LiveJournal is vulnerable to a cross site scripting vulnerability.
e2bd55f0a0a4e2972b6c8dfa544ca52dfb99d026d93895bb270c2dbe222537b3
eEye Security Advisory - Zonelabs Pro/Plus/Integrity versions 4.0 and above are susceptible to a stack based buffer overflow within vsmon.exe that can be exploited to execute code with the context of the SYSTEM account. The vulnerability exists within the component responsible for processing the RCPT TO command argument.
a0725e7ec08055483e5b54ac2703231057838074d0fb3f3ce1007b83e9fe049d
Cisco Security Advisory 20040219 - Multiple vulnerabilities exist in the Cisco ONS 15327 Edge Optical Transport Platform, the Cisco ONS 15454 Optical Transport Platform, the Cisco ONS 15454 SDH Multiplexer Platform, and the Cisco ONS 15600 Multiservice Switching Platform. With one vulnerability, the TFTP service on UDP port 69 is enabled by default to allow both GET and PUT commands to be executed without any authentication. Another allows for an ACK Denial of Service (DoS) attack on TCP port 1080. Another involves telnet, where access to the underlying VxWorks operating system, by default, is restricted to Superusers only. Due to this vulnerability, a superuser whose account is locked out, disabled, or suspended is still able to login into the VxWorks shell, using their previously configured password.
32a2786afd8b1d4f23e63ddf0cf563f8acc92fe2ccb101ffa711694f296aa609
iMail 8.05 LDAP service remote exploit.
9308795e0e2b70dc27363fc26273fbb06ce2f88366c5c9995195e1f558830ebf
AOL Instant Messenger (AIM) being used in conjunction with Internet Explorer on Windows XP allows for remote command execution.
aaf2fe5ced94509c99511b2235bf3c36deb4069be23e451e4b50c8b79cb9d291
A security vulnerability exists in specific versions of ZoneAlarm,ZoneAlarm Pro, ZoneAlarm Plus and the Zone Labs Integrity client. This vulnerability is caused by an unchecked buffer in Simple Mail Transfer Protocol (SMTP) processing which could lead to a buffer overflow. In order to exploit the vulnerability without user assistance, the target system must be operating as an SMTP server.
a51d268547556e424ab64f13858af48698b174a1963e715659d2179f18b08318
APC's hardware-based network management cards could be compromised by non-privileged users via Telnet or the local serial port using a static factory password.
8721683bdfae530b9c7c52a5073b4f4cc91992965d5a0b9b9e962cbab3042af5
Exploit that tests for several vulnerabilities in one of Windows XP kernel's native API functions.
c8b58e5f68561dfb961a121c815bb7e3491dd98dec183140d1decc563346e63c
There exist several vulnerabilities in one of Windows XP kernel's native API functions which allow any user with the SeDebugPrivilege privilege to execute arbitrary code in kernel mode, and read from and write to any memory address, including kernel memory. Tested against Windows XP Pro SP1.
7c215bd6570aadab9e31d52d0278b4b39f64273e984aba6f43be2e44e5b56689
Patch and test scripts for two format string bugs and two buffer overflows that exist in Metamail versions 2.2 through 2.7.
5c1618c98e6a139bd0f992f39d1dbffadbc0e420c206670fe34abf8a5179ab40
Two format string bugs and two buffer overflows exist in Metamail versions 2.2 through 2.7. Patch and test scripts to test for these vulnerabilities are available here.
f87cacd3242fbcf612c56f4eaf1a98087ff149f8e0193954c91e2f2045ff1a8f