phpScheduleIt 1.0.0 RC1 is susceptible to cross site scripting attacks.
83d7e1638d1df1c6ee19950e9c9c58fc8c1621aa46d9ded173e8d2257a5825eb
Pads is a signature based detection engine used to passively detect network assets. It is designed to complement IDS technology by providing context to IDS alerts.
115c02dcf0b5d88634f7318a64e975886ee00b57caff1f689eb8f407c968454c
Diebold GEMS central tabulators have a flaw that allows locally authenticated users the ability to enter a two digit code in a certain hidden location and cause a second set of votes to be created on the system. This second set of votes can be modified by the local user and then read by the voting system as legitimate votes. GEMS 1.18.18, GEMS 1.18.19, and GEMS 1.18.23 are affected.
564010be24cb1542998535b0c04aec8be289d3bed5bfb5b22c1ce33bf6f39a46
Attack Tool Kit, or ATK, was developed to provide a very small and handy tool for performing simple security checks on Windows. It requires minimal interaction and is very modular in design.
e4118c463bd60d1138d0115a80e8d3c03d1f5a5792a9f6eee59b8668eecaa589
Cisco Security Advisory - Two vulnerabilities in the Massachusetts Institute of Technology (MIT) Kerberos 5 implementation that affect Cisco VPN 3000 Series Concentrators have been announced by the MIT Kerberos Team. Cisco VPN 3000 Series Concentrators authenticating users against a Kerberos Key Distribution Center (KDC) may be vulnerable to remote code execution and to Denial of Service (DoS) attacks.
7eb6d05ddaa3c7ecc362147258ab59631a5b72a9311ef317af30ce7bc5ef6484
MIT krb5 Security Advisory 2004-003 - The ASN.1 decoder library in the MIT Kerberos 5 distribution is vulnerable to a denial-of-service attack causing an infinite loop in the decoder. The KDC is vulnerable to this attack.
4b2109c29e9989e5e67ce71b02139a53fc2c13e5eaf4a2bf4e66424813fd07e9
MIT krb5 Security Advisory 2004-002 - The MIT Kerberos 5 implementation's Key Distribution Center (KDC) program contains a double-free vulnerability that potentially allows a remote attacker to execute arbitrary code. Compromise of a KDC host compromises the security of the entire authentication realm served by the KDC. Additionally, double-free vulnerabilities exist in MIT Kerberos 5 library code, making client programs and application servers vulnerable.
16ff257fddc0998a5f6da56ebbdf309102fbd3f56729020f8e56995d76035635
A buffer overflow exists in the MSinfo32.exe binary.
f6c672d7afb81fc0b2ad46a7e0f48c64a72f3cfa2ec745e544ccf82295b3846d
Secunia Security Advisory - A vulnerability has been reported in PvPGN, which can be exploited by malicious people to compromise a vulnerable system. The problem is caused due to boundary errors in the handling of the commands /watchall and /unwatchall. This can be exploited by supplying an overly long argument to cause a buffer overflow.
27166d74519262b8157cbbee58aa9f2b36d4cd2bf1107739fb87616f85fda32a