Core Security Technologies Advisory - Secure Internet Life Conferencing (SILC) server versions 1.1.1 and below and client versions 1.1.3 and below suffer from a pkcs_decode related buffer overflow vulnerability.
13d7d0d17addaf321c63a9614a85b341247fb82af78b25ce1baeaf99a82b0164
CORE Security Advisory CORE-20011001 - Another globbing problem has been discovered in Wu-FTPD, allowing a remote user to execute arbitrary code. Affected versions include: all Wu-FTPD versions through 2.6.1, Wu-FTPD 2.7.0 snapshots, and FTP server programs derived from Wu-FTPD.
b2af010437f4826bb1eed002d7911ab9a56a1c96980ee85e3944582ce2cdbcf9
Core-SDI Advisory CORE-20001116 - A memory contents disclosure vulnerability was found on RealNetworks RealServer which will give out information about the server configuration, runtime memory data and tokens and authentication credentials. This information allows an external attacker to possibly obtain administrative access to the server or to data belonging to other user sessions. Fix available here.
c2d5b9a6f8bb847c26085737a31823a5af9c5e39178425d25ff41f683ab6f4fe
CORE SDI Security Advisory - SCO Unixware 7 default installation includes scohelp, an http server that listens on port 457/tcp and allows access to manual pages and other documentation files. The search CGI script provided for that purpose has a vulnerability that could allow any remote attacker to execute arbitrary code on the vulnerable machine with privileges of user "nobody".
f680f55bfc32747ee179bacde9f8d0a084560d975d1acee0c089638742207f41
Core SDI Vulnerability Report For BEA Weblogic's Proxy - BEA's Weblogic server contains several buffer overflow which allow a remote attacker to execute arbitrary code on the system running the proxying web server as root on unix and as system on NT.
adc8dd33a9472b5d880597828e25334cbf516288499f6f81d3fb6a22f2279f5d
CORE SDI Security Advisory - NAI Net Tools PKI Server vulnerabilities. While investigating the exploitability of a buffer overflow in the Net Tools PKI Server from Network Associates Inc. we discovered three new vulnerabilities not fixed by hotfix 1, including buffer overflows and format bugs which allow remote attackers to execute arbitrary code. Perl proof of concept exploit included.
851d469fd06907ffafd8c19e1da95cdb05443f7df3e7b6b1b7fd894c41df184f