Secunia Security Advisory - A vulnerability has been reported in Microsoft Office, which can be exploited by malicious, local users to gain escalated privileges.
d68ea392381f490b48a8138407ebfed754cbd2581c21cb8da2cc5b896fd0f2a7
Secunia Security Advisory - A vulnerability has been reported in Microsoft Office PowerPoint, which can be exploited by malicious people to compromise a user's system.
d9722d21a05e1bf3f22ffaac55553aea919fd092231150449f1bb84f77c265b1
Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious users to compromise a vulnerable system.
26fff06e26a7f65b453d78befa8b7644933b90cf8eb88044c2de24a5a7f1c2ea
Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.
ae41c341765a1d2401fd7d604ef6fe81740e539be401babbc25ae3b3cb9de602
Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.
55591c7a9e17b7b4299bc3e4654fc0d07c6a7988b65cb7d8be0efd34effd092a
Secunia Security Advisory - A vulnerability has been reported in Microsoft Office PowerPoint, which can be exploited by malicious people to compromise a user's system.
bf7c04d98d21b404b2a2eb4281875d48cf92f33b9ef46d02a9245148e599bd3e
Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.
774ba3ef19fee3ca46b4789bd17fc42cf339f75bf64f5b347d3fa5b63d67c33a
Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.
ad029f64ca5a5f01f77363e35d45c8a971da639983c1b896b149610ab8fb9445
Mandriva Linux Security Advisory 2011-186 - A vulnerability has been discovered and corrected in nfs-utils. It was found that the mount.nfs tool did not handle certain errors correctly when updating the mtab file. A local attacker could use this flaw to corrupt the mtab file. The updated packages have been patched to correct this issue.
4c11017a58f6e88a7458bbf23776b25a44644fd478bdd1855bb409cde7fa31be
Red Hat Security Advisory 2011-1811-01 - The netpbm packages contain a library of functions which support programs for handling various graphics file formats, including .pbm, .pgm, .pnm, .ppm, and others. Two heap-based buffer overflow flaws were found in the embedded JasPer library, which is used to provide support for Part 1 of the JPEG 2000 image compression standard in the jpeg2ktopam and pamtojpeg2k tools. An attacker could create a malicious JPEG 2000 compressed image file that could cause jpeg2ktopam to crash or, potentially, execute arbitrary code with the privileges of the user running jpeg2ktopam. These flaws do not affect pamtojpeg2k.
4e30cdb614403f06bdbc810bb652c4ffc82fcffc0b429f074d8a9abad1cea938
Ubuntu Security Notice 1298-1 - Wilfried Weissmann discovered that Apache Commons Daemon incorrectly dropped capabilities after starting. A remote attacker could possibly use this flaw to read certain files, bypassing the intended permissions.
4868b8c796cc6f4dee413c99fbe678b130df075c38aaa2fe29a5d2cc3630cf72
UseBB version 1.0.14 suffers from a cross site request forgery vulnerability.
256d8a2f76ff4e449264a7c192c18c16d6a0fa6c26f91c39b0532243007a2538
Whitepaper called The Tor Project: Authority "No Check" Weakness. It discusses the fact that exit nodes can be leveraged easily to commit man-in-the-middle attacks.
f523fe3bebb9e922cf2b46d51e4e0f5b2dd213f250650097026f0a157421c7b5
This paper covers a conjecture of equivalence between a statement regarding Ξ matrix and Zeta.
fd9949c76741d04356c6c3b465f8fa4625be9eb480863888cf5eb7f612ef95f6
This document covers the introduction of the R-sequence, i.e. the sequence of numbers closely related to the distribution of the prime numbers. The paper contains its connection to ζ and Mobius function.
7e932293969c1baba57394e3041702cc25637d677c17477a1a235e85d8d9b6b3
JavaScript allows you to exploit human cognitive abilities to a remarkable extent; tools such as window positioning, history.forward() and history.back(), open some scary possibilities that we are completely unprepared to deal with. This proof-of-concept aims to demonstrate this; while it is intentionally crude and makes no real effort to conceal its operation, the transitions can be made seamless and very difficult to perceive. Very accurate click prediction can be achieved by carefully measuring mouse velocity and distance to destination, too.
d7658f0d5bd78b6a2d13c915b7f4668b18228fb508f0cca309cdc5652565e5c9
The 6th edition of YSTS (You Shot The Sheriff) has announced its call for papers. It will be held in Sao Paulo, Brazil on May 7th, 2011.
b909e6e996fb8d8e6c5a007f54f1ab2684709730e9f8e00bf6e3ff8d0388fb37
Secunia Security Advisory - A vulnerability has been reported in Microsoft Office Excel, which can be exploited by malicious people to compromise a user's system.
ec8ea83f351f9a6743742ca88cfbd15c3b4dd95ba72b57d9f017ef5460bc420b
Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.
74114ac4eda608524798bb8669f719f6f2a910bc798f7711f5923b14f5887641