Secunia Security Advisory - rPath has issued an update for bind and bind-utils. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.
fd818876fa237a7582e05b64ea25edb01028a7bf611faea87c926d4f2f037234
Secunia Security Advisory - Will Drewry has reported some vulnerabilities in International Components for Unicode, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.
a4e794a8373546cea2a26097d87a6dbf82ed49a32f3ce07201eb87fa0c2882df
Secunia Security Advisory - Mandriva has issued an update for x11-server. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or to gain escalated privileges.
d4492bb3a8c57468dfb513f8a3fd6f291fb4662efcd3309ffd6418ae3bdef7ba
Secunia Security Advisory - Fedora has issued an update for hsqldb. This fixes a vulnerability, which has unknown impacts.
895022e51940889de6c09f20eba22d10f0840c57a20858eff243263f1be4893d
Secunia Security Advisory - rPath has issued an update for CherryPy. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security settings.
e4da6b5c41cbdb6fdb47d3b1cc1069344ae2889ebfa5d5f8e28e9038d33e619f
Secunia Security Advisory - Red Hat has issued an update for icu. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.
60b2814370492d07c03409ab619e98e8f0c86720e9c66ff57b5f601f4bca81d6
Secunia Security Advisory - Fedora has issued an update for pulseaudio. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges.
b6697e2373efd7bbdbede92d40e9429b7d02343bbeb976a606c6007ebad2a745
Secunia Security Advisory - Fedora has issued an update for xorg-x11-server. This fixes a security issue, which can be exploited by malicious people with physical access to a system to bypass certain security restrictions.
8fbaad74f91f05574ff9b7cc5e72d23acf770535424a7e71110f72499aa8c52f
Secunia Security Advisory - Fedora has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions and corrupt a file system.
4e707861eed92614ddd6b68ecfefddb3be63e93d78bfca4125a346e0f24d31b5
Secunia Security Advisory - Some vulnerabilities have been reported in Docsvault, which can be exploited by malicious people to compromise a vulnerable system.
8498aeba4dabf8a0d543b494c1a61ad82b88efd4204b4d6c5c42eebcdaa2712f
Secunia Security Advisory - SUSE has issued updates for multiple packages. These fix some vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service) and by malicious people to bypass certain security restrictions, to cause a DoS, or to compromise a user's system.
fc1e586a6f69b486253ad55ef1fe676e4ce36b090e9fa4bb9b5e5418be0572d3
Secunia Security Advisory - fuzion has discovered a vulnerability in Seagull PHP Framework, which can be exploited by malicious people to disclose sensitive information.
4b006d7c7a0b05c26943e72c37369d4a2ce48d3c1168e86f2ca520f43fe75292
iDefense Security Advisory 01.23.08 - Local exploitation of a buffer overflow vulnerability in IBM Corp.'s AIX operating system 'pioout' program allows attackers to execute arbitrary code with root privileges. The vulnerability exists due to insufficient input validation when copying user-supplied data to a fixed-size buffer. By passing a long string as a command line option, an attacker can cause an exploitable buffer overflow. iDefense has confirmed the existence of this vulnerability in version 5.2 and 5.3 of AIX with all patches applied as of November 29th, 2007. Previous versions are suspected to be affected.
0c544c96e82318461295adc559d908532902371421d53ecc023219ebd696ae0b
iDefense Security Advisory 01.22.08 - Remote exploitation of a buffer overflow vulnerability in the web server component of IBM Corp.'s Tivoli Provisioning Manager for OS Deployment allows attackers to cause a denial of service condition or potentially execute arbitrary code with SYSTEM privileges. This vulnerability specifically exists within the logging functionality of the web server component. By making requests with a large HTTP request method, an attacker can cause a static-sized buffer to be overrun with data they supplied. iDefense has confirmed the existence of this vulnerability in IBM Tivoli Provisioning Manager for OS Deployment version 5.1.0.3. Previous versions may also be affected.
43cc7ce0fa301c94cc9b1e2a2764e9657d25cf17e034be6283e72f34cfe0fb11
Mandriva Linux Security Advisory - Multiple vulnerabilities including file verification, memory corruption, information disclosure, integer overflows, and an input validation flaw were discovered in x11-server-xgl.
92ecb1a076f5e1d5237fd0dc8af22f189ba31dda87c81dcb4ac65d4633e134cb
Mandriva Linux Security Advisory - A heap-based buffer overflow flaw was found in how the X.org server handled malformed font files that could allow a malicious local user to potentially execute arbitrary code with the privileges of the X.org server.
1189a55a8aecdeb393eec235b55875de88aa353539a88bdfa0670cc6e24545d2
Mandriva Linux Security Advisory - Multiple vulnerabilities including file verification, memory corruption, information disclosure, integer overflows, and an input validation flaw were discovered in x11-server.
7899a5f8c05a71db0dc6e0db3895c11521ba293b378be8e22f34b011a7f8e84c
Mandriva Linux Security Advisory - Multiple vulnerabilities including file verification, memory corruption, information disclosure, integer overflows, and heap overflows were discovered in xorg-X11.
2690245c14cccd070bbdc7a657598d08fbe2f618754259f55d88d7477ba76ece
Mandriva Linux Security Advisory - Multiple vulnerabilities including file verification, memory corruption, information disclosure, integer overflows, and heap overflows were discovered in XFree86.
361ca5c5a576c2dead010393dc88fc0b7518b65926bef03bec670799801efe06
Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (directories, files), bruteforce HEADERS, GET and POST parameters for checking different kind of injections (SQL, XSS, LDAP,etc), bruteforce Forms parameters (User/ Password), Fuzzing, etc.
fc1a73ded9af26968df62c865343f4ddfe5300ca020cd32a41ab9f0bb2577adb
PExtractor is a forensics tool that can extract all files from an executable file created by a joiner or similar.
d56062cf1ab0f5323aba9e3a81dd0852581f7c1b341823615c4690370255642a
MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with the Sendmail 8.11 and newer "Milter" API, which makes it more flexible and efficient than procmail-based approaches.
593888fd15a71fb192549e799c27a5136cb1efcb35378a266117d5c2b029b89c
wtmpClean is a tool for Unix which clears a given user from the wtmp database.
a1a62e3e9235bf5899827ff0430ec07ad182570ba5cdb9b3260c0fd30edc4f61
ImageShack Toolbar version 4.5.7 FileUploader class insecure method proof of concept exploit.
00d868858565241dd37da4195ce062c98b6b7264a20be4df86f24e004f8495c6
Gateway WebLaunch ActiveX remote buffer overflow exploit with calc.exe and port binding shellcode.
61cc61f42d754de986e78603ee82b033708006bd45966dae20ec804a1c5c4a15