Secunia Security Advisory - Slackware has issued an update for ghostscript. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.
1047c1b27f00a90bd4fbc129203aef1d533f59022ab47a5880af91fa01403ed4
Secunia Security Advisory - Gentoo has issued an update for audacity. This fixes a security issue, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or to delete arbitrary files and directories.
bada96bad5046046ce2ecf5ca1131282435bdd4dfa79c3b16306a99530f44b29
Proof of concept exploit for Borland StarTeam server 2008 versions 10.0.0.57 and below which suffer from multiple integer overflow vulnerabilities.
bbfb6eed55101f385b2bfb7d87db1d679bec195c9c7405394d97a29755a6f19c
Borland StarTeam server 2008 versions 10.0.0.57 and below suffer from multiple integer overflow vulnerabilities.
2dcd36a101b0c51293b21062317aac38d5e8febea82f757dc6ffa5ba41d35673
Proof of concept exploit for Borland VisiBroker Smart Agent versions 08.00.00.C1.03 and below which suffer from a heap overflow vulnerability.
3cbf0a1cb22b120464d15e2fbb552faa46ce83b5a3d6cf37e456f9c0e7247dac
Borland VisiBroker Smart Agent versions 08.00.00.C1.03 and below suffer from a heap overflow vulnerability.
eaa8cfd6dea2e6d563d07003ca0a81015be547bd9c95a51d12516cb10949afe4
Secunia Security Advisory - Gentoo has issued an update for acroread. This fixes a security issue and some vulnerabilities, some of which have unknown impacts while others can be exploited by malicious people to disclose system and sensitive information, cause a DoS (Denial of Service), or compromise a user's system.
fc46f2f623c2f95038e326ff8118cf9ecc5f9b1d8a207484dba5802873ae2e80
Secunia Security Advisory - Some vulnerabilities have been reported in pfSense, which can be exploited by malicious people to conduct cross-site scripting attacks.
988a5b64f7120c9545be620a732479a38791c68bba33ae9543ba25d501a0f8d7
Secunia Security Advisory - Fedora has issued an update for viewvc. This fixes some security issues, which can be exploited by malicious people to bypass certain security restrictions.
abdfd6add664ddfe2e5c5079b80b80ca3686aa06d9c2fc08656b667f6433f958
VMware Security Advisory - An updated service console package for e2fsprogs has been released for ESX Server versions 2.5.5 and 2.5.4.
f93228329d722fd07502d80cfef49213e5058226a673deb79b8e6fe003e8223f
TorrentTrader Classic version 1.08 suffers from cross site scripting and cross site request forgery vulnerabilities.
b3da5c9e4f961ebc206e4980fc7cbcfd036ae4397c52cb3e760ef9109be214ed
Mandriva Linux Security Advisory - A few vulnerabilities were found in Wireshark, that could cause it to crash or consume excessive memory under certain conditions.
3869d83c5723ddb37c4a65939efd55b3226603db24299b0da00f299341634439
Debian Security Advisory 1511-1 - libicu in International Components for Unicode (ICU) 3.8.1 and earlier attempts to process backreferences to the nonexistent capture group zero (aka \0), which might allow context-dependent attackers to read from, or write to, out-of-bounds memory locations, related to corruption of REStackFrames. A heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecified other impact via a regular expression that writes a large amount of data to the backtracking stack.
140c09e90595d14615d4bf880f781588fb7701045a1ed81c3c493c98a2ec1c87
Airscanner Mobile Security Advisory #07122001 - Eye-Fi version 1.1.2 suffers from multiple cross site request forgery vulnerabilities.
6ce0d0ce4d2761cc1997ad13dca2b30312f9ec3925eabb0587ec6daf7e621632
The PacketTrap PT360 Tool Suite version 1.1.33.1.0 TFTP server component is vulnerable to a denial of service condition.
d2e56917ba1810a7a69f1a58af6fb8af79bcb7a544ac4ac0226b8e788ca8ca29
The PacketTrap PT360 Tool Suite version 1.1.33.1.0 TFTP server component is vulnerable to directory traversal attacks.
9784b15c2a34239cf77a37a2ea265296247b844d9fbdd4ae389c182bd7caedb1
Flyspray version 0.9.9.4 suffers from multiple cross site scripting vulnerabilities.
962300b509833e0b24bb1da3e5e35aabc7e76971531b9b6451a9e91f6f6d8ded
Gentoo Linux Security Advisory GLSA 200803-07 - Dwayne C. Litzenberger reported that the file common.py does not properly use RandomPool when using threads or forked processes. Versions less than 1.7.2 are affected.
5dc5fd0e466c8f00e5479518c136886dd3d7c2377da861e2fd8217a742593116
RECON 2008 Call For Papers - RECON is a security conference taking place in downtown Montreal from June 13th to 15th, 2008. The call for papers will end on April 30th, 2008.
21b96a07c5527c2953b723ef66684eb235bdc9a58d8857ebf234f43a6f0c3ed1
Secunia Security Advisory - dB has reported a security issue in netOffice Dwins, which can be exploited by malicious people to bypass certain security restrictions.
9b127f334e977ccdc39dbe3dae8a8b5b5fb8e3a8eb250e9be9e9b1a7cfaa7f4d
Secunia Security Advisory - A vulnerability and a weakness have been reported in Flyspray, which can be exploited by malicious people to conduct cross-site scripting attacks or identify valid user accounts.
7b414fef73908127a5364700d3d3d28ca185e7f25d192475fd1c52c5268b2cc7
Secunia Security Advisory - A vulnerability has been reported in Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
7785eae99bc3080173eba9f4fd34b9fea0554c4ec619cf6eebdcc07778902b54
Gentoo Linux Security Advisory GLSA 200803-06 - Dan Dennison reported that the diatheke.pl script used in SWORD does not properly sanitize shell meta-characters in the range parameter before processing it. Versions less than 1.5.8-r2 are affected.
c8bc2b7e6619ade75968c68eb7676dcec993436979f74be22a3a2823efe67858
Gentoo Linux Security Advisory GLSA 200803-05 - Mike Ashton reported that SplitVT does not drop group privileges before executing the xprop utility. Versions less than 1.6.6-r1 are affected.
d61793bfc1c08419410d775bbe795a39278259b310241083127b6f6a2ccabd2e
Gentoo Linux Security Advisory GLSA 200803-04 - seiji reported that the filename for the uploaded file in bug_report.php is not properly sanitized before being stored. Versions less than 1.0.8-r1 are affected.
fc1f88306dd5d7317b57f028ab37f465bab899a7e7b199d046b769173404ae02