SCO Security Advisory SCOSA-2008.2 - sshd in OpenSSH versions before 4.4, when using the version 1 SSH protocol, could allow a remote attacker to cause a denial of service. It certainly is nice to have SCO bring this to light for their consumers two years after the fact.
7b85b6b25922a9638680df7e8c6550ec8639cf624979b1d840ed176611234312
SCO Security Advisory SCOSA-2006.26 - The Mozilla 1.7.13 browser contains fixes for several security issues resolved by Mozilla.org developers since the release of Mozilla 1.7.12.
154f483444b29ecca0b3e4e03c1afe41f32d52edbfcf9a0a4f54f9d029a582f3
SCO Security Advisory SCOSA-2006.24 - Sendmail could allow a remote attacker to execute arbitrary code as root, caused by a signal race vulnerability.
14c7c5f6be311b1f1a1ef703c8b555ed330c3caf171aead875300fd4a9ef3395
SCO Security Advisory SCOSA-2006.23 - UnixWare 7.1.4 : GhostScript Insecure Temporary File Creation Vulnerability.
186509323f9b90527c1c74b30aaadd04b978ad623d7a6e08f6aa49aaf54833c9
SCO Security Advisory SCOSA-2006.22: Multiple X Window System server applications share code that may contain a flaw in the memory allocation for large pixmaps. The affected products include X server applications.
4a82a3fee6c3a4a73dc75547647bd84887f366ce6e2a0df657063dbb69784554
SCO Security Advisory SCOSA-2006.21 - Some vulnerabilities have been reported in CUPS, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system.
33ca8ba70b4d50b49744483b82ed5ddc58a29321f5afd1ac2fe7b19d84a4cbeb
SCO Security Advisory SCOSA-2006.20 - Some vulnerabilities have been reported in CUPS, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system.
a784883db9c7e5315a947a7fb23fc031df6572ebe92104e84989fb0b30f8950a
SCO Security Advisory SCOSA-2006.19: Ghostscript is affected by an insecure temporary file creation vulnerability. This issue is likely due to a design error that causes the application to fail to verify the existence of a file before writing to it.
7df7887ae2daf98ae0f7e2d63e1abf4cd7ee467895f87478e9d548c28a65c231
SCO Security Advisory SCOSA-2006.18: UnixWare 7.1.4 : MySQL User-Defined Function Buffer Overflow Vulnerability
68b84e973c6ea54e1edf3013222775891a8039d9d67b376f4b6715d34d4588cb
SCO Security Advisory - OpenServer 5.0.7 OpenServer 6.0.0 : Xpdf Multiple Buffer Overflow Vulnerabilities
e79161e876cc979daf84a164e2f966eef7dd9ab9f6c85c51935d9681777255c5
SCO Security Advisory - SCOSA-2006.14 - Multiple X Window System server applications share code that may contain a flaw in the memory allocation for large pixmaps. The affected products include the X.Org X server applications.
48a4a938dcd936474a5b0b2e47c15d935c2921f4a1da2aecfed9eb732aad2714
SCO Security Advisory - SCOSA-2006.13 - Vim is susceptible to an arbitrary command execution vulnerability with ModeLines. This issue is due to insufficient sanitization of user-supplied input.
045df8e15e8974f0ee7a35d6f5a30b98ba9803981c87de92add7de742b49f595
SCO Security Advisory - OpenServer 5.0.6 OpenServer 5.0.7 : OpenSSH Multiple Vulnerabilities: A vulnerability has been reported in the OpenSSH scp utilities. This issue may permit a malicious scp server to corrupt files on a client system when files are copied.
058aa07bb6432ba4bcf1b9be324153ec0020060332d2fe3e2985872f20bb2bec
SCO Security Advisory - OpenServer 6.0.0 : OpenSSH Multiple Vulnerabilities: Two security issues have been reported in OpenSSH, which can be exploited by malicious users to gain escalated privileges or bypass certain security restrictions.
837090b5029fe521ddda692f8741add4aed4195788bac5f25e483bc9723c4cb5
SCO Security Advisory - OpenServer 5.0.6 OpenServer 5.0.7 OpenServer 6.0.0 : Multiple System Libraries Vulnerabilities.
3799edee6ac32c542aede100f28a5107cb7f3c2ef49e8f8d016a6fb4ec946993
SCO Security Advisory - OpenServer 5.0.6 OpenServer 5.0.7 OpenServer 6.0.0 : LibXpm Integer Overflow Vulnerability
594b55a18007cbcee6575dbc7bfc784f8bcafcf6003cf28068e1de312d17381e
SCO Security Advisory - OpenServer 5.0.6 and OpenServer 5.0.7 : TCP Remote ICMP Denial Of Service Vulnerabilities
ecd292fca0e6a99001c77855d5bf7270a6676e1afad1778fb8e5fe1c0a4b256e
SCO Security Advisory - A vulnerability has been found in OpenSSL which potentially affects applications that use the SSL/TLS server implementation provided by OpenSSL.
bdc10ddc12e02eb7b618303927e2aede4194e4f2011bac78505358a0fc1988aa
SCO Security Advisory - Ulf Harnhammar has reported a vulnerability in Lynx, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the HTrjis() function in the handling of article headers sent from NNTP (Network News Transfer Protocol) servers. This can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into visiting a malicious web site which redirects to a malicious NNTP server via the nntp: URI handler. Successful exploitation allows execution of arbitrary code.
3a4f408a9e7a6a4943c8178a7eda2a2ee13c50995972d5fa0fc6e533172fbd78
SCO Security Advisory - Cross-site scripting vulnerability in docview (htdig) under OpenServer 5.0.7 and OpenServer 6.0.0 allows remote attackers to execute arbitrary web script or HTML via the config parameter, which is not properly sanitized before it is displayed in an error message.
bfe8f1276bbd4439e396e05e3a38cc25023e5409c4ed8582ebe4fe5972e05840
SCO Security Advisory - Cross-site scripting vulnerability in docview (htdig) under UnixWare 7.1.3 and UnixWare 7.1.4 allows remote attackers to execute arbitrary web script or HTML via the config parameter, which is not properly sanitized before it is displayed in an error message.
8948f1f7a616d3f968054e459f46c68794386b15c994b4b12f89f92fd3ea5f4a
SCO Security Advisory - store.c in Squid 2.5.STABLE10 and earlier allows remote attackers to cause a denial of service (crash) via certain aborted requests that trigger an assert error related to STORE_PENDING. The sslConnectTimeout function in ssl.c for Squid 2.5.STABLE10 and earlier allows remote attackers to cause a denial of service (segmentation fault) via certain crafted requests. Squid versions 2.5.STABLE10 and below, while performing NTLM authentication, do not properly handle certain request sequences, which allows attackers to cause a denial of service (daemon restart).
f0587c8f5d8323fec288e1f850d67e518ab135abbba7b94636cf8b47c40315bc
SCO Security Advisory - When the RPC portmapper (rpcbind) receives an invalid portmap request from a remote (or local) host, it falls into a denial of service state and cannot respond. As a result, the RPC services will not operate normally.
7b965753d3a7e4c763df94035fce455dd73a441c5f5b3e89c806b700e160b3aa
SCO Security Advisory - iDEFENSE has identified a Buffer Overflow vulnerability in SCO Openserver backupsh. The backupsh utility is a standard binary distributed with Openserver 5.0.7 and earlier.
05597ecea3d8a0bd926b0282d3c7164ffc0d5a812b5296d3da2b44ba717b8f45
SCO Security Advisory - iDEFENSE has identified a Buffer Overflow vulnerability in SCO Unixware ppp prompt. Local exploitation of a buffer overflow vulnerability in the ppp binary, allows attackers to gain root privileges.
52844b9a3101e4ce8cadab981c41468ce7e578544ae531927abae4e4d937634b