iDEFENSE Security Advisory 11.19.02c - Users of Netscape Communicator 4.x's web browser and e-mail client who can be tricked into clicking on a malicious link can return the contents of the targeted user's preferences file often including e-mail password and URL history back to a remote attacker who redefines user_pref(), a javascript function.
5eab9de58ab811abe7daf58eecc2038d3161def28aef9bc2de99db7a39f21201
iDEFENSE Security Advisory 11.19.02b - Remote exploitation of a weakness in Eudora v5.2 and below allows for the retrieval of sensitive information from a targeted Eudora users computer. Attackers send an e-mail to a Eudora user that directs him to a specific URL; the e-mail also contains an HTML-enabled e-mail attachment that contains scripting code.
a91227d3aa4332c09c7f7f785482cf0c2393f3cf12a5c52febfc27081a5d2192
iDEFENSE Security Advisory 11.19.02a - Linksys Cable/DSL Routers models BEFW11S4, BEFSR11, BEFSR41 and BEFSRU31 can be crashed when several thousand characters are passed in the password field of the device's web management interface. Exploitation simply requires the use of a web browser that can send long Basic Authentication fields to the affected router's interface. Fix available here.
8ca79486cce08dd1cfef970e3b491e8d112d4db4386af4c62871697a20d14813
Outlook Express version 5.50 and 6.0 contains a security vulnerability in the handling of S/MIME certificates which allows arbitrary code execution when inspecting a S/MIME signed message.
bc9a16df800c23057348b4928f436978cd5a07b073ace82b10988bb236ad0dc1
The iPlanet WebServer v4.x up to SP11 contains vulnerabilities which allow remote root command execution by using a cross site scripting vulnerability to redirect the Administrator's browser to a URL in a vulnerable perl script that will cause the open() command injection.
e6d57374873ddcf0334a40142fc81f76dc5c0eaf48548811bef588fe324a0d20
Lag Security Advisory - Com21 cable modem configuration file feeding vulnerability. All Com21 DOXport 1110 cable modems with software version 2.1.1.106 are vulnerable to being fed a configuration file that will allow a user to have access to features that are not paid for by spoofing an ISP-side TFTP server to feed the data.
21174a7ece399423e3136d1c78ecc11cf864756b62fe48d179e2436176fa3641
iDEFENSE Security Advisory 11.01.02 - Abuse is a popular side-scrolling video game that has a locally exploitable parsing error in the -net command line option allowing an attackers to gain root privileges.
b221fec3e71a23d7a3b9bd708f91010df4c7db23390ea1a2908cf7f76dfeb888
Netscreen VPN solutions ship with an SSH daemon that is vulnerable to the SSH1 CRC32 bug. In the default configuration, SSH is not enabled on their devices and when enabled, it is expected that any CRC32 exploits used to attack said device will cause a crash and require a reboot. Original bug discovered by Michal Zalewski.
c9b6c7dfaef3625ad4d061880ee7f533627566f9c4dd4145fd54b9341ca31096