CERT Advisory CA-2003-23 - The Microsoft RPCSS service has two buffer overflows that can result in remote code execution and is vulnerable to a denial of service attack as well.
08f608806da03bf13300ae37d04e18b8c5ce0fb2d050af75589357405066c043
iDEFENSE Security Advisory 09.10.03: The PINE mail client has two vulnerabilities that can be exploited by specially crafted e-mails being opened. The first lies in a buffer overflow that exists in the parsing of the message/body type attribute name/value pairs while the second exists via an integer overflow during the parsing of e-mail headers.
75236386e59a2fe6120fdbcd69391ed773a4ad2c6190cefc9eccf5d67e15bce5
eEye Digital Security has discovered a critical remote vulnerability in the way Microsoft Windows handles certain RPC requests. A vulnerability exists within the DCOM (Distributed Component Object Model) RPC interface. Sending a malformed request packet, it is possible to overwrite various heap structures and allow the execution of arbitrary code. Note: this vulnerability differs from the vulnerability publicized in Microsoft Bulletin MS03-026.
f689147bd2508bf3e6d1fbd617e83c294c0b6a73992a8551f67234a00531c929
A vulnerability lies in the Roger Wilco client where it trusts the data length specified in a packet without validation and can allow the program to allocate an insufficiently sized buffer. Versions affected: Graphical server 1.4.1.6 and below, Dedicated server for Win32 0.30a and below and Linux/BSD 0.27 and below.
deff21d4849d1e9951b10fb183f5b0b9f242bf1b7a7c77fa8c3f4dae20339197
RealOne Player 9 exploit for Unix/Linux that escalates privileges to the person using the utility by taking advantage of group write permissions on user configuration files.
a67aea9bdace7eee5565929ef499259903de9f4e7f7f1daf7852e5af5e5e6f4f