MailEnable HTTPMail Enterprise <= 1.04 Professional <= 1.54 is vulnerable to a buffer overflow on a header field definition which would allow an attacker to execute arbitrary code.
020b6ab6e3581762060ba2c2990b16bc68cb8380fa57614477c9506a4bada0d4
Shoutbox SCRIPT versions 3.0.2 and below suffer from a remote retrieval flaw that allows for the grabbing of an administrator's MD5 hash and their username.
c842a3fc2bdd4a19441502e17c25a603e831b4a4310fbce61bf631805f0fd703
TowerBlog versions 0.6 and below allows for remote access of the administrative password hash.
c0f316cb7aa0bee4f3c9604080646ef61a3da5dddf1f138aa4035337587e7b17
MailEnable EHLO unicode-address-interpretation exploit.
080988c3b6ff9e76a224a05967f19f35b778f5e98dc081d19a324b89abf6314d
MailEnable smtpd contains a bug where unicoded values transmitted in the EHLO command are interpreted as memory addresses. This leads to a Denial of Service condition.
335296893b281ba8130d173af7a8148246ae34a4dc7b33e1c224058d5c3e30b6
MailEnable Pro and Enterprise imapd contains a buffer overflow during the authentication phase. This remotely-exploitable bug allows for ECX and EAX to be overwritten, thereby allowing the execution of arbitrary code.
3c903a1c75d2c6ce2dc58166691a78cc53abf54674742b75c0de08bc36644648
MailEnable Pro and Enterprise imapd contains a buffer overflow during the authentication phase. This remotely-exploitable bug allows for ECX and EAX to be overwritten, thereby allowing the execution of arbitrary code.
2edd1ae02970c2a37df0d63b2f434b3f3acccbe4d46c6f12b8f968b4377f3bc5
THai's Shoutbox is susceptible to a cross site scripting bug.
ed49a7e339d0891d132dc79e327caf12fabaf981cbcaf07676c4f8b3aa3c5658
ArGoSoft FTP 1.4.2.8 is susceptible to a buffer overflow in the DELE command.
f2ab225dc5e874ce70c4ad751ec1cb43e910a21b97bed21a701ea11104b37e8f
Knet versions 1.04c and below are susceptible to a remote buffer overflow vulnerability that allows for execution of code. Exploit provided.
60916343a3d935b16e07490d6a9c71a0069c13e49589207f3b8f49047e798544
CIS WebServer version 3.5.13 is susceptible to a classic directory traversal attack.
93df2506c88017d0e9da0fc1375ee927b8269b2b7e995a36e0a7764f710afd3a
SD Server versions 4.0.70 and below suffer from a classic directory traversal flaw.
0a6a0e0996717aed2c5d24bdc18e0f7e391365c5aca6a7f0b5c1f67e4b43cd99
Unofficial patch for the ASPjar Guestbook login.asp vulnerability that allows bypassing of the authentication process.
fc0f8893e127ff46a67d2fd0fcc9c8c314f1c77b8d8fdec1aefa4a8e8584889c