Secunia Security Advisory - Maksymilian Arciemowicz has reported a vulnerability in phpPgAds and phpAdsNew, which can be exploited by malicious people to conduct cross-site scripting attacks.
62a92ec29c7197c4c65281a159f60e6df523a4c4b526e95d78523ced2b3f56cd
Secunia Security Advisory - A vulnerability has been reported in IPsec-Tools, which can be exploited by malicious people to cause a DoS (Denial of Service).
cdf608c9e18c81ae0ab24495041388bdb5c1891113cd38669b5c50e61b054779
Gentoo Linux Security Advisory GLSA 200503-18 - Qiao Zhang has discovered a buffer overflow vulnerability in the 'parse_emelody' function in 'parse_emelody.c'. Versions less than 2.23 are affected.
79c2f83ef4a1f49a3531bcee13d04eef609d682792a3f6f9579d1d7379a28e09
Flaws in ZPanel versions 2.0 and 2.5b10 allow for remote file inclusion and SQL injection attacks.
9baeafefe182bb444ac7cc84cdac4d719fd8032824de04cb3b76373092c86081
Freeciv Server versions 2.0.0beta8 and below remote denial of service exploit.
04d0aeed31b4422e14a403a60f6530a3c0dea1a0687b0b8551759c2207cbc67c
This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.
5adb9b2c2002650e15216bf94ed9db9541d9a17c96fcd876784861a8890bc92b
Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.
46b3c43698a8fd3171e26348ce3dcb97090e19e73b8424d1a0fc1dbf6c1f753b
StealthZapper is a less-detectable log wiper. It attempts to leave wtmp and utmp "cleaner" looking by not simply leaving a blank hole where the offending data was deleted from.
f3d7e1042e229cb498c99ceabd0bac51852f6a4ee54849824e61451b58de9964
Local exploit for linux 2.6.11 and below. Kernel memory can be overwritten because of an integer overflow in sys_epoll_wait, and "misuse of __put_user in ep_send events".
fc9331fe6b0eebcc26317aaac23265807b069e0b82669096d868b41bb4e299df