Secunia Security Advisory - A vulnerability has been discovered in ntop, which can be exploited by malicious people to conduct cross-site scripting attacks.
c8066f18e09f287c4708387488e581f254d752e6df4b1e4f84ce9429e88d78fc
Secunia Security Advisory - John Johnson-Doe has discovered a security issue in meetOneToGo, which can be exploited by malicious people to disclose sensitive information.
bfc5beb31631291bf9b3c236d25489a7870b416145c27ec5cfb48a4003a64dd2
Secunia Security Advisory - Red Hat has issued an update for bind-dyndb-ldap. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
c59d0f781028e733c2717a7ba399d8e4564bd1d37b48aafe348a26fade1899e2
Secunia Security Advisory - Brendan Coles has discovered a weakness and multiple vulnerabilities in Zenoss, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to conduct spoofing and cross-site request forgery attacks.
32865cbc497e94949624f8a11a0d71c603e824cdfbc8da350c2f4ddb960a6881
Secunia Security Advisory - Multiple vulnerabilities have been reported in ACD Systems Canvas, which can be exploited by malicious people to compromise a user's system.
72657bb6a27bf2ea830a46464869b79ad1d15bd9f3de381883d1f311bc5d2612
Secunia Security Advisory - Multiple vulnerabilities have been reported in AccessData Forensic Toolkit, which can be exploited by malicious people to compromise a user's system.
272128a4233772a0d1648c1439d81885353066d9061220ff48722a6d6a18bcb6
Secunia Security Advisory - Multiple vulnerabilities have been reported in EnCase Forensic, which can be exploited by malicious people to compromise a user's system.
ab4e17c0e60db1636bc063974761f34c64ef0d876c9a3955aee453b651527f2a
Ntop version 4.0.3 (64 bit) suffers from a cross site scripting vulnerability.
9e503fcd949b60fc4f051b48d6eb72a0c7e80a3bb9f137a474a2ad111e56f08a
Red Hat Security Advisory 2012-1139-01 - The dynamic LDAP back end is a plug-in for BIND that provides back-end capabilities to LDAP databases. It features support for dynamic updates and internal caching that help to reduce the load on LDAP servers. A flaw was found in the way bind-dyndb-ldap performed the escaping of names from DNS requests for use in LDAP queries. A remote attacker able to send DNS queries to a named server that is configured to use bind-dyndb-ldap could use this flaw to cause named to exit unexpectedly with an assertion failure.
21ad281bbda64e6afba7cbfbd5bb1f6bc0aa4383815fd814c5f8361a16099c79
Red Hat Security Advisory 2012-1141-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. A denial of service flaw was found in the way the dhcpd daemon handled zero-length client identifiers. A remote attacker could use this flaw to send a specially-crafted request to dhcpd, possibly causing it to enter an infinite loop and consume an excessive amount of CPU time. Two memory leak flaws were found in the dhcpd daemon. A remote attacker could use these flaws to cause dhcpd to exhaust all available memory by sending a large number of DHCP requests.
fc9a322a2de7ef4e978afd80e16657d60814c3b522011ed6e9b40e2bd8d9a601
Red Hat Security Advisory 2012-1140-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. A denial of service flaw was found in the way the dhcpd daemon handled zero-length client identifiers. A remote attacker could use this flaw to send a specially-crafted request to dhcpd, possibly causing it to enter an infinite loop and consume an excessive amount of CPU time. Upstream acknowledges Markus Hietava of the Codenomicon CROSS project as the original reporter of this issue.
8b07e2dc453135e1290fae4b34fd3618aeea3cedff85d00f592a71055720c29b
Debian Linux Security Advisory 2520-1 - Timo Warns from PRE-CERT discovered multiple heap-based buffer overflows in OpenOffice.org, an office productivity suite. The issues lies in the XML manifest encryption tag parsing code. Using specially crafted files, an attacker can cause application crash and could cause arbitrary code execution.
01058fb3e73899f5614de4378a1f281d11b663b075a75d78a87026487124e896