Secunia Security Advisory - A vulnerability has been reported in Sendmail, which can be exploited by malicious people to cause a DoS (Denial of Service).
31439ad51559bb5fc04f69e80f2029db4458187d63633b045c69a274215b810b
Secunia Security Advisory - Some vulnerabilities with unknown impacts have been reported in Adobe Reader.
72cfff4a342f12461555780a68168ccb44b77fdaa48d252d7aad44e11440b843
Secunia Security Advisory - spykids has discovered some vulnerabilities in PictureDis products, which can be exploited by malicious people to compromise a vulnerable system.
c0f604aec3e4f9749edb33464fb9b4f300dd365fc39c3845082a4cb334c12b3d
Secunia Security Advisory - Gentoo has issued an update for asterisk. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.
f64c88d1c412dc1792893b567ff5054ee78e6ca27e41a18b824e83b54b27b115
Secunia Security Advisory - Some vulnerabilities have been reported in Horde, which can be exploited by malicious people to conduct cross-site scripting attacks.
1ddf764cdc6ab4d6e5229a7419d6f2ff140d3659b20905962ecb84744a046bf2
Secunia Security Advisory - A vulnerability has been reported in wvWare wv2 Library, which potentially can be exploited by malicious people to compromise an application using the library.
c7a0c559a3540b1dcf508270fce22c095e9a8a950c43e403b137f5e43309bd5c
Secunia Security Advisory - Gentoo has issued an update for DokuWiki. This fixes some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to compromise a vulnerable system.
7d0da4decc177f3a597049052009e10af3ad59d4bc0d3d466f192f35dba2bec0
Secunia Security Advisory - Debian has issued an update for horde3. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks.
0b92f1c594b5ed37a7f0a1778aa17a9f1e4537cee4521740beb0ac396c351498
Secunia Security Advisory - IBM has acknowledged a vulnerability in sendmail, which can be exploited by malicious people to cause a DoS (Denial of Service).
0a83118a42672729f1fb5bcbab5597c000229a1462e66b1166ad8d60f1607253
Secunia Security Advisory - SUSE has issued an update for php. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system.
9d3c8118673016f0da5036b80c52fd749e8e0dca587d1af8ecd85932f229fb5d
Secunia Security Advisory - RedTeam has reported a vulnerability in phpBannerExchange, which can be exploited by malicious people to conduct SQL injection attacks.
95d36a5b6204c392b6293db2a71f5e6089ff061e8b4a663f8f329397b10d3820
Secunia Security Advisory - Debian has issued an update for wv2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library.
069075ececc2d971a14b18ec4cfeaccb0d33c8e6d99d29cd559df6a7fe0d4c90
Secunia Security Advisory - Ubuntu has issued an update for wv2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library.
c43f87e0b469196d159252b4520baf7e278d929133f4acbf2d05fd50fc88642c
Secunia Research has discovered a vulnerability in PicoZip version 4.01, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the "zipinfo.dll" info tip shell extension when reading a ACE, RAR, or ZIP archive that contains a file with an overly long filename. This can be exploited to cause a stack-based buffer overflow when the user moves the mouse cursor over a malicious archive either in Windows Explorer or from any program that uses the file-open dialog box. Successful exploitation allows arbitrary code execution.
d020df17118c2708ed7b20a03b95d908f801e7b21c0521b16b3d114542da5705
SEC-CONSULT Security Advisory 20060613-0 - Microsoft Outlook Web Access is vulnerable to an HTML code injection/cross site scripting attack. A malicious user could craft a mail containing HTML and Javascript code. Such code could be used to steal session information from the victims cookies, and thus enable the attacker to get access to the victim's emails. Vulnerable versions are Exchange 2000 (SP3), 2003 (SP1), 2003 (SP2).
660a8881d54862ec36db23fe8a4c02478e27719f256152894a6da754d91c8977
WBB version 2.1.6 is susceptible to a SQL injection flaw in profile.php.
6157fa137220101662b1d7d9a1c08030647c44154f00a12317659dabed4b66f8
WBB version 2.2.1 is susceptible to a SQL injection flaw in studienplatztausch.php.
2fddb4891ff9e5cf5b8c41557d1d05f204399fba8d38e187be0f2924f3198053
WBB version 2.2.2 is susceptible to a SQL injection flaw in thread.php.
4d081f6b4eb5ba1606f6253b7c724c0a9037c6360aa0b04152a046e1e953c019
bbrss PHPBB is susceptible to a remote file inclusion flaw.
16024f1dffc64686c3d2b570bc13135cf587f98b5c1a65678107489728036b32
Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.
653daa580b75c74cfe8c26da3ce396ad08342a7308f7fd1e63ce4e11b1f2dbd8
Nuface is a Web-based administration tool that generates Edenwall, NuFW, or simple Netfilter firewall rules. It features a high level abstraction on the security policy set by the administrator, and works internally on an XML data scheme. Its philosophy is to let you agglomerate subjects, resources, or protocols into meta-objects, and use those meta objects to generate ACLs, which are then interpreted as netfilter rules by Nupyf, the internal XML parser. This tool may easily be extended to support firewall implementations other than Netfilter.
c7083d6cfdb2e69e1ec2f9d7f9e58c1569ae9914f576f5bce1d6f43d88a386b2
VisualRoute is a traceroute tool which displays a map of the path to the destination server by looking up the geographical location of each traceroute hop. The network service provider is identified for each hop, and instant domain and network whois information enable quick problem or abuse reporting.
d6dfd32e39ce1cefb7229c255e35d27d6796c93088bb2e6f086c715a99dd4d82
Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Full changelog available here.
3aa1545b95977bbcda85b12cf39558809529da33f40f3f2d7d2c523e0524c892
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
3b8449c1488ef82857b42144cf919a3c6cf1aacd165065904d8e62bc9a8b4437
The Kernel Object Manager is prone to a deadlock situation which could be exploitable making unkillable any process running, complicating its elimination. Exploit included.
17871ea1d002a3e25ba2cf1431e565ed676c7752e14f1d0fb9ed45a6c632038d