[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196303 Download | Alert*

An light eye-candy fully themable animated dock for any Linux desktop. It has a family-likeness with OSX dock, but with more options.

gnome-web-photo contains a thumbnailer that will be used by GNOME applications, including the file manager, to generate screenshots of web pages.

Mike Wiacek discovered that a buffer overflow in the ARC2 implementation of Python Crypto, a collection of cryptographic algorithms and protocols for Python allows denial of service and potentially the execution of arbitrary code. For the stable distribution , this problem has been fixed in version 2.0.1+dfsg1-2.3+lenny0. Due to a technical limitation in the Debian archive management scripts the u ...

Mike Wiacek discovered that the ARC2 implementation in Python Crypto did not correctly check the key length. If a user or automated system were tricked into processing a malicious ARC2 stream, a remote attacker could execute arbitrary code or crash the application using Python Crypto, leading to a denial of service.

PAM is a system security tool that allows system administrators to set authentication policy without having to recompile programs that handle authentication.

The Compiz Fusion Project brings 3D desktop visual effects that improve usability of the X Window System and provide increased productivity though plugins and themes contributed by the community giving a rich desktop experience

Multiple insecure temporary file handling vulnerabilities were discovered in Red Hat Cluster. A local attacker could exploit these to overwrite arbitrary local files via symlinks. It was discovered that CMAN did not properly handle malformed configuration files. An attacker could cause a denial of service in a node if the attacker were able to modify the cluster configuration for the node

The Cluster Manager utility provides services for managing a Linux cluster. Multiple insecure temporary file use flaws were found in fence_apc_snmp and ccs_tool. A local attacker could use these flaws to overwrite an arbitrary file writable by a victim running those utilities with the output of the utilities via a symbolic link attack. Bug fixes: * a buffer could overflow if cluster.conf had mo ...

The gfs2-utils package provides the user-space tools necessary to mount, create, maintain, and test GFS2 file systems. Multiple insecure temporary file use flaws were discovered in GFS2 user level utilities. A local attacker could use these flaws to overwrite an arbitrary file writable by a victim running those utilities with the output of the utilities via a symbolic link attack. This update al ...

Ghostscript is a set of software that provides a PostScript interpreter, a set of C procedures and an interpreter for Portable Document Format files. Multiple integer overflow flaws which could lead to heap-based buffer overflows, as well as multiple insufficient input validation flaws, were found in Ghostscript"s International Color Consortium Format library . Using specially-crafted ICC profil ...


Pages:      Start    10497    10498    10499    10500    10501    10502    10503    10504    10505    10506    10507    10508    10509    10510    ..   19630

© SecPod Technologies