Core Security Technologies Advisory - A vulnerability was found in VMware's shared folders mechanism that grants users of a Guest system read and write access to any portion of the Host's file system including the system folder and other security-sensitive files. Exploitation of this vulnerability allows attackers to break out of an isolated Guest system to compromise the underlying Host system that controls it. Proof of concept code included.
68b271fbfbeed0f3bae80dc9ec60d6899f7aca244beef0090f1c0a0c97ce10b8
Core Security Technologies Advisory - A vulnerability found in OpenBSD's dhcpd allows attackers on the local network to remotely cause the DHCP server to corrupt its process memory and crash; or continue functioning erratically thus denying service to all DHCP clients on the network and, if PF updates are in use, potentially affecting egress/ingress filtering as well. OpenBSD 4.0, 4.1, and 4.2 are affected.
cc127679daebed5635aaa505605a453c6446720485c7a6f386cb9d149b3fdbbc
Core Security Technologies Advisory - The OpenBSD kernel contains a memory corruption vulnerability in the code that handles IPv6 packets. Exploitation of this vulnerability can result in remote execution of arbitrary code at the kernel level on the vulnerable systems and/or a remote denial of service condition. Affected systems include OpenBSD 4.1 prior to Feb. 26th, 2006, OpenBSD 4.0 Current, OpenBSD 4.0 Stable, OpenBSD 3.9, OpenBSD 3.8, OpenBSD 3.6, and OpenBSD 3.1. Proof of concept exploit included.
2d5d5651f3ce213312cb165a62fc0f511f0b8d1488dfffa7ab49170738c88652
Core Security Technologies Advisory - GnuPG and GnuPG clients suffer from an unsigned data injection vulnerability.
105bc292cde7181a51838486efb114fc2b42ca52c8eb7401d9334c18e0c47625
Full write up discussing the Mailslot bug discussed in MS06-035 and another bug discovered alongside of it.
37799790f311e5fe10057f6ffd957cdcaf20e6282be1505a9bad9655596797ba