NetBSD Security Advisory 2004-010 - Some of the functions in /usr/src/sys/compat/ which implement execution of foreign binaries (such as Linux, FreeBSD, IRIX, OSF1, SVR4, HPUX, and ULTRIX) use argument data in unsafe ways prior to calling the kernel syscall.
05546d49f053bc61209d8c580436a808dbef16beb496554eb15265e595aea34f
MaxDB WebTools versions 7.5.00.18 and below suffer from a denial of service flaw and a WebDav stack overflow.
c20f2fce6b880245de398b94db42eb5c621021013f6b5edf715a90dea9a81f62
The RADIUS protocol testsuite is a tool for auditing written completely in python. Included in the tests are various FreeRADIUS flaws.
ce98d45d7e8071114a8fe23e37a494919b078501b7d0c867b6ba3b616596a719
An integer handling error within the swapctl() system call of NetBSD 1.x can allow a local user the ability to cause a denial of service attack.
0b04f2d0bae3375ec84b5c4112c85c28ed5adf7a137c5cae027ebc0d6c7b7189
Heimdal releases prior to 0.6.2 with kadmind version4 have been found vulnerable to a remote pre-auth heap overflow.
e9904e864457a433ac51672c12211c9ea2fc1e1a4bccf613bd089f2a6f702889