Remote root exploit for the STOR buffer overflow vulnerability in Code-Crafters Ability FTPd version 2.34. The EIP address only works on Windows 2000 SP4. Two shellcodes are included. One binds a shell and another streams a file and executes.
f402160d538f63e97458e75baaad6d4dc5288a0430435e6567a0c76362822792
Secunia Security Advisory - A vulnerability has been reported in TortoiseCVS, which potentially can be exploited by malicious people to compromise a user's system.
abeb478d83817f707e6e7da7e31dcd3f420db10ecbd36d7eb01529f4e414dec7
Secunia Security Advisory - Colin Phipps has reported a vulnerability in catdoc, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
da205ab7f335e2cc51639d366d79aeae3bde8fc48eed6264bc8fa295258d9b1d
Gentoo Linux Security Advisory GLSA 200410-31 - Email virus scanning software relying on Archive::Zip can be fooled into thinking a ZIP attachment is empty while it contains a virus, allowing detection evasion.
2623e61baab34edd9c702613e81159a5c563b62dbda3c1bd21ed88cb2cc55649
MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with Sendmail 8.11/8.12's new "Milter" API, which makes it more flexible and efficient than procmail-based approaches.
be17a9547c7ed9e7002c6d1be1ef16fc099a433e95f3cbdbcc98b54c7bcb098c
Secunia Security Advisory - Ziv Kamir has discovered a vulnerability in Cyber Web Filter, which can be exploited by malicious people to bypass certain security restrictions.
fa973fc63c033d4ea61bccaf3053ac6b62dab0dc60213975b3565109b245acc4
It appears that the new Apache release 1.3.33 still is susceptible to a local buffer overflow discovered in htpasswd under release 1.3.31.
e6a9149037f4b1d66672b62767ea68f40b7ee59f1984ddb9aa2e324192efe4ef
Apache is the most popular webserver on the Internet, quite possibly the best in terms of security, functionality, efficiency, and speed.
c7327891a6dba926e97d701463f9877fa164757189d192aac8d52100bf2a2484
THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.
382ff75f66fc7c7ec429c4c2513c61dcb8322927a6b51542914cc7a08717caef
MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with Sendmail 8.11/8.12's new "Milter" API, which makes it more flexible and efficient than procmail-based approaches.
80904dbeacbb7a2964918402fcaba6f179e044558567d7cd3cdee85e739c8b16
Microsoft Internet Explorer 6.0.2800.1106 and possibly earlier versions fail to properly handle links embedded within links, allowing for spoofing of target addresses.
7da3421a41e8b0ac88ad9c7662f72ec0ea3556d9a28bc76b6d137f677fd27af2
Os-sim attempts to unify network monitoring, security, correlation, and qualification in one single tool. It combines Snort, Acid, MRTG, NTOP, OpenNMS, nmap, nessus, and rrdtool to provide the user with full control over every aspect of networking or security. Supported platform is Linux.
a9e4efded4cd6c297b87696904dc6e2478801da4bda93861dd8e1b201712476b
Presentation: Bypassing client application protection techniques with notepad.
e4f987378606cf9b7a1349994610bfb96d53d4405cc8e13e837a7a2766319313
Secunia Security Advisory - Andrew Nakhla has discovered a vulnerability in Apple Remote Desktop, which can be exploited by malicious users to gain root access on a vulnerable system.
85d9f76ff37293d5d50d230cfe7e4cfa2a63d003085dd41515fdd278773dbf18
PHP4 cURL functions bypass open_basedir protection allowing users to navigate through the filesystem.
765016dae640f3bcadcb4d07c7fffcebbe55bd3c65241833d9335fe8ef0f2813
Gentoo Linux Security Advisory GLSA 200410-30 - GPdf, KPDF and KOffice all include vulnerable xpdf code to handle PDF files, making them vulnerable to execution of arbitrary code upon viewing a malicious PDF file.
37d8a0de090ab75590e1883bb797ba812c0a2555a6b6148fd608d9234f590512
Debian Security Advisory 574-1 - The upstream developers discovered a problem in cabextract, a tool to extract cabinet files. The program was able to overwrite files in upper directories. This could lead an attacker to overwrite arbitrary files.
fc4ac9837b143b972a1bcb9bb0d89273b2f8d3094c0a081df8b97ffeebd1a240
A high risk vulnerability exists in Quicktime for Windows versions 6.5.2 and earlier.
e225e65e339978dc3071b9a5afce13c6687b3bd18967e4ff3e7c14bb2d873daa
eEye Security Advisory - eEye Digital Security has discovered a vulnerability in RealPlayer that allows a remote attacker to reliably overwrite the stack with arbitrary data and execute arbitrary code in the context of the user under which the player is running.
4228c29ddc8f4a770989a7a4523551435648a017959562fee57351d9d722789c
Proof of concept exploit for Master of Orion III versions 1.2.5 and below which suffer from buffer overflow and allocation errors.
505124f0a29c72a428518e910334f4f7712741c1b20597a13ebbca8945f628c9
Master of Orion III versions 1.2.5 and below suffer from buffer overflow and allocation errors.
ff876d3954314db21a25e6da1cb8f530c0962204597ce6e7808b8f0024d379cc
Secunia Security Advisory - A vulnerability has been reported in ImageMagick, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the EXIF parsing routine. This can be exploited to cause a buffer overflow via a malicious image file containing specially crafted EXIF information.
8715d7138e0a1afcb50b5318b61c96c373ce0df7259541e75860413034a6a339
iDEFENSE Security Advisory 10.27.04 - Remote exploitation of a buffer overflow vulnerability in Simon Tatham's PuTTY can allow attackers to execute arbitrary code. The vulnerability specifically exists due to insufficient bounds checking on SSH2_MSG_DEBUG packets.
df688daac18818d72fcb49c9a410285b34da156af4509acd4f488baaf7beac1c
KDE Konqueror 3.2.2-1 is susceptible to cross site scripting flaws.
e5b76811b57ff0415f7cefe4c0eba39cbed052df6432eb4dcac363b86a7d4310
Secunia Security Advisory - A vulnerability has been reported in Horde Application Framework, which potentially can be exploited by malicious people to conduct cross-site scripting attacks.
21a8f64c43421710b104df637692afa1e23a8074c429ae36c2635b09edb21934