Ubuntu Security Notice 1164-1 - Thomas Pollet discovered that the RDS network protocol did not check certain iovec buffers. A local attacker could exploit this to crash the system or possibly execute arbitrary code as the root user. Dan Rosenberg discovered that the CAN protocol on 64bit systems did not correctly calculate the size of certain buffers. A local attacker could exploit this to crash the system or possibly execute arbitrary code as the root user. Various other issues were also addressed.
4e4395012a3efacb0412aff2ad1192af5495aeffbe292f807d0de267e1af68f2
SyRiAn Sh3ll is a PHP backdoor that allows for database access, local exploitation of the host, and more.
0e7f6e9c57da41f9316262dc22b4b3227f52c30f15747639a8780ab3c18c4fa8
This is a simple perl script called Viper LFI Scanner that enumerates local file inclusion attempts when given a specific target.
29bd41af57ba7569fad9b21b50e8ad9096741e3ee23063f560b4b57da70a4d8d
112 bytes small all Windows null-free CreateProcessA calc.exe shellcode.
dfff5aba1ff807d6c0bb374cc445b05cbf2421d449374ee9d01434ca10a7a8e0
Tech2.in.com suffers from a cross site scripting vulnerability.
8b69cf0f48e3761fdf06393626690e0d8cd602913c01dc749e964fb457457306
Joomla 1.6.3 cross site scripting to cross site request forgery exploit.
582284d3182e3c71ec45888b90c64a5c448d04da37892afb4ba24dea595a2995
bbzl PHP version 0.92 suffers from a remote file inclusion vulnerability.
e6ef7da7b99fd757b06ae9626b38ebaa35c53dd7aedef24f52d412905ffb9a0f
Secunia Security Advisory - Fedora has issued an update for feh. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges.
f21cdf6eda5039b30324219db1f5c4722e007e747adbcbd384d7aaac048b4768
Secunia Security Advisory - SUSE has issued an update for MozillaFirefox and MozillaThunderbird. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose potentially sensitive information, conduct cross-site scripting attacks, and compromise a user's system.
f4e813f54ead7f554acfcdf5a24a5e03a369177a7c4fe73dcab1bef7cab9fadc
Secunia Security Advisory - Ubuntu has issued an update for bind9. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
dc2d2c404f7ae86e91cc3d875b5094e659623349e44f5d8aab5352fefa6c12c9
Secunia Security Advisory - Multiple vulnerabilities have been reported in the phpMyAdmin extension for TYPO3, which can be exploited by malicious users to disclose sensitive information and by malicious users and malicious people to compromise a vulnerable system.
cb8422179f5a247127531e9aad94bf47d25c0e33c62c757779bf05e285eb6979
Secunia Security Advisory - Debian has issued an update for bind9. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
9f93cafd5ddfe49a28dba89b2934c746c7dccc7bdc7b0d41980c0f2aefdf3e18
Secunia Security Advisory - SUSE has issued an update for SUSE Manager. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
bcedfdc36168d9a7a09c4b4144d5755e8077e20c0d66fe038d21c7503d694df3
Secunia Security Advisory - A vulnerability has been reported in HP-UX, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges.
b21b8b2534d87d82ea83186d3b511b4febd91a902aae09d07bb9263d0deb5480
Secunia Security Advisory - Debian has issued an update for qemu-kvm. This fixes a vulnerability, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service).
5b1c6fbbaca4d09907378568d48efbc2b536c50d811023b0886d836a4e3519c2
Secunia Security Advisory - A security issue has been reported in Kerberos Applications, which can be exploited by malicious users to bypass certain security restrictions.
e99e8ffd5e1d54388f68c5ddda4c3f4eb73db78cbcb54bc2e8c5df4784cb9f4a
Secunia Security Advisory - Red Hat has issued an update for krb5-appl. This fixes a security issue, which can be exploited by malicious users to bypass certain security restrictions.
6eed21d6eb3f87cd9456c2e0827df8e14a9af812e820abe63dffcf90f368833f
Secunia Security Advisory - A vulnerability has been reported in Qemu, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service) and potentially gain escalated privileges.
7cf1d11d2494b7a7db5b0cb44a854ba36ea761d664a34c4601aceddf7b43095d
Secunia Security Advisory - A vulnerability has been reported in KVM qemu-kvm, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service) and potentially gain escalated privileges.
fad90f6c41a3979a140831aeb137f8f59f6f81d55a6ec286521cf1473ec84984
Secunia Security Advisory - Red Hat has issued an update for qemu-kvm. This fixes two vulnerabilities, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service) and potentially gain escalated privileges.
eda112f34f4845033f4d2e6f33fc638a1677577ec1614ecc98b4f2a2bf0b2241
Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in aTube Catcher, which can be exploited by malicious people to manipulate certain data.
f8da2b6e0a47eb6c7f6844a1347fd9e0f529457c2f4db591a62bcba0e58e4857
DmxReady Secure Document Library version 1.2 suffers from a remote SQL injection vulnerability.
382fb3f2808449497ba78691a456354f4ba3af3c4c8b952cbc2a57e3afd710af
Golden FTP version 4.70 buffer overflow exploit that leverages PASS.
48d542cf202d390efd0868d601d8d03cfd07f11053f3cf57f956610b36491097
Two defects were discovered in ISC's BIND 9 code. These defects only affect BIND 9 servers which have recursion enabled and which use a specific feature of the software known as Response Policy Zones (RPZ) and where the RPZ zone contains a specific rule/action pattern. Versions affected include 9.8.0, 9.8.0-P1, 9.8.0-P2, and 9.8.1b1.
b6ad17a9a1d1804fc67784d812b2666a838b7eea31ca8b784928e77b32d9d084
The IETF has just published RFC 6274, entitled "Security Assessment of the Internet Protocol Version 4". It contains a large amount of information on how to improve the security of IPv4 implementations and IPv4 deployments.
f2192e38c8aa09b26b2a3d2e012d56c5e0ae4167e587238f3bd969b8f09dd408