ctunnel is a program for tunneling and proxying TCP or UDP connections via a cryptographic tunnel. ctunnel can be used to secure any existing TCP or UDP based protocol, such as HTTP, Telnet, FTP, RSH, MySQL, VNC, DNS, XDMCP, NFS, etc. You can also chain or bounce connections to any number of intermediary hosts.
eca3f2bbab7b2f6b9c42f72351d4fc14b0b67bc6714577349739cb743e4a9d3a
cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up.
9a3d0961666e5c4bc8b29708fd430aad24a7f2fdbc57c013203e8db4bb1bb260
Debian Linux Security Advisory 2054-1 - Several cache-poisoning vulnerabilities have been discovered in BIND. These vulnerabilities are apply only if DNSSEC validation is enabled and trust anchors have been installed, which is not the default.
3f735c4833aeac702aa70117b4ee33364894fa1b8bd7021809591297abc6b061
The Joomla DJ Art Gallery component version 0.9.1 suffers from cross site scripting and remote SQL injection vulnerabilities.
04f25421c3d8574d1937297ab8e50a538cf5ac0bc7d276a21f964a62bfad503d
Gigya Socialize versions 1.1.8 and below for WordPress suffer from cross site scripting vulnerabilities.
512b850d7c94990056a82aa3afcdbc5c294d1afba0c4041504dbea4647728af7
Ceica Groupware 1.5 suffers from a shell upload vulnerability.
7c2449b6938aeeac29ce4504552c5136286ff353d4284b10b676743a0c3629ad
33 bytes small forced unmount of /media/disk Linux/x86 shellcode.
42beef72a7729639551b30bca9f81fd23d0a3e9dc833a28e460538d9fb361582
Ubuntu Security Notice 947-2 - USN-947-1 fixed vulnerabilities in the Linux kernel. Fixes for CVE-2010-0419 caused failures when using KVM in certain situations. This update reverts that fix until a better solution can be found.
21c2ee0fe26dc2ec28a543eaeffce5b4a7c806c118defb8010bd9a9619c49b8c
Secunia Security Advisory - Gentoo has issued an update for asterisk. This fixes multiple vulnerabilities, which can be exploited by malicious people to determine valid user names or cause a DoS (Denial of Service).
778e5d350c1e666e07e6a45e4c2749c6027d3b0b98615a01cdc52052e3466fed
Secunia Security Advisory - Gentoo has issued an update for bugzilla. This fixes multiple vulnerabilities, which can be exploited by malicious users to disclosure sensitive information, bypass certain security restrictions, conduct script insertion attacks, and SQL injection attacks, and by malicious people to disclosure potentially sensitive information, conduct cross-site request forgery attacks, and SQL injection attacks.
a15887d6221d48d3e6b0e1d986db5e99523ac06adb4e6f8d3c2eb4cabff60df6
Secunia Security Advisory - Gentoo has issued an update for sun-jre-bin, sun-jdk, and emul-linux-x86-java. This fixes multiple vulnerabilities, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, disclose potentially sensitive information, cause a DoS (Denial of Service), or compromise a vulnerable system.
0ac7d42ae28e38096856e8aba932f843d0e73d74a7eca38c72b2c4037bbda005
Secunia Security Advisory - A vulnerability has been reported in Weborf, which can be exploited by malicious people to cause a DoS (Denial of Service).
56e4401066ff7afdfeefa30c51aab9013e8ff83ab21a5831607f082221fb79c8
Secunia Security Advisory - A vulnerability has been reported in abcm2ps, which can be exploited by malicious people to potentially compromise a user's system.
909db459d6ee0b26da8e199cd263adb332a97fb784dacb624d711269d7122779
Secunia Security Advisory - Hitachi has acknowledged a vulnerability in Hitachi products, which has unknown impacts.
24465c89a27546acd061189ae0ac5fe5ea344c560985bbed2498b4a6ac96d5db
Secunia Security Advisory - Hitachi has acknowledged a security issue in Hitachi Web Server, which can be exploited by malicious people to bypass certain security restriction.
06c5822046256ce84b48b572416c40e256f9bdfa482f6e1ec796f8a1db5a4be7
Secunia Security Advisory - Ubuntu has issued an update for gnutls12. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
dc8e724794d52a721a24e903d2c2ba856ec50d2230c102ec4f33f669f9565080
Secunia Security Advisory - Some vulnerabilities have been discovered in eFront, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks.
c5c220d293845cf17b07d783c3d3ef09c0c1c50e1b8752a4a923794ba377f36a
Secunia Security Advisory - Hitachi has acknowledged a vulnerability in Hitachi Web Server, which can be exploited by malicious people to cause a DoS (Denial of Service).
2a1f7d886ad0bdd3309772b4277cc6e073c1d52dace7ef99be8fa59b59116f1d
Secunia Security Advisory - Some vulnerabilities have been reported in Reflection, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or gain escalated privileges and by malicious people to conduct spoofing attacks.
ce7289508301bab7dbb72ac3596db730c7a013cdf3400eaa76fbd3ad3596c1b6
Secunia Security Advisory - A vulnerability has been discovered in DDLCMS, which can be exploited by malicious people to disclose sensitive information.
474f77b5ad253158a1b685ca13ff4e18a2d9c5c886883dbc0a6aa5db4d5d4a60
This Metasploit module exploits a buffer overflow in FeedDemon v3.1.0.12. When the application is used to import a specially crafted opml file, a buffer overflow occurs allowing arbitrary code execution. All versions are suspected to be vulnerable. This vulnerability was originally reported against version 2.7 in February of 2009.
8afb9bc6b6e5ed13de0b34861110cee4952239ed2ad8726c5bcc1f02b21ecbf8
This Metasploit module exploits a buffer overflow in Simple Open Music Player version 1.0. When the application is used to import a specially crafted m3u file, a buffer overflow occurs allowing arbitrary code execution.
ff61fd7b9e078099ead07530144e241ebf1475c5b918f46fc1b891e77fc94f8f
Firewall Builder consists of a GUI and set of policy compilers for various firewall platforms. It helps users maintain a database of objects and allows policy editing using simple drag-and-drop operations. The GUI and policy compilers are completely independent, which provides for a consistent abstract model and the same GUI for different firewall platforms. It currently supports iptables, ipfilter, ipfw, OpenBSD pf, Cisco PIX and FWSM, and Cisco routers access lists.
d8bb7867df703b30a5d74728a8497a2fa1b1089184bd6d01e974705e5aad766c
CA's support is alerting customers to a security risks with CA ARCserve Backup. A vulnerability exists that can potentially allow a local attacker to gain sensitive information.
06ddd0ac2e0c6812405ad8e4e65836ebf983a0a9512ec15cb15638b106952ee3
Adobe InDesign CS3 INDD file handling local buffer overflow exploit.
33e26d4869c1e6655da1a8bfba18558f124fb581040587524826881bdb3fd22c