wicd Privilege Escalation 0Day
Tested against Backtrack 5, 5 R2, Arch distributions
Spawns a root shell. Has not been tested for potential remote exploitation
vectors.
Discovered by a student that wishes to remain anonymous in the course CTF.
This 0day exploit for Backtrack 5 R2 was discovered
Thanks for the feedback! All of SysAid's web vulnerabilities are fixed. SysAid
has already come out with a new release 8.5.08 that addresses all of these
security issuesmaking SysAid 8.5.08 highly secure. We are sorry for the
inconvenience, and encourage all our users to upgrade to the most re
Advisory ID: HTB23082
Product: All-in-One Event Calendar Plugin for WordPress
Vendor: The Seed Studio
Vulnerable Version(s): 1.4 and probably prior
Tested Version: 1.4
Vendor Notification: 21 March 2012
Public Disclosure: 11 April 2012
Vulnerability Type: Cross-Site Scripting (XSS)
CVE Reference(
Vulnerability Description
We found that any android application can read all world-readable files in
the "/proc" directory without specifying any permissions in their manifest
files. This can leak sensitive information. For example, if th
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:055
http://www.mandriva.com/security/
_
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03249176
Version: 1
HPSBPV02754 SSRT100803 rev.1 - HP ProCurve 5400 zl Switch, Compact flash card
virus
NOTICE: The information in this Security Bulletin should be acted upon as soon
as possi