PHPECard versions 2.1.4 and below suffer from a remote file inclusion vulnerability in functions.php.
6d9e27b11a3c56f57bff35f85ddd6080fa6b0ad9b0ebaaded8a37530c60bc221
Streamripper versions 1.61.25 and below HTTP header parsing buffer overflow exploit.
a01cbeda0ca3af143a437e3f105f122b5ca65dd6fed028ccf124d6b599630770
Streamripper versions 1.61.25 and below HTTP header parsing buffer overflow exploit.
7440e6a91bcded4295a4c50ace3d3c38748846ddf5dae87b1eeb2f796fecdb4e
forkbomb shellcode in 7 bytes for Linux x86.
23440b94b9450f9c5365058d3cfcab1a10dbca22563358fd62e4d5e5d0527475
exit() shellcode in 5 bytes for Linux x86.
76576c3d47bad32ea98c4335a7cbff570702b9346536243936ca480160416806
Portail PHP mod_phpalbum version 2.15 suffers from a remote file inclusion vulnerability.
33fc4c651cdac8ce82ac464c4fc4ef7b21c19708694adccc0459b24a5cd72d8b
CYBSEC Security Advisory - A remote buffer overflow vulnerability has been identified in Microsoft Windows DHCP-Client Service. Affected products include Microsoft Windows 2000 SP4 and below, Microsoft Windows XP SP2 and below, and Microsoft Windows 2003 SP1 and below.
8272a8546f4126084dc45255ec9b3853da45de6ef9b21be144a6b6b8450aad68
Debian Security Advisory 1161-1 - Several security related problems have been discovered in Mozilla and derived products like Mozilla Firefox.
f7ab4b5f1233399b5b1b18806a7f4b42c8b5aa932b148f2b3198a7f90e992de9
DUPoll version 3.1 suffers from a direct database download flaw.
7fbedcd8adf34eb6128cf1dfa090cfdb841678947048166f064cff17b132aa6a
JS ASP Faq Manager version 1.10 suffers from a SQL injection flaw.
617517b888c6ede31fdbd0187d9b7ce79694a321412c61bea683e423bac86771
b2evolution versions 1.8 and below suffer from a remote file inclusion vulnerability.
973b391753d8d7bc9981181ba0bffd682514daeb8011bd88f987cbbb3838539e
The admin1953.php file included in LinksCaffe version 3.0 allows for direct access giving an attacker full administrative privileges.
240cbbbde655ba594f56dcfe2c5733dc3ff3c9ab647a203bcf9ad913eb14fa16
Mandriva Linux Security Advisory MDKSA-2006-155 - Multiple buffer overflows in ImageMagick before 6.2.9 allow user-assisted attackers to execute arbitrary code via crafted XCF images. Multiple integer overflows in ImageMagick before 6.2.9 allows user-assisted attackers to execute arbitrary code via crafted Sun bitmap images that trigger heap-based buffer overflows. An integer overflow in the ReadSGIImage function in sgi.c in ImageMagick before 6.2.9 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via large bytes_per_pixel, columns, and rows values, which trigger a heap-based buffer overflow.
17ea48c30ae262993a867073c259c4ec7c7c700fdadae830130ae4309c554f4c
Gentoo Linux Security Advisory GLSA 200608-28 - The sscanf() PHP function contains an array boundary error that can be exploited to dereference a null pointer. This can possibly allow the bypass of the safe mode protection by executing arbitrary code. Versions less than 5.1.4-r6 are affected.
cccbe3afd18c7d863de2d5ac6ae3036834ad166c626106dba2a8fcf0470a4f0b
Gentoo Linux Security Advisory GLSA 200608-27 - In November 2005, Zone-H Research reported a boundary error in the ktools library in the VGETSTRING() macro of kkstrtext.h, which may cause a buffer overflow via an overly long input string. Versions less than 3.4.0-r1 are affected.
0e764a0a471a253079be6c1c295bc8726abd6b28b81677211dba782958f13438
Gentoo Linux Security Advisory GLSA 200608-26 - The following vulnerabilities have been discovered in Wireshark. Firstly, if the IPsec ESP parser is used it is susceptible to off-by-one errors, this parser is disabled by default; secondly, the SCSI dissector is vulnerable to an unspecified crash; and finally, the Q.2931 dissector of the SSCOP payload may use all the available memory if a port range is configured. By default, no port ranges are configured. Versions less than 0.99.3 are affected.
0572c83b05e151adf70e50709ae881d02c15e77c2c8c3d9d1d7d1eee48bb4af5
This Metasploit module exploits a code execution vulnerability in the IBM eGatherer ActiveX buffer overflow.
6280365f18cd390c0a7ec483822ae21f3d8ac6a2a269541e0bb334fa7e54938e
HLStats version 1.34 suffers from a cross site scripting vulnerability.
a63c979b78eb39b37d1ac30865f8a51828daf62b4e7c17f60122c5610af6fde8
Debian Security Advisory 1160-1 - Several security related problems have been discovered in Mozilla and derived products.
fc3a5dd2574ba1ca4a9b000ea22fd04724ecd0339c2252f98f22547fae94f2a1
Mandriva Linux Security Advisory MDKSA-2006-154 - The libXm library in LessTif versions 0.95.0 and earlier allows local users to gain privileges via the DEBUG_FILE environment variable, which is used to create world-writable files when libXm is run from a setuid program.
fcd62e9b6c19b5611928bdffa7ac17685229cc986efaddb82685d7f16727d734
Mandriva Linux Security Advisory MDKSA-2006-153 - A stack-based buffer overflow in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050721 allows attackers to execute arbitrary code via a .c file with crafted inline assembly code. A buffer overflow in getsym in tekhex.c in libbfd in Free Software Foundation GNU Binutils before 20060423, as used by GNU strings, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a file with a crafted Tektronix Hex Format record in which the length character is not a valid hexadecimal character.
20bae66b913b708c81f4d4d713ab9094b1a1cd129693db985f0f4ac8827cbe5c
Symantec Security Advisory - A connection from a SAP-DB/MaxDB WebDBM Client to the DBM Server causes a buffer overflow when the given database name is too large. This can result in the execution of arbitrary code in the context of the database server. Affected version is SAP-DB/MaxDB 7.6.00.22.
f252047e0f68c231dc50e1773e17de6610f34d7f5aae0c80053dedb4165a40e1
Secunia Security Advisory - Secunia Research has discovered some vulnerabilities in CJ Tag Board, which can be exploited by malicious people to compromise a vulnerable system.
6924ab6d73ba9dd6c89c24eb74e6243a40c3055aab513b8e2c640e3f87e5edd7
Secunia Security Advisory - Debian has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks and potentially compromise a user's system.
783321879be5b45c78347b04b695cc8497d1a26a4f636334b26f43b128aaa55b
Secunia Security Advisory - kefka has discovered a vulnerability in HLstats, which can be exploited by malicious people to conduct cross-site scripting attacks.
687b9d79c1c77f6f613aad496d23513b0ab51ee4bb0aa367322c5205398bc2de