Eudora Qualcomm WorldMail 3.0 IMAPd Service 6.1.19.0 is vulnerable to a buffer overflow via a specially crafted IMAP requests. A remote attacker could issue the vulnerable command followed by malicious code to execute arbitrary code or lead to a denial of service.
badbb644a68c91d11ddebdea94182dc435fcdb323c53e5e4efbf62318cffef7d
Multiple vulnerabilities has been identified in MailEnable, which may be exploited by remote attackers to cause a denial of service, or could lead to remote execution of code. This issue is due to an error in the IMAP service that does not properly handle specially crafted requests. MailEnable Enterprise Edition version 1.1 and MailEnable Professional version 1.7 are affected.
481ca76c4215db7557b60a4a2e982228271b39ec4c72acf01ed9973fc07a5a9e
Metadot versions 6.4.4 and below suffer from a stale variable issue that allows users to gain administrative privileges.
cf7d121b03dc61261a92e45cbee18b0167a6a6a3889d56781bd37a0e30fea7fa
LiveJournal is susceptible to a javascript inclusion flaw.
5ee1244723c6ee9a9237b7fe5f35b4e70c7c5c050a72fc882ab9c53b4cac9ddf
HP Security Bulletin - A potential vulnerability has been identified with HP-UX systems running WBEM Services. The vulnerability could be exploited remotely to create a Denial of Service (DoS).
65f0da92def2193320fac8708f6e31a614f0787fd037cad938a4be6bf8c78e23
Metasploit exploit for a remote buffer overflow that exists in the MailEnable Enterprise 1.1 IMAP EXAMINE command. This vulnerability affects MailEnable Enterprise 1.1 without the ME-10009.EXE patch.
32ff7a89101f26206751b513c937584a52058c2d9de29807a446083ec6427bd4
Python exploit for a remote buffer overflow that exists in the MailEnable Enterprise 1.1 IMAP EXAMINE command. This vulnerability affects MailEnable Enterprise 1.1 without the ME-10009.EXE patch.
2aa22f6b90d94adeab514c49934be2084dd51651d81239a49cd2c99a68e85f55
A remote buffer overflow exists in the MailEnable Enterprise 1.1 IMAP EXAMINE command, which allows for post authentication code execution. This vulnerability affects MailEnable Enterprise 1.1 without the ME-10009.EXE patch.
5d7e90c97562012dbbe25f0619abebad7142aa518eb5388cad9554f74af3d76c
Further research has been done regarding jumping attacks in regards to VLAN and PVLAN implementations.
5eacd74b20fa29cd8523bbbc4c935badc261d6cbbf5fa11ca8dfc4c91dde2a7b
EIGRP version 1.2 suffers from a replay condition due to a failure of verifying the MAC.
c48f28c562e3d9f1f585948e20f1f77f59a7f04005ba898f4684782ffa1000f5
EIGRP version 1.2 suffers from a denial of service condition when employing the Goodbye Message.
056dc577bcdaf53d607fc102dffe98805b23c3257a999f40f2d9f76070b3da74
Two Microsoft Excel xls files that demonstrate null pointer bugs.
96050cef577d9f575ebe890633d9a49e6d24350ee07343b4a30ed72e6c205d94
Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here.
323e62471d224cf33bbcfa7877ed3586a4fc510a4e23843b1d52e28eb98f8bfc