Debian Security Advisory 1260-1 - Vladimir Nadvornik discovered that the fix for a vulnerability in the PALM decoder of Imagemagick, a collection of image manipulation programs, was ineffective.
aa765e35bfdb110955bbb705eadfd520de8170552327d53417c194a5f414cad3
Debian Security Advisory 1259-1 - Isaac Wilcox discovered that fetchmail, a popular mail retrieval and forwarding utility, insufficiently enforces encryption of connections, which might lead to information disclosure.
c60bdd36c32a73ec0793bd760ad373fbc9341b987529b19badf093420add44fe
Cisco Security Advisory - Multiple vulnerabilities exist in the Cisco Firewall Services Module (FWSM). These vulnerabilities occur in the processing of specific Hypertext Transfer Protocol (HTTP), Secure HTTP (HTTPS), Session Initiation Protocol (SIP), and Simple Network Management Protocol (SNMP) traffic. If verbose logging is enabled for debugging purposes, a vulnerability exists when the FWSM processes packets destined to itself. All of these vulnerabilities may result in a reload of the device. An additional vulnerability is included in this advisory in which the manipulation of access control lists (ACLs) that make use of object groups may corrupt the ACL and create a situation where unwanted traffic may be permitted or desirable traffic may be blocked.
ffbdee2e2df1c95386813f4b5df5bdee58d2eda35f1e59c5085488098a4ab9bb
Lotus Domino versions R6 and below Webmail remote password hash dumper exploit.
ad22d459010ddc2813609f50832c4ec30e103ff1c2e8748027b6e972b7278f8f
Portable OpenSSH versions 3.6.1p-PAM / 4.1-SUSE and below timing attack exploit.
f25691280caf5c0610c2c430c5e76c98a08e326e070c34a498599bbe58fdb48f
Cisco Security Advisory - Multiple vulnerabilities have been found in Cisco PIX 500 Series Security Appliances and the Cisco ASA 5500 Series Adaptive Security Appliances. They affect enhanced inspection of Malformed Hypertext Transfer Protocol (HTTP) traffic, inspection of malformed Session Initiation Protocol (SIP) packets, inspection of a stream of malformed Transmission Control Protocol (TCP) packets, and privilege escalation.
8167feaea4e52bdf8cc4dfe4e381154dc1507696ef8d8b36ae4361e623cd4510
Jupiter CMS version 1.1.5 suffers from multiple vulnerabilities including SQL injection, cross site scripting, local and remote file inclusion, and more. I think it should be a do-over.
29e4e1338ce8216c5004ac09b14b7abd2b0eea6f1b8b9af2df13bcfda27ab063
WebTester versions 5.0.20060927 and below suffer from SQL injection and cross site scripting flaws.
e072f5af00a163f6288185a2212762ff0cd963b7b81dcc1a25cd51da6caf7e74
HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running ARPA transport. The vulnerability could be exploited by a local user to create a Denial of Service (DoS).
55dff529c8ef517e31a1991a7cdccfc61e23e35d42ff73562762cab1f40764ef
HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running SLSd. The vulnerability could be exploited by a remote unauthorized user to create arbitrary files leading to root access.
3f718e1378fd6f2413e83eaa4cb427097d432fd050e954c73ff2c3d7fe959fe4
Secunia Research has discovered some vulnerabilities in MailEnable Web Mail Client, which can be exploited by malicious people to conduct cross-site scripting, cross-site request forgery, and script insertion attacks. MailEnable Professional Edition 2.351 is affected. Other versions may also be affected.
fb4fcc8670e75296e9a154f415cc4bef6be8cace7506203c92a9bec17712698c
MailEnable Pro/Enterprise version 2.37 proof of concept exploit that makes use of an out of bounds memory read in the NTLM authentication routines.
8232149536e1a3a79572b4f8e18e033b75359eb3dae51b2236c5f1c0d6873713
MailEnable Pro/Enterprise versions below 2.351 proof of concept exploit that makes use of an out of bounds memory read in the NTLM authentication routines.
0eb226440d272dd7b50d84b1d0e45df785d10d57377fc564492aed8c271a5494
Nikto is a perl open source web server scanner which supports SSL. Nikto checks for (and if possible attempts to exploit) over 2400 remote web server vulnerabilities and misconfigurations. It also looks for outdated software and modules, warns of any version specific problems, supports scans through proxies (with authentication), host Basic authentication and more. Data is kept in CSV format databases for easy maintenance, and supports the ability to automatically update local databases with current versions on the Nikto web site.
e53a16d73c9ed116b1f771b1da3a606aa16b6322b50463730c14ed0ccecb3bb3
iDefense Security Advisory 02.13.07 - Remote exploitation of a design error within Hewlett-Packard's "SLSd" daemon could allow an attacker to execute privileges as the superuser. The problem specifically exists due to a design error within the "SLSd_daemon" RPC daemon that provides connectivity between the distributed systems. This daemon registers itself under the RPC PROGID of 536870913 or 351456, depending on the HP-UX version. By sending a specially crafted request, the daemon will write attacker supplied data to an arbitrary file as the superuser. iDefense has confirmed the existence of this vulnerability within the "SLSd_daemon" binary as shipped with HP-UX 11.11i and 10.20. All versions are suspected to be vulnerable.
5d966ffbfa9606e8285b6e8431b6e6159a78119177ab10f3baecfe0340ab61d3
Microsoft Interactive Training suffers from a buffer overflow vulnerability when accessing files with .cbo extensions.
ea92dd141ee858165b4262471ac6a3e5cdc1e188ccf30be4703e290ce93ca574
Ruined "Ruby Iptables NEtwork Displayer" draws a svg from your Linux IP tables generated from "iptables-save".
efc430a244fbf3c9251d627309f0d9be3caa71360a9a9654f689e24cbd1be3dd
Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.
c39005318d4a7d27d9710c3d71396b8c500e0bc5a184cb7392051c9ca9dea60d
Authforce is an HTTP authentication brute forcer. Using various methods, it attempts brute force username and password pairs for a site. It has the ability to try common usernames and passwords, username derivations, and common username/password pairs. It is used both to test the security of your site and to highlight the insecurity of HTTP authentication due to the fact that users just don't pick good passwords.
041b5668ad440fa0a752ab4f956da4a64dc6403df1b48f8cfe342631b275f447
Gentoo Linux Security Advisory GLSA 200702-04 - RAR and UnRAR contain a boundary error when processing password-protected archives that could result in a stack-based buffer overflow. Versions less than 3.7.0_beta1 are affected.
c64c2f4d7e09f6b419696909f88a5a7491475c13b34413689fa586cb6682e5aa
Gentoo Linux Security Advisory GLSA 200702-03 - Randy Smith, Christian Estan and Somesh Jha discovered that the rule matching algorithm of Snort can be exploited in a way known as a backtracking attack to perform numerous time-consuming operations. Versions less than 2.6.1.2 are affected.
65c813c6f8def59606b0a6f869a75f30ed68138fe2555257e5cc8c804c85c7cc
Gentoo Linux Security Advisory GLSA 200702-02 - A flaw exists in the mod_ctrls module of ProFTPD, normally used to allow FTP server administrators to configure the daemon at runtime. Versions less than 1.3.1_rc1 are affected.
e3494f4786d21ba459f57467fc252395dccb62ce7f6364e4e60eb0550b575d8d
Symantec Vulnerability Research SYMSA-2007-002 - Palm OS Treo smartphones are equipped with a system password lock to secure contents of handheld data from unauthorized access. When this lock is engaged, Treo's built-in Find feature is still accessible and can be used to perform searches on text in Treo applications and databases (e.g. SMS Messages, Memos, Calendar, Tasks, etc). Search results are accessible, and depending on their size, may be truncated. An attacker may use this vulnerability to retrieve information from a locked device.
2734f632d4167db6cb0b20e9be04487d20d1f292bf2c6fa64475d18ee0570c91
iDefense Security Advisory 02.13.07 - Remote exploitation of a design error in Microsoft Corp.'s 'wininet.dll' FTP client code could allow an attacker to execute arbitrary code. The vulnerability specifically exists in the parsing of reply lines from remote FTP servers. During an FTP session, the client makes requests for the server to perform some operation and the server responds with a numeric code, a human readable message and possibly some other information. As there can be multiple lines in a reply, code in the client breaks the reply up into lines, putting a null byte (character 0x00) after any end of line character. In the case where a line ends exactly on the last character of the reply buffer, the terminating null byte is written outside of the allocated space, overwriting a byte of the heap management structure. By sending a specially crafted series of replys to the client, the heap may be corrupted in a controlled way to cause the execution of arbitrary code.
d22eb45fb37255371e9e850913d16605ad17aba88ae9adde20de88175b31549f
Gentoo Linux Security Advisory GLSA 200702-01 - A format string vulnerability exists in the VFS module when handling AFS file systems and an infinite loop has been discovered when handling file rename operations. Versions less than 3.0.24 are affected.
e5ec610ebb8382e354a24ce5c218a5bbe4df6e7cb8d78ac88b5904c811a4b34a