W32/Spybot-CZ - Another keystroke logger. It terminates security related applications. It spreads via network shares and installs itself as "COMPLIANT.EXE". W32/Rbot-LB - An Rbot variant that acts as a keystroke logger on the infected machine. The virus attempts to delete certain registry entries as well. The infected attachment is named "joke.cpl" or "price.cpl". W32/Bagle-AZ - A Bagle variant that spreads via e-mail and peer-to-peer networks.
This vulnerability may allow a remote unprivileged user to execute arbitrary code on vulnerable systems during SSLv2 connection negotiation." For more, go to: For more, go to:įlaw in Netscape Network Security Services (NSS) libraryĪccording to an advisory from Sun, "A buffer overflow vulnerability exists in the Netscape Network Security Services (NSS) library. For more, go to:Ī flaw in the LukFTP daemon could be exploited to run arbitrary code on the affected machine. For more, go to:Ī flaw in getmail could be exploited by a local user to overwrite any file on the affected system. Gentoo's xine-lib, a library used in building multimedia interfaces, contains a number of vulnerabilities that could be used to execute malicious code on a system. For more, go to:Ī buffer overflow has been found in the glFTPd server that could be exploited by a local user to run any code they want on the affected machine. A flaw in one of the gdk-pixbuf code libraries could be exploited by a remote user to run any code on the affected machine.