MPM Guestbook Pro 1.05 is susceptible to file inclusion and directory traversal attacks.
bd873c882571bb58ef6d64418f8f55cbf92793860c9f7d62816db4ac2fa81055
iDEFENSE Security Advisory 01.13.05-3 - Local exploitation of a design error vulnerability in the inpview command included in multiple versions of Silicon Graphics Inc.'s IRIX could allow for arbitrary code execution as the root user. iDEFENSE has confirmed the existence of this vulnerability in SGI IRIX version 6.5.9 (feature) and 6.5.22 (maintenance).
6fc74e29d221906b5702bda5d63a1aa554f4996f982c5cdfd0f9e76df8802420
iDEFENSE Security Advisory 01.13.05-2 - Remote exploitation of a stack based buffer overflow vulnerability in MySQL MaxDB version 7.5.00 could allow attackers to execute arbitrary code.
654587eb91cfe85f52087b67018c95ae4efe4ca6da12b8ae8a8571ff2a5e966d
iDEFENSE Security Advisory 01.13.05 - Remote exploitation of a buffer overflow vulnerability in Apple Computer Inc.'s iTunes music player allows attackers to execute arbitrary code. The problem specifically exists when parsing playlist files that contain long URL file entries.
0ef04a63f0b7de016bd8ee4cfdbff3d9b5f2a0e90b7425e26b41e85a925b45d8
Remote denial of service proof of concept exploit for the Breed game server that crashes upon accepting an empty UDP packet.
90b331b9e3b1f4f07df307eb710d50ccf1aa56a88ebdb3f89d780cf9049f0898
The Breed game server is susceptible to a remote denial of service attack when sent an empty UDP packet.
7a562c3828a442ba297a94ba95df2ede4d37761a0a249397c9a5e979fbce4b09
ITA Forum 1.49 SQL injection exploit with one character bruteforce.
2e1f9c9d8e1c7b34aa1a3cd45aac2108339a478a3d27ff0ed4012a4e18b82d51
Secunia Security Advisory - Darren Bounds has reported a weakness in ISS Proventia, which allows malware to bypass detection.
027d156a1c2bad9fd74c893d8b2a30f07591e52e701d5bc1c76ca0882bf3ac71
Secunia Security Advisory - Darren Bounds has reported a weakness in TrendMicro InterScan, which allows malware to bypass detection.
d0bf0b88ed59580e248e744d43354f7047d3c16820897fac526b2f777104f5bd
Secunia Security Advisory - A weakness has been reported in Check Point Firewall-1 NG with SmartDefense, which allows malware to bypass detection.
591ae33f7ad522ffc27ec1a6c373a6fcfbf8b3817c30dc85514fe40a15d422ba
CIRT Security Advisory - The web application for the Trend Micro Control Manager Enterprise Edition 3.0 is susceptible to a replay attack. The username and password are encrypted but there is not any form of timestamp mechanism to make this more advanced and secure.
3009e577dcfd334d942abe624313593fae4988effb0ce185c31c327c0895f6fa
Secunia Security Advisory - Darren Bounds has reported a weakness in McAfee Webshield 3000, which allows malware to bypass detection.
a8c56afde7fdb0730bbda48e3ac45636ef48915426e5ff17587b6d6895126335
Secunia Security Advisory - Darren Bounds has reported a weakness in IronPort AsyncOS, which allows malware to bypass detection.
ca6f5f9fca7661ac7e9f183cafbfade7cd18d7bb88b6af557c2da505904ff7d1
Secunia Security Advisory - Darren Bounds has reported a weakness in TippingPoint UnityOne Intrusion Prevention Systems, which allows malware to bypass detection.
6b2f1588747bf211868da40c457feaf9846112dc0fffd9307e1aff46d58ae3f7
Debian Security Advisory 638-1 - jaguar has discovered two security relevant problems in gopherd, the Gopher server in Debian which is part of the gopher package.
406636d26b7059177f23d1ae0ccde3f123b5077eff8301aa92130d641d3f695b
Google's GMail system suffered from a massive flaw where random GMail users may have had some of their mail passed to other users that it was not intended for.
ad834f68853ae4b16f82806d042e585f44aed8f418930be486d555748e755404
Secunia Security Advisory - vim 6.x is susceptible to an insecure file creation vulnerability.
0a6c8478c70c9b7ce82c1be1a0db07dbf6569637bd528a554b11559350e82996
Microsoft Internet Explorer 6 is susceptible to a flaw that allows for malicious file download via manipulation of the File Download Information bar functionality.
9819de7846ae70cadf20f378c91cc61117a83847a9ab9ea1767507c8b371ec78
Fuzzer version 1.1 is a multi protocol fuzzing tool written in Python. It can be used to find new SQL injection, format string, buffer overflow, directory traversal, and other vulnerabilities. Written with portability in mind.
ad4a7916cf9cce84ab9c2dce475b0ed875adddeb4bfc8ab1b7d78dbc34a6ed3c
Secunia Security Advisory - A vulnerability has been reported in OpenBSD, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an error in the TCP stack when calculating TCP retransmission timeouts. This can be exploited to crash the system by sending some specially crafted packets with specific values in the TCP timestamp option.
01dfe21b277aa6a3cabb668c46629de39e0a77f728da1dfa5a2923c9dc64db09
forumKIT 1.0 suffers from a cross site scripting vulnerability.
6838b682b5f32e1beb7f6200c5cdac9786c241115776b6c8d1e6fe8a36c72614
Debian Security Advisory 637-1 - Philip Hazel announced a buffer overflow in the host_aton function in exim-tls, the SSL-enabled version of the default mail-tranport-agent in Debian, which can lead to the execution of arbitrary code via an illegal IPv6 address.
2112b135f500dfd415c1aa19e2509da559b170355b88154dfb638bfe051ee169
STG Security Advisory: An input validation flaw in ZeroBoard can allow malicious attackers the ability to run arbitrary commands with the privilege of the HTTPD process, which is typically run as the nobody user.
0c9e35a9c275bc19120772f641e5b82ca15d9b4c4e3661ccf564440202b8c080
Horde 3.0 contains two XSS attacks that can be exploited through GET requests. Once exploited, these requests could be used to execute any javascript commands in the context of that user, potentially including but not limited to reading and deleting email, and stealing authentication tokens.
74a66b7743cd681267539641ac2b61777f2dca3586fbe4f9c385f6dd94d19edf
Technical Cyber Security Alert TA05-012B - The Microsoft Windows HTML Help Activex control contains a cross-domain vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary commands or code with the privileges of the user running the control. The HTML Help control can be instantiated by an HTML document loaded in Internet Explorer or any other program that uses MSHTML.
f949ff7007b0bc2ee900d61b80429cf7743c36db3f2cad18ce6f549fbc6b9554