Remote exploit that makes use of a buffer overrun in the Serv-U FTP server versions 4.2 and below.
c4174e145fda328216ce0c52e5bf305b7a9f9a1cea90df103ee512f28f76a97d
Windows XP/2003 Samba file sharing resource exhaustion exploit that commits a denial of service.
a91d653658d8a311303aac3232b3fab4ebcb1b7feb4f843ca68bdc4c5a2a202a
Brute forcer for OpenSSL ASN.1 parsing bugs that affects versions 0.9.6j and below and 0.9.7b and below.
8bbbf5ff84c17067f0cd384d9a2c32db1f752553417de9a7493aa5111f6897b7
Remote exploit that makes use of the try_netscape_proxy() overflow in versions 2.3 to 2.6.9 of lftp.
816d755b95467dc00ab06edb3f6891bcfd9a118f8f8af795a90ab0f3b444ba8a
Versions below 1.5.2 of GNU's libtool have a symlink vulnerability that creates a temporary directory when a package using libtool is being compiled.
ea8da7ea3d3c709ad14bfe61958c89e3adae4bd96c61857b2ef91789c1a5d545
phpGedView versions 2.65.1 and below suffer from multiple PHP Code Injection vulnerabilities that enable a malicious user to access arbitrary files or execute commands on the server.
be5e66ffc5826f681bd480cabfd994a4d7dc5f7649cca38b0bc6ec5ea2815885
Cisco Security Advisory 20040129 - Cisco has released an advisory dictating that their products that make use of the Microsoft Workstation service may be susceptible to attack.
1d2acb3a56c3682bd561de21733830314524b20731877ce37bc33bbca42fa6ff
Web Blog 1.1 allows for remote command execution due to an unsanitized file variable.
e0af8c56d3430aa463075d8e02f7ec239fa8e7490a1451b1eb83f2d3a80af5a9
Some dynamically linked binary builds of the CVSup package contain untrusted paths in the ELF RPATH fields of the executables which may allow for local privilege escalation.
b8782bca72a905590f6df6d37502a533b73ad0fe9fb35cea32cce7475f90ab88
Ultramagnetic, a utility based off of a fork of the GAIM IM software, is susceptible to the vulnerabilities found in GAIM versions 0.75 and below.
abf6c26a90679efd79e65b29519d28f7e599cb1e44ffde9b83afbc17c20ea2ae
PJ CGI Neo review is vulnerable to a directory traversal attack that allows a remote attacker to access any file outside of the webroot.
992dd31568c4fcc4ccd00ecd6c0ceb0917e4d9075666f57504e17c887cb3ecde
Any user with AAO privileges over the onshowaudit binary in IBM's Informix IDSv9.40 can read any system file.
72ed995c0d9c55f14fcc3e3b6054b130f3018ce7a50d8030dfc3d03869c0a948
A local vulnerability exists in the IBM Informix IDSv9.40 onedcu binary that allows local users to overwrite any root owned file.
db72f511fe4d56d0ece80a8d419ef2589c072cffdbf4185599095797b18a579e
Atstake Security Advisory A012704-1 - The version of TruBlueEnvironment that is shipped with Mac OS X 10.3.x and 10.2.x takes the value of an environment variable and copies it into a buffer without performing any bounds checking. Since this buffer is stored on the stack, it is possible to overwrite the return stack frame and execute arbitrary code as root.
8ce54a8fef937890cb1f9d170aa0c3d29ca49c9cf3641d06a4d384befd8331e6
SurfNOW HTTP Proxy version 2.2 suffers from a denial of service vulnerability.
b1c765b5daf99c7ab72393c966b6f1e31f841593fb5519962a01b138658c8241
BRE WebWeaver version 1.07 is vulnerable a cross site scripting attack.
72434b112da0910a837e767cf44c6ee6954e146ec34f69d6d828044685dfa900
A stack-based buffer overflow exists in the ONCONFIG environment variable read process when it is bigger than 495 bytes and read in by the IBM Informix IDSv9.40 ontape binary.
237129932a9575d521e132d6ce68b9b05c5f0b848a26bc2b6672c672bcf3702a
Web Blog 1.1 allows for remote file retrieval outside of the web root via a directory traversal attack.
8ffba7542b46b6728704b40c87466c1fd319e96b82e24f45e7ff600b1fb8abcc
Secure Network Operations Advisory SRT2004-01-17-0227 - The BlackICE PC Protection firewall/IDS versions 3.6.cbz and below allows local users to gain SYSTEM privileges.
e11291b6fe63deb9260c5e4794ff9f5c78a8c4a27a5ad66e8a0b594f3485a735
CERT Advisory CA-2004-02 - Recent weeks have shown a spike in mass-mailing viruses released on the Internet. Advisory released to keep the general public aware.
cdfebb5a5dffec4d1edc9bb5ae5bc74b9728b9ec32eac930bc8dac28eb6b3206
Remote exploit that makes use of a buffer overrun in the Serv-U FTP server versions 4.2 and below.
284a2e89d944215f5b46bd4e96161625f632ef248662810dc10285b64cba0205
Trivial way to do file spoofing in Internet Explorer versions 6.0.2800.1106 and below.
77b83565d337b035d648444f5bce0a768b8022a42f296c2f964bd12f78475766
ProxyNow! versions 2.75 and below are susceptible to both heap memory corruption and stack-based buffer overflows. Exploitation of these vulnerabilities can lead to a denial of service and/or code execution with SYSTEM privileges. Detailed analysis and exploit included.
befbd5bf13e3b6d7dc791bb61f8d8476b36082b54e5da32d7a8aa177d07afba7
Oracle HTTP Server powered by Apache is susceptible to a cross site scripting attack in its isqlplus script.
748ac7cca1f921761e927eaa455cbf3fdf10094a39aecbc81e13aa6dc48834ec
BremsServer version 1.2.4 is vulnerable to directory traversal and cross site scripting attacks.
45ec16ae54b25850adf177d878a6be55addb1dfb712964e4d6ca473de6d221c4