PhpMyAdmin versions 2.8.1 and below suffer from a cross site scripting vulnerability.
88bd3870ce5dd147294ea5403ed53b749090963260ecf3d9be70ea9eb50b844c
Trevorchan version 0.7 suffers from a remote file inclusion vulnerability.
c67cd9291cf43b92b7b58b6fa95687bda3aef46cd8e635569102363ae50e1960
PHP-Nuke versions 7.9 and below suffer from a SQL injection vulnerability.
52bb7838d5fc015299a8ede3ec088eed8005e72df86a4ade620af7ba20d893b1
Ipswitch WS_FTP 2007 Professional suffers from an access violation vulnerability.
cd075200d73aecb7d60960711e1316a907ac76053d61b06e90b6a6eddc12b510
Mandriva Linux Security Advisory - An array index error in the URI parser in neon 0.26.0 to 0.26.2 could possibly allow remote malicious servers to cause a crash via a URI with non-ASCII characters. This vulnerability may only exist on 64bit systems.
2da43ed8fd2196220855b11618d1f963b24c141868d87e133907594e56f417ca
Debian Security Advisory 1248-1 - Roland Lezuo and Josselin Mouette discovered that the libsoup HTTP library performs insufficient sanitizing when parsing HTTP headers, which might lead to denial of service.
05602ec0c27e8aac567482fe0aa51a4a4e31c60f1fb7445687a192451b0153e2
Naig versions 0.5.2 and below suffer from a remote file inclusion vulnerability.
aa246e75192b2f72a734f18144a8134a2c0c7388a4280c672c68dda9a9611755
AIOCP versions 1.3.009 and below suffer from a login bypass vulnerability due to another SQL injection flaw.
51e93476657f7c3a7b722ae50dd0f024589283fb41bfad6a5937484ba66fe8e4
AIOCP versions 1.3.009 and below suffer from a SQL injection vulnerability.
5afac79b21f06368a5c3d63bce252007bc9ac4d2fb4cb5eae67b296a29f7d908
Gentoo Linux Security Advisory GLSA 200701-08 - Christoph Deal discovered that JPEG files with a specially crafted DHT marker can be exploited to cause a heap overflow. Furthermore, an anonymous person discovered that Opera does not correctly handle objects passed to the createSVGTransformFromMatrix() function. Versions less than 9.10 are affected.
0744cce83a1cf504b0ade8415037e7c725339bfe3dfe3a5b7f7e40f48f6f6a41
Gentoo Linux Security Advisory GLSA 200701-07 - John Heasman of NGSSoftware has discovered integer overflows in the EMR_POLYPOLYGON and EMR_POLYPOLYGON16 processing and an error within the handling of META_ESCAPE records. Versions less than 2.1.0 are affected.
59a0edcf34741ec1364c4d285a74bc9e8fdc9a69b19e236a0a5874c05199b6a5
Gentoo Linux Security Advisory GLSA 200701-06 - w3m in -dump or -backend mode does not correctly handle printf() format string specifiers in the Common Name (CN) field of an X.509 SSL certificate. Versions less than 0.5.1-r4 are affected.
68971d38b2883d8f5926f24733480d707c5b242557150822fcf22d6750966028
Gentoo Linux Security Advisory GLSA 200701-05 - Marcus Meissner of the SUSE security team discovered a stack overflow vulnerability in the code processing EXIF information in the kfile JPEG info plugin. Versions less than 3.5.5-r1 are affected.
e32236e4c6512b7966daf9fbfb7c1ba6e3ac3226ab8e3b119af1855b8f6ae48f
Mandriva Linux Security Advisory - Quite a few vulnerabilities were discovered and corrected in the Linux 2.6 kernel.
09a69dd712e043b9b8487488c89394362041b18e438c74948170cd024f0fc7cf
Corsaire Security Advisory - The aim of this document is to clearly define an issue that exists with the ChainKey Java Code Protection product, that will allow an attacker to circumvent the encryption protection and de-compile any protected Java application.
507876689ae809c61bbd55e5605025bf397f044485c22295d1991e697e006a78
Responsible Disclosure - A brief presentation concerning 'Responsible Disclosure' and the timely release of security vulnerability information to the wider research community.
1a0e14b54dc6307a6e1fd8b0d0c239ffbbe43196eb08145f5fa525109aeb60c2
Micro CMS version 3.5 remote file inclusion exploit.
c4d2cd88a01c55d00bf550fccb4dcdbd0fe0c8bcb53bd3ddd3560e625a901c07
Ubuntu Security Notice 406-1 - An integer overflow was discovered in OpenOffice.org's handling of WMF files. If a user were tricked into opening a specially crafted WMF file, an attacker could execute arbitrary code with user privileges.
65644505b73606cd89efa9126c65db8ddcdeb3b59e2fa2b6710454902ec73f0b
Mandriva Linux Security Advisory - A number of security vulnerabilities have been discovered and corrected in the latest Mozilla Thunderbird program, version 1.5.0.9.
0f43fb0ea8f936a8ac96a8d1144f37e78d3cce8a7251e9b4660e34bae8df6834
WordPress versions 2.1Alpha and 2.0.6 and below suffer from information disclosure flaws.
adfae8db1766a8f08d12248b31178778321123de1d0b3adecc24e59f6089943d
CA BrightStor ARCserve Backup contains multiple overflow conditions that can allow a remote attacker to execute arbitrary code with local SYSTEM privileges on Windows. The BrightStor ARCserve Backup Tape Engine service, Mediasvr service, and ASCORE.dll file are affected.
277d1dc497086cde18530d9b1513f826b6a78561bd1e1048a84224d877383608
LSsec has discovered a vulnerability in Computer Associates BrightStor ARCserve Backup version 11.5, which could be exploited by an anonymous attacker in order to execute arbitrary code with SYSTEM privileges on an affected system.
cffb5e89758db2018d711587005164f30dedaaa571b7cd3c135a33530295b5db
Ezboxx Portal System Beta versions 0.7.6 and below suffer from numerous cross site scripting, path disclosure, and SQL injection vulnerabilities.
ca487e9e3723f9f5e71e8df70fa1c6578b240c17f8eac5a28869213f88ca4470
TNV visualizes pcap data to graphically depict network packets, links, and ports for network traffic analysis to facilitate learning what constitutes 'normal' behavior, investigating security events, or network troubleshooting. It depicts network traffic by visualizing packets and links between local and remote hosts. It is intended for network traffic analysis to facilitate learning what constitutes 'normal' activity on a network, investigating packet details and security events, or for network troubleshooting. It can open saved libpcap (from tcpdump, windump, ethereal, etc.) formatted files or capture live packets on the wire, and export data in libpcap format or save the data to a MySQL database to enable the examination of trends over time.
7e3c940e2b570200eb3c95f82e8c81697c8835be3e5faedb3e0e7f32c775cd70
Rule Set Based Access Control (RSBAC) is an open source security extension for current Linux kernels. It is based on the Generalized Framework for Access Control (GFAC) and provides a flexible system of access control implemented with the help of a kernel patch. All security relevant system calls are extended by security enforcement code. This code calls the central decision component, which in turn calls all active decision modules and generates a combined decision. This decision is then enforced by the system call extensions.
8d82e208844625913e969bfb6469aa1d8855b0b971aec1085f3d8b16c0f0cb77