Red Hat Security Advisory 2011-1160-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. Two denial of service flaws were found in the way the dhcpd daemon handled certain incomplete request packets. A remote attacker could use these flaws to crash dhcpd via a specially-crafted request. Users of DHCP should upgrade to these updated packages, which contain a backported patch to correct these issues. After installing this update, all DHCP servers will be restarted automatically.
be3bc5ad66937d0c69aa420f4b5f8193eb7268d5e29bbb92691c7ecaf70e28fd
Microsoft Internet Explorer 9 suffers from a malformed HTML NULL pointer dereference in iedvtool.dll.
c364e55db3620dbc53477bdff5e36b34d074d438b5c32a7337d0e1d52fbedcad
Whitepaper called Userland Hooking in Windows. This document is the first of a series of five articles relating to the art of hooking. As a test environment, it will use an English Windows Seven SP1 operating system distribution.
14893704b2ff4c3c7c7d92d60513c25bdb78d545d4d5a830b05d02acc259c996
Red Hat Security Advisory 2011-1159-01 - The IBM 1.4.2 SR13-FP10 Java release includes the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit. This update fixes several vulnerabilities in the IBM Java 2 Runtime Environment and the IBM Java 2 Software Development Kit.
ada08654d74a6a920ebd08a4e565e8395ea79de508c0208ab31a3705420171df
Mandriva Linux Security Advisory 2011-126 - Multiple vulnerabilities were discovered and corrected in java-1.6.0-openjdk. Everything referenced in this advisory points to unspecified vulnerabilities.
0fd3ead6a18f48776a8de698c79e5fb054e0a66a4c03e68db89c37346d36c80f