The Gamespy SDK used for online cd-keys validation in third party code has various vulnerabilities. Game servers getting crashed and privacy problems persist. Gamespy themselves sent the author a cease and desist due to his research.
508be26b049e786d8ba2d9500a23b57d3bd980bdd84494999ac53b40d0ed4ede
The Ghost Recon engine versions 1.4 and below along with some other games developed by Redstorm are vulnerable to a remote crash.
062615fe20f9e43892163c7a4cfd3022ebebbc5ad07227f14d59689a553a93a9
Haegemonia versions 1.07 and below have a remote vulnerability where the reading of unallocated memory causes a crash.
71612dcd0b3195ee5a2b49861682273a773a9112ce0ccfbaecb6d6f49e189790
Trillian versions 0.71 through 0.74 and Pro versions 1.0 through 2.01 have two vulnerabilities that allow for remote compromise.
644a67bf065bdd9369181f79afb3191465a69dcc5c87f7d823e73f8dfeee5add
BadBlue web server version 2.4 has a local path disclosure vulnerability in phptest.php.
61526ad7e90d57897a735b25cd5b3a4fed70406fc831efc5ad1c0098950b1c52
FlexWATCH-Webs versions 2.2 (NTSC) and below suffer from an authorization bypass via double slashes and also a cross site scripting attack.
30f2d7d384b06c83532dccf7d1af6e57c41375c5a13abfadfe0e4861c59106a0
Gigabyte Broadband Router version Gn-B46B with firmware version 1.003.00 is vulnerable to a remote authorization bypass.
e3149a74a9c9b81c93c795bacc90d54e97eece5c31f0f9a3dd7a8c272d3b6b3f
chntpw is a Linux utility to (re)set the password of any user that has a valid (local) account on your WinNT or Win2000 system, by modifying the crypted password in the registry's SAM file. You do not need to know the old password to set a new one. It works offline (i.e., you have to shutdown your computer and boot off a linux floppy disk). The bootdisk includes stuff to access NTFS partitions and scripts to glue the whole thing together. This utility works with SYSKEY and includes the option to turn it off. A bootdisk image is provided.
65dbbeafff881919c106decc466b7752d52cc68632baebbbb704a3dd7016433a
IRC Defender is a Perl program for protecting your IRC network against virus drones, general troublemakers, ban evasion, and attacks. It is fully modular, able to unload and load modules on the fly, and comes with several modules to ban anatoly/fyle virus drones, block unauthorised cgi:irc sites, conduct ctcp version surveys, maintain ctcp version blacklists, and (most importantly) set regexp-based akills.
952f2ea50ff04b95e6292c122538c184fbaba0c22bbfa3b7d19bd3c737cc5dc9
Network Security Policy Compiler (NetSPoC) is a tool for security management of large networks with different security domains. It generates configuration files for packet filters controlling the borders of security domains. It provides its own language for describing security policy and the topology of a network. The security policy is a set of rules that state which packets are allowed to pass the network and which are not. NetSPoC is topology aware - a rule for traffic from A to B is automatically applied to all managed packet filters on the path from A to B.
54d61d636c96d5d398a4b34945bc256c442d6d1f232877f25f75a52a1bee7523
iDEFENSE Security Advisory 02.23.04: Exploitation of a flaw in Apple Computer Inc's Darwin Streaming Server allows unauthenticated remote attackers to prevent legitimate usage.
f372c7d4abe5c81061d94571dca2e30e3fbfca98b98ff04b3ccdf60adc28c1e9
Atstake Security Advisory A022304-1 - The ppp daemon that comes installed by default in Mac OS X is vulnerable to a format string vulnerability. It is possible to read arbitrary data out of pppd's process. Under certain circumstances, it is also possible to 'steal' PAP/CHAP authentication credentials.
ac39259d91e80a21a84083dd2d5ed03a1ab274c26fa3d74162b3afe90c544152
TYPSoft FTP Server version 1.10 is susceptible to denial of service attacks via most standard FTP commands.
9896cd1b5ce2e75750ee8ad25c0668ceb68ffb05d3a115a758fc7e382ab93b2e
Lam3rZ Security Advisory #3/2004 - Confirm versions 0.62 and below allow for forged email headers to execute arbitrary code as the uid the script runs under for procmail.
634b2b6e2e473082e8c96998040c28f72299b5f0b7d63fbea545f69d86f36438
Team Factor versions 1.25 and below are susceptible to a remote server crash. Both the Windows and Linux platforms are affected.
ecf6ae877cd6f230a6ca6cfcb248d330cfbe231379638e55923f3b71bcf037f3
Extreme Messageboard aka XMB version 1.8 Partagium Final SP2 is vulnerable to multiple SQL injection and cross site scripting attacks.
94202bebf3a32f786fd685a5f8e27fde71d3af5d8268b3550c55c6d9a2fd6d7f