A security vulnerability has been discovered in versions prior to 2.2.3.5 of Akamai Download Manager. For successful exploitation, this vulnerability requires a user to be convinced to visit a malicious URL put into place by an attacker. This may then lead to an unauthorized download and automatic execution of arbitrary code run within the context of the victim user.
6513f8507a93764c7e4e3f9c944ed980d881f73edd90dc048061591e2b5a87e3
Akamai Technologies Security Advisory 2007-0001 - Two security vulnerabilities have been discovered in the ActiveX version of Akamai Download Manager. For successful exploitation, both vulnerabilities require the user to visit a malicious URL, triggering a stack-based buffer overflow that allows the attacker to execute arbitrary code within the context of the victim.
dbbaf096163cf2efc8265445fa804f02abd06396737956dba892bb7bf7981d35
iDefense Security Advisory 10.02.06: Remote exploitation of a DoS vulnerability in Novell Inc.'s GroupWise Messenger could allow attackers to crash the Messenger server.
08fe0b130f5994748693d0868c3ba77e6017f17e4f49b94a123aa2494b31d195
iDefense Security Advisory 03.23.06 - RealNetworks RealPlayer and Helix Player Invalid Chunk Size Heap Overflow Vulnerability
9fa110f4e1aa43d75d538dcf1464752590a31a66647589c0cc942f5c2f32ecb6
iDefense Security Advisory 03.23.05 - ISS Multiple Products Local Privilege Escalation Vulnerability
630bbb620548920397a18614c82f61ed6a995aff14c52a078f522999d327b73a
iDefense Security Advisory 01.23.06: Remote exploitation of an input validation error in Computer Associates, Inc.'s iTechnology allows remote attackers to execute arbitrary code.
955c1fecaab62091fd40c907f4f5c9742ddf2f8a12310be2b6fab7345ca7d65a
iDefense Security Advisory 01.17.06 - Remote exploitation of a denial of service vulnerability in EMC Corp.'s Legato Networker allows attackers to crash the nsrd service.
3dd9e50232b3ed57286616217dd334d37e267dd9f103b98f1d2c925be61ba489
iDefense Security Advisory 01.17.06 - Remote exploitation of a input validation vulnerability in Cisco Systems, Inc.'s IOS 11 HTML package can allow attackers to execute arbitrary scripting code.
15d83441eb0f4eca8a5f6e181b29e10704aa00bd1be6c0248814846fe57036e6
iDefense Security Advisory 12.22.05 - Local exploitation of a memory exhaustion vulnerability in Linux Kernel versions 2.4 and 2.6 can allow attackers to cause a denial of service condition.
c5245485d568127229433cc694c9bc779d36c92af8ea1a3be2f97d9d1d1f74a5
iDefense Security Advisory 12.21.05 - Remote exploitation of a buffer overflow vulnerability in Adobe Inc.'s JRun 4 may allow attackers to execute arbitrary code or cause a denial of service condition.
586e6f0046f47138eee16035eac620df8432d626803bb4ac5a141bce9c581ac6
iDefense Security Advisory 12.20.05 - Remote exploitation of a buffer overflow vulnerability in Qualcomm WorldMail IMAP Server allows unauthenticated attackers to execute arbitrary code.
47475781a2d2b684b7e8319f238e979c746804fab848ef3c5702f982dbe540c9
iDefense Security Advisory 12.20.05 - Remote exploitation of an access control vulnerability in McAfee Security Center allows attackers to create or overwrite arbitrary files.
8aae57aa8f61d78c37ccd9a11213d8a5ff27ace01598a7dfa03953e3807109c0