Debian Linux Security Advisory 1065-1
Debian Security Advisory 1065-1 - Matteo Rosi and Leonardo Maccari discovered that hostapd, a wifi network authenticator daemon, performs insufficient boundary checks on a key length value, which might...
View ArticleDebian Linux Security Advisory 1066-1
Debian Security Advisory 1066-1 - It was discovered that phpbb2, a web based bulletin board, does insufficiently sanitize values passed to the "Font Colour 3" setting, which might lead to the execution...
View ArticleDebian Linux Security Advisory 1067-1
Debian Security Advisory 1067-1 - Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code.
View ArticleDebian Linux Security Advisory 1068-1
Debian Security Advisory 1068-1 - Jan Braun discovered that the fbgs script of fbi, an image viewer for the framebuffer environment, creates an directory in a predictable manner, which allows denial of...
View ArticleDebian Linux Security Advisory 1069-1
Debian Security Advisory 1069-1 - Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code.
View ArticleDebian Linux Security Advisory 1070-1
Debian Security Advisory 1070-1 - Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code.
View Articleapplesafari203.txt
A vulnerability exists in Apple Safari 2.0.3 (417.9.3) and perhaps in prior versions which shows up the SRCOD (Spinning Rainbow Cursor Of Death).
View ArticleHP Security Bulletin 2006-11.33
HP Security Bulletin - A vulnerability has been identified in Sendmail which may allow a remote attacker to execute arbitrary code.
View ArticleSSRT2400.txt
HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running the BINDv4 Domain Name Server (DNS). The vulnerability could be exploited to poison the DNS cache...
View ArticleHP Security Bulletin 2006-11.45
HP Security Bulletin - Potential security vulnerabilities have been identified in Firefox for HP Tru64 UNIX and in the Mozilla Application Suite for HP Tru64 UNIX. The vulnerabilities could result in...
View ArticletopsitesXSS.txt
Xtremescripts Topsites version 1.1 is susceptible to cross site scripting and SQL injection attacks.
View ArticleTechnical Cyber Security Alert 2006-139A
Technical Cyber Security Alert TA06-139A - Microsoft Word contains a buffer overflow vulnerability. Opening a specially crafted Word document, including documents hosted on web sites or attached to...
View Articleinterlink.txt
news_information.php in Interlink is susceptible to cross site scripting.
View ArticleRaceEventManagement.txt
RaceEventManagement version 0.7.6 is susceptible to SQL injection and cross site scripting attacks.
View ArticlephpBazar210.txt
phpBazar versions 2.1.0 and below suffer from remote file inclusion and credential access flaws.
View Articlezix112.txt
Zix Forum versions 1.12 and below suffer from SQL injection vulnerabilities.
View Articlevp-asp-new.txt
VP-ASP versions 6.00 through 6.08 suffer from a remote SQL injection vulnerability.
View Articlecyruspop3d.c
A remote stack-based buffer overrun exists in Cyrus-imapd pop3d. Details and an exploit are included.
View ArticleTZO-072006-Xampp.txt
XAMPP version 1.5.2 is susceptible to multiple privilege escalation flaws and a rogue autostart vulnerability.
View Articler57obsdiso.txt
Simple tool written in Perl that creates ISO images for OpenBSD releases.
View ArticleGentoo Linux Security Advisory 200605-14
Gentoo Linux Security Advisory GLSA 200605-14 - Luigi Auriemma has found two heap-based buffer overflows in libextractor 0.5.13 and earlier: one of them occurs in the asf_read_header function in the...
View ArticleGentoo Linux Security Advisory 200605-15
Gentoo Linux Security Advisory GLSA 200605-15 - Konstantin V. Gavrilenko discovered two flaws in the Routing Information Protocol (RIP) daemon that allow the processing of RIP v1 packets (carrying no...
View Articlepbnj-1.14.tar.gz
PBNJ is a network tool that can be used to give an overview of a machine or multiple machines and includes the details about the services running on them. PBNJ is different from other tools because it...
View ArticleskypeVuln.txt
During the typical installation of the Windows Skype client, several URI handlers are installed. This allows for easy access to the Skype client through various URI types. Due to a flaw in the handling...
View Article