Mandriva Linux Security Advisory 2010-190 - libtiff allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted TIFF image. The updated packages have been patched to correct this issue.
cc534c77c37d6a0d4869d969ac19c118a8a3fe84d2691705b7aefc53901cc8a5
77 bytes small Win32/XP SP3 (Tr) About Box shellcode.
1eef7c75fa17cd47c35e99721ffb3cb942aa48ae9dccbefcc3b121eed89b554f
The Joomla JE Guestbook component version 1.0 suffers from local file inclusion and remote blind SQL injection vulnerabilities.
1b12d83fd4f626dfd31d51409e28a6598bfabb97d4611fa796385da64f41d358
HP Security Bulletin HPSBMA02558 SSRT100158 - A potential security vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to execute arbitrary code under the context of the user running the web server. Revision 3 of this advisory.
0df748125868d6977062e60048bd38a0e25fe5552ec26f96bcdfe7ab26c6a5af
VMware Security Advisory 2010-0015 - ESX 4.0 Console OS (COS) updates for NSS_db, OpenLDAP, cURL, sudo OpenSSL, GnuTLS, NSS and NSPR packages.
fdad8c6c91e0eabfe81a21d19d5f5d5ed52fdc1c4de978eea683eae1e3131b79
Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes multiple vulnerabilities and weaknesses, which can be exploited by malicious local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or gain escalated privileges, and by malicious people to disclose potentially sensitive information.
0e4a4895914a1a0bebac939716f1b15f2d69ec75029606c697681ee60260636b
Secunia Security Advisory - Ubuntu has issued an update for libgdiplus. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise an application using the library.
bc5a1ea094dd18b1f8b3acbfc6a4220517a1097625bc815809dcc95b67b54268
Secunia Security Advisory - Ubuntu has issued an update for libhx. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library.
8ecf25c03dd05c660dbfa37365f2dd3427fab81c6eef2a9157f52529ec058e2a
Secunia Security Advisory - Gentoo has acknowledged some security issues in fence, which can be exploited by malicious, local users to perform certain actions with escalated privileges.
00b92902a18eb76e1036f61d6da9a39e1ca5c9385beb843a2f6c7fb437249d38
Secunia Security Advisory - A vulnerability has been discovered in Pluck, which can be exploited by malicious people to conduct cross-site request forgery attacks.
1334a3191729e7c0300547c0f267922b03265bfb972950dc2f3fddb5318833e0
Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in Zimplit, which can be exploited by malicious people to conduct cross-site request forgery attacks.
ecf945eee20c4a23287a48d897a49b27660fcf2b7bbe7653e211a86afa0583cf
Secunia Security Advisory - Multiple vulnerabilities have been reported in the Imagemenu module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.
fa3ac77ed301c484ba2047ab9634cd6c4f1df4c7736dd411633dd92528c9d5e6
Secunia Security Advisory - A vulnerability has been reported in the Imagemenu module for Drupal, which can be exploited by malicious people to conduct cross-site request forgery attacks.
a1a45cc486ee0d5b074ac5c29564e9ccdb7d48353dee5ddece8c496d683c72f2
Secunia Security Advisory - A vulnerability has been reported in the PECL Alternative PHP Cache (APC) extension, which can potentially be exploited by malicious people to conduct cross-site scripting attacks.
bb490ec69990a6230896508bd08a349ab71774e96657c53451a0fa40b713e1fe
Secunia Security Advisory - A security issue and a vulnerability have been reported in the Memcache module for Drupal, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to conduct cross-site scripting attacks.
312f0d3555a429da4314ae58c5d4cff623ad6c682efae47c7555fbbb67ace120
Secunia Security Advisory - Julien Cayssol has reported some vulnerabilities in Artica, which can be exploited by malicious users to disclose sensitive information, manipulate certain data, and bypass certain security restrictions and by malicious people to conduct cross-site scripting attacks, SQL injection attacks, and disclose sensitive information.
8aed63a6b90db5cc288c2f4f864a5e210e889293b53c39f9f921a3bbefdeebdc
Secunia Security Advisory - Multiple vulnerabilities have been discovered in JE Guestbook component for Joomla!, which can be exploited by malicious people to conduct SQL injection attacks and disclose sensitive information.
b139be6c4d474d24486a5989a0149e8267221de121e4ebfa12eb8465ea2913a2
Secunia Security Advisory - Fedora has issued an update for php-pecl-apc. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.
c7e5fe9b0f5b2b57b20df73923616e900eaf88b75489e35687439d85d2b93b7a
Secunia Security Advisory - Some vulnerabilities have been reported in webSPELL, which can be exploited by malicious people to conduct SQL injection attacks and bypass certain security restrictions.
9f4ca3a38ee150a9c7633de0fa9fa696f24ae2cec7cb912c22546d87de055632
Secunia Security Advisory - Fedora has issued an update for mantis. This fixes some vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting attacks.
81e3b63643c4e5c301896cb42711ebf5f276c06530a3980d38e52c56be9cfaa5
Secunia Security Advisory - A vulnerability has been reported in 3Com H3C 3100 and 3600 Series switches, which can be exploited by malicious people to cause a DoS (Denial of Service).
bb364d1d21455edc31432e88fd4726c294e20f8739108ccfe7258cdab82c4390
Secunia Security Advisory - A security issue and some vulnerabilities have been reported in phpCAS, which can be exploited by malicious users to perform certain actions with escalated privileges and disclose sensitive information and by malicious people to conduct cross-site scripting attacks.
e09be520ab0c01bdd293924896547fc22a01bbf837790ba2ca5e9b2ef19136cf
Secunia Security Advisory - VMware has acknowledged multiple vulnerabilities in VMware ESX Server, where one has an unknown impact and the others can be exploited by malicious, local users to disclose potentially sensitive information and bypass certain security restrictions and by malicious people to manipulate certain data, conduct spoofing attacks, bypass certain security features, and cause a DoS (Denial of Service).
58d7f168113661542ba2af16bc6a4a1ce7b2fbb3bb3619c2641eb2cc25f49cb1
Zero Day Initiative Advisory 10-187 - This vulnerability allows remote attackers to create a denial of service condition on vulnerable installations of IBM Tivoli FastBack Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within FastBackServer.exe process which listens by default on TCP port 11406. The problematic code resides within a function responsible for reading a block of network packet data. A parameter to this function is initialized to 0 and under certain conditions this value will be accessed before properly initialized. This causes a NULL pointer to be dereferenced and subsequent application crash due to a lack of exception handling. Successful exploitation leads to immediate termination of the fastback server.
0984b15d3968f4422e8c07cdcaa8a2380c56e0597776b56245c3c854f4a99699
Zero Day Initiative Advisory 10-186 - This vulnerability allows remote attackers to create a denial of service condition on vulnerable installations of IBM Tivoli FastBack Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within FastBackServer.exe which listens by default on tcp port 11406. The issue is due to an unchecked user supplied length value. This value is used to iterate over supplied data and calculate a CRC value. Successful exploitation leads to an unhandled access violation and immediate termination of the FastBackServer.exe process.
0bc88f11aaafc7b046a9c46d0bd9535e2a37178c0b44a64f2fff3f816e9f673c