.
c8c5c324156e7960e3faa20e6ef569ecc3d82808b161102ebb63052564e9d4ba
Malheur is a tool for automatic analysis of program behavior recorded from malicious software (malware). It is designed to support the regular analysis of malicious software and the development of detection and defense measures. It allows for identifying novel classes of malware with similar behavior and assigning unknown malware to discovered classes. It can be applied to recorded program behavior of various formats as long as monitored events are separated by delimiter symbols, e.g. as in reports generated by the popular malware sandboxes CWSandbox, Anubis, Norman Sandbox, and Joebox.
3be1c2c3ddf9fa21e38ce94750996f036a69b033f1baf6d76c0a960a040fd74e