Secunia Security Advisory - A vulnerability has been reported in Xpdf, which can potentially be exploited by malicious people to compromise a user's system.
75a4fae20e4e1e877173868bf06b4142405fe046342a176cf8e4f7eafeb2a489
Secunia Security Advisory - A vulnerability has been reported in Poppler, which can potentially be exploited by malicious people to compromise a vulnerable system.
7c85daf01b77d295273336d9e88a96bbe0e11c1be2cd7d9444de4a84e55a70aa
Tcpdump allows you to dump the traffic on a network. It can be used to print out the headers and/or contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities. Requires Libpcap.
2309c8eb1dc87436a410f4a8d041b0453ade5753c35ce7a2c5bc9a0263a8d299
GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP specific capabilities such as presence and messaging. It supports secure telephone extensions for making calls over the Internet, and intercept/decrypt-free peer-to-peer audio and video extensions. It is not a SIP proxy, a multi-protocol telephone server, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.
c4c336d3454908598c1fa2c92a0ddbf2c246800b3644eb9dad998998ba68dd55
Filezilla versions 3.0.9.2 and below allow local users access to all saved passwords due to the fact that they are stored in plain text in sitemanager.xml.
baef52a04f5fee72b20d099e73501263952f3c0711e842c77dc3b827bb21bfec
Secunia Security Advisory - Red Hat has issued an update for ImageMagick. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.
012b5147d84eae68c492f302ee2a278f6ae6b51dcd72610cbc7da13b0c22f72b
Secunia Security Advisory - A vulnerability has been reported in VLC, which can potentially be exploited by malicious people to compromise a user's system.
c25a352eedd7c826d07024ec889608eb84254c5e9da9b2fedf429cb8f2bd6caa
Secunia Security Advisory - Red Hat has issued an update for ImageMagick. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.
ab692cb6b8e952ea5dbc20acd97eb80c34e66495b74e1ce9869a1812031015c4
Secunia Security Advisory - Some vulnerabilities have been discovered in Exponent CMS, which can be exploited by malicious people to conduct script insertion attacks.
6153213215913955fc80bb14fe749c7c29ce28a1f048aa0dcbd6e320635a2514
Team SHATTER Security Advisory - IBM DB2 UDB suffers from an arbitrary code execution vulnerability in the ADMIN_SP_C/ADMIN_SP_C2 procedures.
50e6be64cb624506a4f86efaad10de1d3ee7e3c73d10c512e9caa0c69f8eaff0
Team SHATTER Security Advisory - IBM DB2 UDB suffers from an arbitrary file overwrite vulnerability in the SYSPROC.NNSTAT procedure.
5341890b3227b414075c1b956314d51adf6ce18ad13d13edb5b06ae739893562
Team SHATTER Security Advisory - DB2 has multiple vulnerabilities which can lead to Denial of Service (DoS) attacks against the instance. When RECOVERJAR and REMOVE_JAR procedures are called with a specially crafted parameter the DB2 instance crashes. Any DB2 database user can exploit these vulnerabilities since PUBLIC permissions are granted to both procedures by default. The RECOVERJAR and REMOVE_JAR procedures are installed by default.
5280bf4da364de375bca4cf60fe5cf84e0b8fd71425f3b82edd5b2f002180611
uTorrent, Azurues, and TorrentFlux all suffer from cross site request forgery vulnerabilities in their WebUI functionality.
0c77874a8b315936bd78c690d6f9b19703cbc2bb9b80c1c2a0634de438d0f593
5th Avenue Shopping Cart suffers from a SQL injection vulnerability.
c3347d26806a3a9bf8defc0a08b1b3ebfc609c226cf7e49df31eb7b0e7beab54
Mandriva Linux Security Advisory - Kees Cook of Ubuntu security found a flaw in how poppler prior to version 0.6 displayed malformed fonts embedded in PDF files. An attacker could create a malicious PDF file that would cause applications using poppler to crash, or possibly execute arbitrary code when opened.
f9016c9218f56709a1ed4fc7880e117f2a6527018eff22a0a85f38da214f689a
Mandriva Linux Security Advisory - Multiple vulnerabilities were discovered in ClamAV and corrected with the 0.93 release. These flaws include various overflows and arbitrary file overwrite vulnerabilities.
d474ff6a17ea20a0e92e6a715984b099fd7cf5ecde7263f122eaed8d88036b0b
RFIDIOt is a python library for exploring RFID devices. It currently drives a couple of RFID readers made by ACG, called the HF Dual ISO and the LFX. Includes sample programs to read/write tags and the beginnings of library routines to handle the data structures of specific tags like MIFARE(r). This is the Windows version.
68de3757a326d03bd4a79ef4d7e791fe5efa4adf582f48999ab09fca73515ede
RFIDIOt is a python library for exploring RFID devices. It currently drives a couple of RFID readers made by ACG, called the HF Dual ISO and the LFX. Includes sample programs to read/write tags and the beginnings of library routines to handle the data structures of specific tags like MIFARE(r).
399465ed73b9b1fa45812f343f3b582f898668a674d9c4cbd28809e40eb5656f
Grape Statistics version 0.2a suffers from a remote file inclusion vulnerability.
c91ba6bb013188d59e737a144c56f7fbf67b7ae0e7fcc0da9aad995bddcf056b
DivX Player version 6.6.0 .SRT file handling SEH buffer overflow exploit.
d0c776b167346cb7b3bbbba959c1a956ee1363a07541a2a131ddbbc93d0153b6
Wikepage Wiki version 2007-2 suffers from a cross site scripting vulnerability.
bf7afc8adcdb16585234069a3235ecf8c4c4c3a9475da8f024eace13aa7fd537
LightNEasy version 1.2.2 suffers from cross site scripting, directory traversal, and arbitrary file creation vulnerabilities.
c036ba9a8d83262e206b26bc2adc802e00d6193acf1fc6e3c8bdb9c594453dc1
Gentoo Linux Security Advisory GLSA 200804-22 - Amit Klein of Trusteer reported that insufficient randomness is used to calculate the TRXID values and the UDP source port numbers. Versions less than 3.1.5 are affected.
f823b54f7bf237110736d4b9631ff06cf6f844a5345ea0258af1485d94cf6dea
Gentoo Linux Security Advisory GLSA 200804-21 - Multiple vulnerabilities have been identified, the worst of which allow arbitrary code execution on a user's system via a malicious Flash file. Versions less than 9.0.124.0 are affected.
4a3ee3ff6a7999720951f79481d198c436b5e52f974d9b599fe1ff85d14b7572
Gentoo Linux Security Advisory GLSA 200804-20 - Multiple vulnerabilities have been identified in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE). Versions less than 1.6.0.05 are affected.
336ca6a967f2af444479d95fdc1e2091e65e778a9202ae7f90eb7a6d79f45707