JShop has a flaw in page.php that allows for cross site scripting attacks.
09ce1578e5d1e6cf20228662db59cd5e311a262c1bd1c3a532a675641ae5b29f
eGroupWare version 1.0.0.003 is susceptible to a cross site scripting flaw.
2857363dac9c43f2774402925a849c4b3610100a22158155e0488e996121c3ff
imwheel version 1.0.0pre11 uses a predictably named PID file for management of multiple imwheel processes. A race condition exists when the -k command-line option is used to kill existing imwheel processes. This race condition may be used by a local user to Denial of Service another user using imwheel, lead to resource exhaustion of the host system, or append data to arbitrary files.
f6ab085f417793a02d07c3de39249974381b31d162ecd131d00e5b53e4085e33
Sympa versions 4.1.x and below are susceptible to cross site scripting attacks.
dca5ea288d664feb25de06ceaa5845417be3a151f5960a1b08d989b0f6436781
Mantis suffers from a remote PHP code execution vulnerability when the REGISTER_GLOBAL variable is set.
a70413a0d6384063116146614076f527699b5ef8da05f1e7d3c3af253afadf40
Mantis is susceptible to multiple cross site scripting vulnerabilities.
a6f58dd97966c39ee1d173207fb0d4d25219702ee1bad263cc675e5318ce6bef
Nihuo Web Log Analyzer version 1.6 is susceptible to a cross site scripting attack.
c263e36a8fee317f2235aa8dd8ff0783574b8734019449d3d921a4e478f2dbae
The sarad program used at the British National Corpus is susceptible to multiple buffer overflows. No authentication is required to perform the attack and they are network based.
3b5dbe5c14fa19bf31747e7ab1ad0dfe738810272c2dbce61216a3114a9177e7
Secunia Security Advisory - Lukasz Wojtow has reported a vulnerability in MySQL, potentially allowing malicious people to compromise a vulnerable system. The problem is that the mysql_real_connect() function does not properly verify the length of IP addresses returned by a reverse DNS lookup of a hostname. This could potentially be exploited to cause a buffer overflow and execute arbitrary code.
76cd75c8de4325b740e31c9fed621c75bd46469dea33b514242004d83f456dda
It has been discovered that Zone Alarm stores its configuration files in a directory that is forcibly left accessible to EVERYONE under Windows.
5267c7003017156a72b6a7fc6baedb7920bb27746633c9b9bb21b8e935e526f2
iDEFENSE Security Advisory 08.18.04 - Remote exploitation of a format string vulnerability in Double Precision Inc.'s, Courier-IMAP daemon allows attackers to execute arbitrary code. The vulnerability specifically exists within the auth_debug() function defined in authlib/debug.c. Versions below 3.0.7 are affected.
3d3fdc3d44a017fba3df0c79a897dd07e115362f913118d14c5efc3edda387ee
phpmywebhosting 0.3.4 has a SQL injection vulnerability where an attacker can be authenticated as an admin by just using [usr= admin"-(] and [pass="asdf].
67cc62c3244f69dcb87dc12efe4c2bf6440d68205346aeb7abb433a015e46d7d
qt version 3.3.2 has a heap overflow in its BMP parser.
a87464ce36d5b5cca9bf4c0ce0467eb6dfb66ef37ec4771fa65754ecf1be3997
PHP-Fusion version 4.00 has a full path disclosure vulnerability and a flaw that allows an attacker to download the database backup file that can be used to gain administrative access.
fd86bda119a57bd26be037bf969a91bac23833996dd042ce8a6c44eff41ef812
Cisco Security Advisory: A device running Internetwork Operating System (IOS) and enabled for the Open Shortest Path First (OSPF) protocol is vulnerable to a Denial of Service (DoS) attack from a malformed OSPF packet. The OSPF protocol is not enabled by default. The vulnerability is only present in Cisco IOS release trains based on 12.0S, 12.2, and 12.3. Releases based on 12.0, 12.1 mainlines, and all Cisco IOS images prior to 12.0 are not affected.
568979e1c71157314ffb20b9d5fa0db45d174f2a149e7a9a9c148d2a611e8530
NetBSD Security Advisory 2004-009 - A set of flaws in the ftpd source code can be used together to achieve root access within an ftp session. With root file manipulation ability, mechanisms to gain a shell are numerous, so this issue should be considered a remote root situation.
19988f37ee9bac237bfdb409657a8f72e0dc9b3791fb9c48b914cfac30ce0bdd
Debian Security Advisory DSA 540-1 - A The mysqlhotcopy script in mysql 4.0.20 and earlier, when using the scp method from the mysql-server package, allows local users to overwrite arbitrary files via a symlink attack on temporary files.
4a26956ef58acb72359831f331a9afbf8b463266470faa893647557c3c3722d6
Gentoo Linux Security Advisory GLSA 200408-18 - xine-lib contains a bug where it is possible to overflow the vcd:// input source identifier management buffer through carefully crafted playlists. Versions 1_rc5-r2 and below are affected.
f3e2d4f842afd2f19f3f102effaa01516c7ee2b3965a03ca27c52d6cf6af38ad
Gentoo Linux Security Advisory GLSA 200408-16 - glibc contains an information leak vulnerability allowing the debugging of SUID binaries. Versions 2.3.2 and below are affected.
6d3a5de31a54a4551b867471c5569c8bb8f3f2783a41ac572e82eca0028bf877
GreyMagic Security Advisory GM#009-OP - Opera versions 7.53 and below on Windows, Linux and Macintosh have a flaw that allows an attacker the ability to figure out whether or not a file or directory exists.
c1016c549082c639a7eb373daec02795b9f4f03545ad69076289d49c20930b4e
Secunia Security Advisory - Christoph Jeschke has reported a vulnerability in PForum, allowing malicious users to conduct script insertion attacks. Input passed to the IRC Server and AIM ID fields is not sanitised before being stored in the user profile. This can be exploited to execute arbitrary script code in a user's browser session in context of an affected website when a malicious profile is viewed. The vulnerability has been reported in versions prior to 1.26.
fd6e0e12c53992fcba1cd35801d8925ccfa22288fadc046780bbd1b9fd138dc0
Pads version 1.1 is susceptible to a stack overflow. This tool is not setuid by default so the risk is minimal. Version 1.1.1 fixes this.
8eb01b9fa435907293c656e16bd644ed33b266d2e35011469b5609b3d83acfab
CACTI version 0.8.5a suffers from full path disclosure and SQL injection vulnerabilities that allow for complete authentication bypass.
11017bef293374204c51adc94d8aff90fedb0d6463b136ea5f0d21379b42ac8b
Next Generation Advisory NGSEC-2004-6 - The IPD, or Integrity Protection Driver, from Pedestal Software suffers from an unvalidated pointer referencing in some of its kernel hooks. Any local and unauthorized user can crash the system with some simple coding skills. Versions up to 1.4 are affected.
50720f87318f3a42e9784937201bd48fcc7fed7624a51ca79ec89c25f61005c5
iDEFENSE Security Advisory 08.16.04: Remote exploitation of an information disclosure vulnerability in Concurrent Versions Systems (CVS) allows attackers to glean information. The vulnerability exists within an undocumented switch to the history command implemented in src/history.c. The -X command specifies the name of the history file allowing an attacker to determine whether arbitrary system files and directories exist and whether or not the CVS process has access to them. This issue was patched in the latest (June 9th) releases of CVS, specifically 1.11.17 and 1.12.9.
f268381547d56c35860bc93b1ae5cbc7dede9a48d3f4a6f4aca9198b5b120a68