Sun Security Advisory - A security vulnerability in the DHCP administration utilities dhcpconfig(1M), pntadm(1M), and dhcpmgr(1M) may allow an unprivileged local user the ability to execute arbitrary code with the privileges of root.
28d9fe4db2eec10195999416b29730e9a7757b54eb86793f5cefd1b241f69e4f
Debian Security Advisory 658-1 - The Debian Security Audit Project discovered that the DBI library, the Perl5 database interface, creates a temporary PID file in an insecure manner. This can be exploited by a malicious user to overwrite arbitrary files owned by the person executing the parts of the library.
33c649bdecf8390f19cc8ac37b7fe39371b11a83ce1bcdbec402e17800600144
Secunia Security Advisory - A vulnerability has been reported in BRIBBLE, which can be exploited by malicious people to bypass certain security restrictions.
49eed3024e0d77fd91982e0b5803f06cbf50a7556e65b4c8a7455ba4ea6deafb
Debian Security Advisory 657-1 - A heap overflow has been discovered in the DVD subpicture decoder of xine-lib. An attacker could cause arbitrary code to be executed on the victims host by supplying a malicious MPEG. By tricking users to view a malicious network stream, this is remotely exploitable.
498b369f0d2a898c3a04161eb4c4a99551dffdf5ad433f3d72826e8074c9aee1
Debian Security Advisory 656-1 - The Debian Security Audit Team has discovered that the vdr daemon which is used for video disk recorders for DVB cards can overwrite arbitrary files.
12a94e185f0315de627dd903f9482a3c97a473fe34f836fa4025467494c764bc
Debian Security Advisory 655-1 - zhcon accesses a user-controlled configuration file with elevated privileges. Thus, it is possible to read arbitrary files.
522851362d262be05d4670766589389ed2043f1bfa8c3e992e3f7b9a58503231
Exponent CMS version 0.95 is susceptible to full path disclosure and cross site scripting vulnerabilities.
cba48bf52bb176ac8e8bda738703049a1c0e2915e1885ece04e0b5b76e7fb5a5
Detailed analysis of three different vulnerabilities that reside in AWStats which all allow for remote command execution.
74511a1c2d8b5d0dd45ea1e139574de5434d44c4a7e1207c7f78f2ac9324e365
White paper discussing the new ASH family of hashing algorithms. They are based off of modifications to the existing SHA-2 family and were designed with two main goals in mind: Providing increased collision resistance and increasing mitigation of security risks post-collision.
150fa7a85ac85ec3d91ca4a2ddc89e7acfe8f22d268b5d91541cd64b1165ebcc
Gentoo Linux Security Advisory GLSA 200501-31 - teTeX, pTeX and CSTeX make use of vulnerable Xpdf code which may allow the remote execution of arbitrary code. Furthermore, the xdvizilla script is vulnerable to temporary file handling issues.
ed0dba4c77a665b500b135c1364a2634203b2a6511a369e8f746a7ebccd40c7a