STG Security Advisory: GNUBoard versions 3.39 and below suffer from a PHP injection vulnerability that allows for arbitrary command execution.
0ffcfd1eab87df4c1f629489c1e22156727a7cf5c803d7dab49a4c9692d1dcd7
asp-rider is susceptible to a SQL injection attack.
231289ca7e27a01d5e6fbf56444e6022de5a0e369b8125728c2006b641639b2d
phpGroupWare version 0.9.16.003 is susceptible to full path disclosure, cross site scripting, and SQL injection attacks. Exploitation provided.
b5aca02740fa15bc67a01e2d44fbe0bacfe56f3e5b36c9f677008bce868ea155
OpenText FirstClass version 8.0 httpd /Search remote denial of service exploit that makes use of large requests.
fb4dc5b024b6fe2f010ac07f1f99025b4b11df2220ab3f2b2d7d56fa0968a223
A locally exploitable flaw has been found in the Linux socket layer that allows a local user to hang a vulnerable machine. Kernel version 2.4 up to and including 2.4.28 and 2.6 up to and including 2.6.9 are susceptible. Full exploitation provided.
82a4d30397e375670877101fd568eef691baac3098d148ecc92a14d4113999f3
Multiple bugs both locally and remotely exploitable have been found in the Linux IGMP networking module and the corresponding user API. Full exploit provided. Linux kernels 2.4 up to and include 2.4.28 and 2.6 up to and including 2.6.9 are affected.
abea45d57330bec18503dd9ea76e21f5d34db415e88430327a7b05eab5aecaf0
Remote denial of service proof of concept exploit for the Lithtech game engine that is susceptible to a denial of service attack via a logic error when handling UDP packets with zero bytes.
84082ef4048e59f358da125b717f2393df3ae75cc978055ae6d895d8bc1163f4
Multiple Vulnerabilities have been found in the open source customer relationship management software SugarSales. These vulnerabilities include full path disclosure, file inclusion, remote command execution, and SQL injection attacks. Versions up to 2.0.1c are susceptible.
660b515e225040f3e8eb1e3937e6f49ab123225c3521ba0b2e94fe8eb9e7c085
UBBThreads versions 6.2.3 and 6.5 are susceptible to cross site scripting attacks.
cdcc54a5a1ae1350c549dbc2b782093437adf677e29545fa3bfcf99e18a70c30
ChangePassword, YP/Samba/Squid password-changing tool has a local vulnerability which allows attackers to seize control of the computer. Exploit information included.
148f5a585e39082b31297373a35c22542d1c471e484e395f72d6043026ec5921
phpBB 2.x with PHP here.
e1357fb7fcc9cb647430daf3a8e9edd488f1b44a890b79b618666f5c31d3e77e
Firstclass v7.1 and 8.0 remote denial of service exploit. More information available here.
f7b425e8f395a75653fa4bfece9d026505c3246b9ccb0c33f4cb26295fb87a7d
A flaw in phpBB 2.x allows a malicious user the ability to alter how posts are aligned due to mishandling of quotes in posts.
70f56094bb313dcfcd45d1f37379dbf6cf24d348bfcc8878251a398c4ba3275d
Remote root exploit for Citadel/UX versions 6.27 and below that makes use of a format string vulnerability. Tested against Slackware 10.0.
67940d624ed15be6a8a2ef3aa01c6a2a06b90ceb459471a189933677b5d6e4b8
wget versions 1.8 and below allow for arbitrary overwriting, creating, and appending to files on the underlying system with the permissions of the user executing the binary. The files to be written to can be anywhere regardless of what the end user has requested. The primary flaw is a failure to sanitize redirection data.
1be8cddd71aff948bf1e3a1902aa0ce2fa4a77c5d800966d1b956c4a162900a8
WebLibs 1.0 is susceptible to arbitrary file access due to a lack of input validation for a hidden variable. Exploitation details included.
ee5d12510eaa234114305cd2d559efb5ef1c345f0631a684bbb76be21dcfe7dd
Denial of service exploit for Battlefield 1942 versions 1.6.19 and below and Battlefield Vietnam versions 1.2 and below.
0b896592570cc8b630a314aa69d661629c0c403170b2bc8075e88a3b258450d9
A whole slew of cross site scripting flaws have been discovered and are listed here.
4bb02301bf39b0ef15290570e5a3d6eac0d983938e975028ff517cb527404030
paFileDB 3.1 has a couple vulnerabilities that allow for admin password hash retrieval and full path disclosure.
7941c69e2c5585e3dd631051168d891a80082570eee9864842499d58fad048a2
Adobe Version Cue, which is setuid root on Mac OS X, allows for local compromise due to using an insecure PATH. Exploitation included.
3cb6be383e69be45d1602b5139833f64a9bcd6c1d8c6d04d8f4ad443c2c3663f
Hosting Controller web automation tools suffer from a lack of input validation, allowing any remote attacker the ability to browse the hard drive. Versions 6.1 and below are susceptible.
c0d107347bcf5ec5394845d3530fb7786cbe47b5f0829639f87d951f3a4d4d14
WoolChat IRC client is susceptible to a buffer overflow when a DCC send query is sent with more than 260 bytes.
a6d1f6823641006525e6c0878dfea4547cacc36a01aca5c25c1b55a0cb0a6157
Remote exploit for Kreed versions 1.05 and below that suffer from format string error, denial of service, and server freeze flaws.
2c1ad57a838694f28a0578b571f486e9794175f13eab0b0421ad03831649f766
Blogtorrent, a collection of PHP scripts written to be used in conjunction with bittorrent, fails to properly sanitize input on a variable allowing for directory traversal attacks.
017a5d79b29f33ef76f8e8cedacca83517d4d984176356c304f2dad74ce4e2e2
Universal remote exploit for the buffer overflow vulnerability in Mercury Mail 4.01 (Pegasus) IMAP server. Second version loaded with 14 types of attacks.
710886be64bb7fff70903561833230b2e7ba604b91496598106c7e46d700926f