Core Security Technologies - Corelabs Advisory CORE-2006-0327: IAXclient is an open source library that implements the IAX2 VoIP protocol used by the Asterisk IP PBX and several VoIP software phones. Two vulnerabilities have been found in the library that may grant attackers remote execution of arbitrary code on systems using software packages that rely on it to implement the IAX2 protocol support.
7ba3b346dc7517aff33efbe4dd099cc6f8cbc6b2d7ccdf6c04785dfa56992eef
Zdaemon version 1.08.01 and below suffer from buffer overflow and invalid memory access flaws.
ca42c2a01e93ec55e3731709577ac5c0c58ca737ac50d934522fa9a0afbf1a5f
There is a heap based buffer overflow in the rendering engine of .hlp files in winhlp32.exe which will allow some attacker the possibility of modifying the internal structure of the process with a means to execute arbitrary and malicious code.
c4259db39f4aff91e94ff092f7458b43487c81c6812534536180b76496dff498
Mon Album version 0.8.7 is susceptible to SQL injection attacks.
fe5e18716a851acd0cc695631dbe5d0dc32318b01f999c2a83e44eeba27933e1
HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running /sbin/passwd which could be locally exploited to create a Denial of Service (DoS).
7c17b6cc01ae0a20082aabb86030b27f7e1394d1c5f1e4ffa2118d14fcbd8573
Samba versions 3.0.21 through 3.0.21c expose passwords in clear text in debug logs.
9c66ac379d91a26c3d07b4b4b4b901a1c696d52cb2e7dcbea7bea13a3a3d89b4
Mandriva Linux Security Advisory - Scrubber.py, in Mailman 2.1.5 and earlier, when using email 2.5 (part of Python), is susceptible to a DoS (mailman service stops delivering for the list in question) if it encounters a badly formed mime multipart message with only one part and that part has two blank lines between the first boundary and the end boundary.
131e517125070d0b20804c718b15fce3c70f0f2894aaf5487a22def7cb089f4a
The XFOCUS team has discovered multiple integer overflows in MPlayer version 1.0.20060329 and below.
63e762c39c00d599fa0d7e78eb9ca9d54e84981185e128bb6f6230abf893bf4d
Debian Security Advisory DSA 1021-1 - Max Vozeler from the Debian Audit Project discovered that pstopnm, a converter from Postscript to the PBM, PGM and PNM formats, launches Ghostscript in an insecure manner, which might lead to the execution of arbitrary shell commands, when converting specially crafted Postscript files.
c805afd688bd7387640c3694a50b68d7630757d17cd7512253e04e23bcfd57c8
Secunia Research has discovered a vulnerability in Blazix, which can be exploited by malicious people to disclose potentially sensitive information. The vulnerability is caused due to a validation error of the filename extension supplied by the user in the URL. This can be exploited to retrieve the source code of JSP files from the server via specially crafted requests containing dot, space, and slash characters. Version 1.2.5 is affected.
3604e084018ebac5c828858ccaf9a13fdb6c16dd20d3d34b1392abab5ccb8b31
ZDI-06-006: A buffer overflow exists in the Symantec VERITAS NetBackup Database Manager. Version 6.0 is affected.
3ee80a9ae01e2332c684f620224e12f3b480e4050910a21ee5244747047484ba
ZDI-06-005: A buffer overflow exists in the Symantec VERITAS Volume Manager. Version 6.0 is affected.
8045b164de5ac478c3478881b5766a46f7f5e995c71a48f91d4b1b1c3423b0dc
The vnetd from Symantec VERITAS NetBackup is susceptible to a buffer overflow vulnerability.
ef4439486547f9aa6fb960c33becf5f8298bf4fe6c434df61972569b93ac47f1
Movilnet's Web SMS Captcha implementation is weak and it is possible to recognize its patterns 100% of the time.
6efa607accbecb5b0c7fb26469c490a0223aff141c4b3fff76e00a9740d8632f
phpAdsNew and phpPgAds versions 2.0.7 and below suffer from multiple html injection and cross site scripting flaws.
a793dcd9aecab47b9733118eb9d5787b238bd31ae7895adab51cebd13368c481
AkoComment version 2.0, a well known add-on for Mambo and Joomla CMS systems, is susceptible to SQL injection attacks.
bf01ec751a48a024bb4dcaca4218246f7eb86d675ee49c62c47b88bc6f691cb8
Raindance Web Conference Pro suffers from a cross site scripting flaw in its browser compatibility checking code.
833178f68b0b4fd8a568af43eae92e51e16b373c623642b7f2d52839b3cf3d91
Secunia Research has discovered a vulnerability in Quick 'n Easy/Baby Web Server, which can be exploited by malicious people to disclose potentially sensitive information.
a4646bf09910c4c5191f80718f1eda87923398b1f7af7ff7fd3ef391e20c87d6
HP Security Bulletin - A potential security vulnerability has been identified in HP-UX running swagentd. The vulnerability could be exploited remotely by an unauthenticated user to cause swagentd to abort resulting in a Denial of Service (DoS).
8aa4bb0ea65e9b510124329f1a26548a6ecad919053b932d5696fe03840d0ee2
By naming a file without a name, the Windows XP firewall may inadvertently trick a user into allowing a malicious application to run.
cad8f6954428ca2eddfad293271e4550156b0d16a95b58c6520d7938abb972b8
PasswordSafe 3.0 has a weak random number generator.
954e83279ee35055656c5f3c8533f0e6ef3820b4533a07b2d5c91e78d3510be2
KisMAC versions below 73p and development versions below 113 suffer from a stack overflow when handling specially crafted 802.11 management frames.
a6f4fdecd7231d6ebfdad685575d72676300a2933903cc1aa6d21407c8be0a02
Gentoo Linux Security Advisory GLSA 200603-25 - OpenOffice.org includes libcurl code. This libcurl code is vulnerable to a heap overflow when it tries to parse a URL that exceeds a 256-byte limit (GLSA 200512-09). Versions less than 2.0.2 are affected.
91ec66d028f97ec1dbc9c37bb6db384b20311bf5c53dc1ae56fe4771115b3813
Gentoo Linux Security Advisory GLSA 200603-24 - RealPlayer is vulnerable to a buffer overflow when processing malicious SWF files. Versions less than 10.0.7 are affected.
f1ecd0235d6ab8df272076739a383d0e2edf0a65355aedd9a8d4a332060a7cee
Gentoo Linux Security Advisory GLSA 200603-23 - NetHack, Slash'EM and Falcon's Eye have been found to be incompatible with the system used for managing games on Gentoo Linux. As a result, they cannot be played securely on systems with multiple users. Versions less than or equal to 3.4.3-r1 are affected.
7310e9b67babcdb8a5457ee2240fc46c6306bea7f13f8fefd19f9e156a25fc93