Usage of weak session management exists within the Zeacom web-chat application versions 5.0 SP4 and below. It enables the bruteforcing of the sessionid which can enable the hijacking of anothers chat session.
348be816b349ef4e1d9255d24ad8d31f6811c52da8b4a6a86359fe211a3ff443
MediaCast versions 8 and below suffer from a vulnerability that allows for the disclosure of previously cached Active Directory credentials.
c88fa381d0da7f60a5a8607c0a502f70e3ca22558705e751c96e78bcd92f858a
Cisco ASA/PIX appliances fail to properly check fragmented TCP packets.
cf31e2d808f52215c9aa9a83ebaf0678772e6f5065c0f50988aaf86c9f3745b9