FlatFrag versions 0.3 and below suffer from a null pointer crash and buffer overflow bugs.
b17aa4a7bd430baf6ac7f67cd0fc643a3ae7ec2004b257f0232b28242efd73a5
Proof of concept exploit code for Asus Video Security versions 3.5.0.0 and below which suffer from buffer overflow and directory traversal vulnerabilities.
e1656c9207376a311c89ac40c7073ba34422ca2e45a6f870c20906639ce4bcab
Asus Video Security versions 3.5.0.0 and below suffer from buffer overflow and directory traversal vulnerabilities.
31c8cba4b6bbf8207d5d7b89377235207fbf0353115ece6b8e9383a5e563dd62
NeroNET versions 1.2.0.2 and below suffer from a directory traversal vulnerability. Details provided.
caf6bc98000a0f796df469d019b316414cc7649fc8e6ec50faadbd0864fe16d4
The F-Prot engine fails to decompress ZIP files that have a version header greater then 15. The consequence is that the F-prot Engine is unable to scan the virus/malware inside and consequently flags it as harmless. If used as an Email Gateway solution the offending Emails will slip through.
84a0def1156ec4829f01d470e51e93f26500ba11e4fc5b0989eaa0d50dedd25a
Proof of concept exploit for the buffer overflow vulnerability discovered in Glider collect'n kill version 1.0.0.0.
4e2387f9f96eccfc1d6cfed3966253699994fefaa69e6aac9e26929e2822910e
Glider collect'n kill version 1.0.0.0 suffers from a buffer overflow vulnerability.
ea7f6c03934c947d2c9eb685d20eb6215aab00b0a4cef07448481cfc645aecf9
Proof of concept code for various format string and buffer overflow vulnerabilities discovered in Scorched 3D versions 39.1 and below.
ac5a69343e7732a11d481f3c963e0df1b98001ec0a08e1ce3c466109ad9c7ed1
Scorched 3D versions 39.1 and below are susceptible to various format string and buffer overflow vulnerabilities.
bc56360702fad8ca74f427a64e46ad227956f56e76088dfe8138c9b65b0d874b
Client related exploit for a buffer overflow discovered in the handshaking process for GO-Global for Windows versions 3.1.0.3270 and below.
0a93f8ce4862b60ad91ef33c6e78063804ef1699375439f328b4a009574a4de6
Server related exploit for a buffer overflow discovered in the handshaking process for GO-Global for Windows versions 3.1.0.3270 and below.
fb10be242375f9a2a4c03179abf563a311fcef3db9d8e4d6f7e77199562d9682
Both the client and server software for GO-Global for Windows versions 3.1.0.3270 and below suffer from a buffer overflow vulnerability during initial handshaking.
92ccb7d9f8eaccbc239d7e8de2b70151c7e55b67211764b92e4c427f6381a675
SCO Security Advisory - store.c in Squid 2.5.STABLE10 and earlier allows remote attackers to cause a denial of service (crash) via certain aborted requests that trigger an assert error related to STORE_PENDING. The sslConnectTimeout function in ssl.c for Squid 2.5.STABLE10 and earlier allows remote attackers to cause a denial of service (segmentation fault) via certain crafted requests. Squid versions 2.5.STABLE10 and below, while performing NTLM authentication, do not properly handle certain request sequences, which allows attackers to cause a denial of service (daemon restart).
f0587c8f5d8323fec288e1f850d67e518ab135abbba7b94636cf8b47c40315bc
Gentoo Linux Security Advisory GLSA 200511-02 - Some packages may introduce insecure paths into the list of directories that are searched for libraries at runtime. Furthermore, packages depending on the MakeMaker Perl module for build configuration may have incorrectly copied the LD_RUN_PATH into the DT_RPATH. Versions less than 1.8.33-r2 are affected.
da21259f3a7f5873795072ec205fce9a7d4000a415269258bbb5ae31fa627aed
Gentoo Linux Security Advisory GLSA 200511-01 - Steve Kemp discovered two format string vulnerabilities in the gda_log_error and gda_log_message functions. Some applications may pass untrusted input to those functions and be vulnerable. Versions less than 1.2.2-r1 are affected.
96350181759339ae2980e00ac7141454ac9a7ea6b804d960a5d704821ca333da
Cisco Security Advisory - The Cisco Internetwork Operating System (IOS) may permit arbitrary code execution after exploitation of a heap-based buffer overflow vulnerability. Cisco has included additional integrity checks in its software, as further described below, that are intended to reduce the likelihood of arbitrary code execution.
881026bd2ba304b8be6867b98c5bc510f3ac40e1bd1f0c15baf6beaa67eddfd2
Cisco Security Advisory - Cisco Access Points operating in Lightweight Access Point Protocol (LWAPP) mode may allow unauthenticated end hosts to send unencrypted traffic to a secure network by sending frames from the Media Access Control (MAC) address of an already authenticated end host.
75f2d063771519666ca620d594b1c821210c5573f21322d84f066b5046f89be4
Simple PHP Blog versions 0.4.5 and below are susceptible to multiple cross site scripting attacks.
d4d034b85b65608e369d70db521ab6f2b868bf1dd511e823e402ce734243ac24
HP Security Bulletin - A potential security vulnerability has been identified with HP OpenVMS. This vulnerability could be exploited by a local non-privileged user to cause a Denial of Service (DoS) by crashing the system.
1e73b4f35fab3dce754fb692a515ba18c1b2ef1334ca8c92d7769ca4dc8ab4d9
Debian Security Advisory DSA 880-1 - Several cross-site scripting vulnerabilities have been discovered in phpmyadmin, a set of PHP-scripts to administrate MySQL over the WWW.
cf5ce4c8ac3cb403aa144c8ff2cef34d3b3e9d870d0a11700c0fbdf28c99167d
Sambar Server 6.3 BETA 2 is susceptible to cross-site scripting attacks under the proxy configuration section.
5957cba9ec9ed58ee99046652d72a489b94e91e3f654c2ab2747439b3f5a059d
Debian Security Advisory DSA 879-1 - A bug in gallery has been discovered that grants all registered Postnuke users full access to the gallery.
fcb5b8330646bd9cddeb7fce4c0ecdae04807f58bed6c22b696594035202990f
Secunia Security Advisory - Some vulnerabilities have been reported in Red Hat Stronghold for Enterprise Linux, which can be exploited to gain escalated privileges, cause a DoS (Denial of Service), bypass certain security functionality, gain knowledge of sensitive information, and compromise a vulnerable system.
0b365fea7239d98b608c1bc157b87bc032b9e7b04d4cabd90e6adb2ab10bafac
Secunia Security Advisory - h4xorCrew has discovered a vulnerability in Sambar Server, which can be exploited by malicious people to conduct cross-site scripting attacks.
7d489c5a2cd2412654078270873a01d4eb8e5db261692c69f75d31cdfb7ab3b4
Secunia Security Advisory - Debian has issued an update for phpmyadmin. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information.
0378cb46d7c7cc818becb7af542518d9aff5787487c0f981ffbca7b145d7e2d2