PWebServer version 0.3.3 suffers from a directory traversal attack that allows a remote attacker to access any file outside of the webroot.
ea3ca487389324ffa7305aa2021d36ed14251e5d30dd90ae1340b73839d76f18
Safari Javascript engine versions 1.2 and below suffer from a denial of service vulnerability due to an improper allocation of arrays.
4a853f05a8f39d62ab2f1b5e2badfcf99db158ececd8ca8a05c6c0ccce774bcc
The SSH library is a C library to authenticate in a simple manner to one or more SSH servers. This project provides a library much simpler to use than the OpenSSH version. It includes SFTP support, and a sample SSH client is provided.
d248ec8010a4c06bb6ae2ddc6243d6d9d9901f156b1976342207d12c7193b074
Norton Antivirus 2002 fails to scan files with special character(s) properly resulting in a crash.
f8692044a214a9e0c091bbcc48d995d20d82d0fd19999084ac8dd548637c5637
CIAC INFORMATION BULLETIN O-088: On both Solaris 8 and 9 (SPARC and x86 Platforms) a local unprivileged user may be able to gain unauthorized root privileges due to a security issue involving the passwd command.
86c253d5044130e34d4b35ac994ff9c96a94a595dcccca61386a839d869b87d2
MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with Sendmail 8.11/8.12's new "Milter" API, which makes it more flexible and efficient than procmail-based approaches.
16d2bcdac52634580263e0b9c4e716bb910c40de0c1423bdffcab294547aa8cb
Haegemonia version 1.07 and below denial of service exploit. Updated to support the other games from Desert Rats that are not even released yet but hold the same vulnerability.
e6a331c593c7fe0a0312e639ccf14bdb041134985719b0f7680d0a645160c8ec
Invision Power Board versions 1.3 Final is susceptible to a cross site scripting attack.
93d8939b30b06bd6edcf59474442458101779057deb1b80413667302d3c4d1bf
VirtuaNews Admin Panel version 1.0.3 Pro is vulnerable to a cross site scripting attack.
205786c68330b41eb6b26b19658148764eb7d43fc3a1175dc049219bdcbb8f1b
NGSSoftware Insight Security Research Advisory #NISR05022004b - SLWebMail has multiple buffer overflow vulnerabilities that are related to ISAPI appliactions.
790511422fd37d4dce237d9ab6d5bcca33b01748ee585626ae4f96d6e9de7c25
NGSSoftware Insight Security Research Advisory #NISR05022004a - SLMail Pro Supervisor Report Center versions 2.0.9 and below are vulnerable to a buffer overflow attack when supplied with an overly long HTTP sub-version.
bbf99c5e556389172e13039eabaf73dc04ef299f0efb85553c10a6ffac15cee4
Exploit for Red Faction versions 1.20 and below that have a client-side buffer overflow.
01c7b9282fc2aa240cbc56fcdaaa2305670964794ae290b72a06e4e3f1e60a0c
Prismstumbler is software which finds 802.11 (W-LAN) networks. It comes with an easy to use GTK2 frontend and is small enough to fit on a small portable system. It is designed to be a flexible tool to find as much information about wireless LAN installations as possible. Because of its client-server architecture the scanner engine may be used for different frontends.
0292fa27ac58c68a5c374fda17324debc7c8a108deee8db6e5139ff5c04473c0
Remote exploit that makes use of a buffer overflow in GNU Anubis. Vulnerable versions: 3.6.2, 3.9.93, 3.9.92, 3.6.0, 3.6.1, possibly others.
6f547b7717fcf62439171559f0223a0358e15ef1457120541045bf8af97228f1
GNU Anubis is vulnerable to multiple buffer overflow attacks and format string bugs. Vulnerable versions: 3.6.2, 3.9.93, 3.9.92, 3.6.0, 3.6.1, possibly others
b0fe1f61d8763fc679ba6f83853b5115d77c1101fb9f753f2ba402ca8da4f1e1
Cisco Security Advisory 20040304 - The CSS 11000 Series Content Services Switches are vulnerable to a Denial of Service (DoS) attack caused by malformed UDP packets received over the management port.
8d1a36f631f29992e2e2cc08bc8380a2e4c0a7c8688e3b99f754b9a3de11c806
Divide and Conquer - HTTP Response Splitting, Web Cache Poisoning Attacks, and Related Topics. This whitepaper discusses a new application attack technique and provides use cases.
0420aad9f75035ecdf188c7e10019360d9264c46f6a33e7d3e787c9c0bd4f2c0
Utility to find universal addresses for Windows machines.
52c856de9caeb837dc6f2b354a8ed31179e77b1c907ccee1907c3a191c6e5047
Serv-U FTPD 2.x/3.x/4.x/5.x MDTM remote command buffer overflow exploit. Tested against Windows 2000 and XP en/cn.
971af3ae699a87cfda98262f022d27b79d9091273909f6803bec8bc73a25f046
SHOUTcast version 1.9.2 remote exploit with connect back code. Written for Slackware 8.1, 9.0, 9.1, and RedHat 7.2.
4871cfddef91c577c554b14dfdaf2472474b595033fe12ccb112b6a54d289e32
NGSSoftware Insight Security Research Advisory #NISR03022004 - Adobe Acrobat Reader version 5.1 is susceptible to a buffer overflow when an xfdf file is parsed and an unsafe call to sprintf is made.
5c2fe87f3086d81cece64a96a65a42cdbe85f107673aa6bbea41d68b9a187dfe
Packet Storm new exploits for February, 2004.
eaeb49e26e34807dbf429d7665b585b06e121bbf3fef3a146ed9759cfa380e38
GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.
262590bc42c76203574374525d97735d628fad79f37293d30606b434e99a35c3
Internet Explorer version 6.0 with SP1 is susceptible to Cross Zone and Site scripting vulnerabilities.
9faafaa8b8dd12b161fea36f809db62016430fa53b85a28f96e67449a1427e7f
RAVR is a Procmail recipe that performs content-based (as opposed to signature-based) filtering for common email viruses using Procmail's scoring feature. Emails that are determined to contain viruses are stamped with a header indicating the name of the virus and are then filtered into a user-specified quarantine folder. The purpose of RAVR is to quarantine emails containing the most common viruses currently in the wild.
455b251d307695aa66a3998087e4b042c3fba59b6c0da70a7ac7d6fbaa12ab02