qwik_smtpd remote root format string exploit.
f80bcf5f7ebe8c8cf5fc157732f307ee79f84ec5b1e849586f565f4fb5b8fcc0
Freedom of Information requests at http://www.blackboxvoting.org have unearthed two Ciber certification reports indicating that security and tamperability was NOT TESTED and that several state elections directors, a secretary of state, and computer consultant Dr. Britain Williams signed off on the report anyway, certifying it.
a7b2751859610e733db64ffa0b111090fd5966cced9e68fb32493f01a7e885bc
Gentoo Linux Security Advisory GLSA 200411-14 - Kaffeine and gxine both contain a buffer overflow that can be exploited when accessing content from a malicious HTTP server with specially crafted headers.
57f9c72a9ae0b727f89aa06a89acc2bb0a435904fb2ba0d79a4908fa9a47df01
Gentoo Linux Security Advisory GLSA 200411-13 - dispatch-conf (included in Portage) and qpkg (included in Gentoolkit) are vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files with the rights of the user running the script.
729930f8e749e92b230d84f81c5246ed5797cdb3446131c5dcead6e342b5868e
There are various bugs in up-imapproxy which can crash it. Since up-imapproxy runs in a single process with each connection handled in a separate thread, any crash kills all the connections and stops listening for new ones.
e977da88a6a941887b296573eec40ec448999cae2a3236a20eb72399b1e090a7
Minishare versions 1.4.1 and below remote buffer overflow exploit that binds a shell to port 101.
7deb9b62c428f616da8582be9f376e3e7432cab321204c9990482f99a767d441
Microsoft Internet Explorer permits an attacker the ability to verify the existence of local files via Active Scripting.
779100578f2b084f44e5b43c2e4f27387cac711461e4b367e62ceadd121c0714
Test exploit for 602 Lan Suite versions 2004.0.04.0909 and below which are susceptible to resource consumption and socket consumption attacks.
7711a720048ee9819701c76a35b78e724e69e13e982f8b374331bbe011c72e6f
602 Lan Suite versions 2004.0.04.0909 and below are susceptible to resource consumption and socket consumption attacks.
5b49850605dd5c628cf0158c662a2f0f97fc7dc492eea5db809e41ac497e4539
The Lithtech engine used in games like Alien vs Predator 2, Blood 2, Contract Jack, Global Operations, Kiss Psycho Circus, and more, is susceptible to some format string bugs that allows for a denial of service attack.
2678980245a1289481681cfdc82bbb24e664a33369c7550a67c78332b59d7128
Secure Science Corporation Advisory TSA-053 - Ureach.com's Uscreen Desktop software is vulnerable to misuse and enables specific caller-id spoofing via the forward feature, enabling compromise of other communication services operating on PSTN or wireless networks.
006f9cb5c45c247b15e043a6b78ad99810621540cc9699bc49518f8bfa564295
Merak Mail Server 7.5.2 with Icewarp Web Mail 5.2.8 is susceptible to various file maniuplation and cross site scripting flaws. Version 7.6.0 with Icewarp 5.3.0 is susceptible to two of these flaws.
2551a8715043bd94de9a0c8da273695f3dcf4c72accc7cfee01a9a3813d6fd41
Secunia Security Advisory - A vulnerability with an unknown impact has been reported in Sophos MailMonitor.
5f34cef16712b64f78b547dab19ef582f74006e916da43d6e1e6fb3e1b88412b
Debian Security Advisory 585-1 - A vulnerability has been discovered in the shadow suite which provides programs like chfn and chsh. It is possible for a user, who is logged in but has an expired password to alter his account information with chfn or chsh without having to change the password. The problem was originally thought to be more severe.
9885f415f6ddbecbcf66deab4cf956733649340e1658db6a5a9e5b506522c2f1
CALL FOR PAPERS - DIMVA 2005. Second GI SIG SIDAR Conference on Detection of Intrusions & Malware, and Vulnerability Assessment. In Cooperation with the IEEE Task Force on Information Assurance.
58499862fac6ec9dfb6a7e3565b3b80321cac867456a948f42d41a1cec4868f9
Secunia Security Advisory - Some vulnerabilities have been reported in Moodle, which can be exploited by malicious people to conduct SQL injection attacks.
91c31ae4c3ac86161746a2b308c7bb48b75603f4f9cf7c20aa77952619827487