Cisco Security Advisory - Cisco routers and switches running Cisco IOS\256 or Cisco IOS XR software may be vulnerable to a remotely exploitable crafted IP option Denial of Service (DoS) attack. Exploitation of the vulnerability may potentially allow for arbitrary code execution. The vulnerability may be exploited after processing an Internet Control Message Protocol (ICMP) packet, Protocol Independent Multicast version 2 (PIMv2) packet, Pragmatic General Multicast (PGM) packet, or URL Rendezvous Directory (URD) packet containing a specific crafted IP option in the packet's IP header. No other IP protocols are affected by this issue.
ce57524847e83d7482bc8e420b9dbb9e787fa20de112c186a3841b558a674089
Cisco Security Advisory - Processing a specially crafted IPv6 Type 0 Routing header can crash a device running Cisco IOS software. This vulnerability does not affect IPv6 Type 2 Routing header which is used in mobile IPv6. IPv6 is not enabled by default in Cisco IOS.
696980d0085a820ddb8b1c1413f1abf3258d882ba19edba8b76a1042e118b3bb
Cisco Security Advisory - The Cisco IOS Transmission Control Protocol (TCP) listener in certain versions of Cisco IOS software is vulnerable to a remotely-exploitable memory leak that may lead to a denial of service condition. This vulnerability only applies to traffic destined to the Cisco IOS device. Traffic transiting the Cisco IOS device will not trigger this vulnerability.
ab4319057c969bd970a1b91975c755186666cbba2631863f0d27222d5be9eff7
CA BrightStor ARCserve Backup for Laptops and Desktops contains multiple overflow conditions that can allow a remote attacker to cause a denial of service, or execute arbitrary code with local SYSTEM privileges on Windows.
6e6e8672248a7e1c4d803e9bf66b4054b05795508a899203c5e4ade01aafd269
Secunia Research has discovered a vulnerability in Sienzo Digital Music Mentor, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the NCTAudioFile2.AudioFile ActiveX control when handling the "SetFormatLikeSample()" method. This can be exploited to cause a stack-based buffer overflow by passing an overly long string (about 4124 bytes) as argument to the affected method. Successful exploitation allows execution of arbitrary code when a user e.g. visits a malicious website.
4a145b830ea50bf86d15f10c5b8c02dcd4cd063d843372d236584a2c2c9882cc
Secunia Research has discovered a vulnerability in NCTAudioStudio, NCTAudioEditor, and NCTDialogicVoice, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll) when handling the "SetFormatLikeSample()" method. This can be exploited to cause a stack-based buffer overflow by passing an overly long string (about 4124 bytes) as argument to the affected method. Successful exploitation allows execution of arbitrary code when a user e.g. visits a malicious website.
361d252a18d1dfb801d29ee39ce252a8f63bbafaf403df2a5e0c96f7d912e12f
SUSE Security Announcement - This update fixes several format string bugs that can be exploited remotely with user-assistance to execute arbitrary code. Since SUSE Linux version 10.1 format string bugs are not exploitable anymore.
6b2bdc550586e6a5f63c1230ceb748d9bd167167f804ebd60469a4d9b58e1adc
IP Phones based on the Centrality Communications/Aredfox PA168 chipset suffer from a weak session management vulnerability. Exploit included.
1821bfb5f8cd756cd89b28517356ba2347b103a4fe336db4aabb7a4ab85a7751
Website Baker version 2.6.5 suffers from a SQL injection flaw.
bccba3281ef63a3c7c7d939ddecd7070e841c63eae45a7416420722bcdf47fa2
Secunia Security Advisory - Secunia Research has discovered a vulnerability in NCTAudioStudio, NCTAudioEditor, and NCTDialogicVoice, which can be exploited by malicious people to compromise a user's system.
a5b9d50edc28b580acef93165a66744916fe7a6f31a5f6c406b3e64f1bbc8f66
Secunia Security Advisory - Secunia Research has discovered a vulnerability in Aurora Media Workshop, which can be exploited by malicious people to compromise a user's system.
efd98193c67c7156670f5f854731c07ca7e09096900de77d9723d746dd7e0457
Secunia Security Advisory - Secunia Research has discovered a vulnerability in various J. Hepple products, which can be exploited by malicious people to compromise a user's system.
9608ed455b8fa650216146792772624dcaa9db25d1dffba59cf60fea601bb128
Secunia Security Advisory - Secunia Research has discovered a vulnerability in iMesh, which can be exploited by malicious people to compromise a user's system.
547af6e111ea97d136ca0c0e7f8e22a9f6dd2c0a459d6cc83284e6efb8478cd4
Secunia Security Advisory - Secunia Research has discovered a vulnerability in two Quikscribe products, which can be exploited by malicious people to compromise a user's system.
177c00842c4e8b791e78c5687bbbc76ea2fe5ba9da619f51f6eb4bccb6b28799
Secunia Security Advisory - Secunia Research has discovered a vulnerability in various R.M. de Boer Software products, which can be exploited by malicious people to compromise a user's system.
7f104246042fabe9b701c5a83f1068c2f4d022db7e0a292b9c15c39607bc3b6d
Secunia Security Advisory - Secunia Research has discovered a vulnerability in CDBurnerXP Pro, which can be exploited by malicious people to compromise a user's system.
4e297601def34d17be01e77bf231b65440b5d328be64de82455f6e7637e54885
Secunia Security Advisory - Secunia Research has discovered a vulnerability in Sienzo Digital Music Mentor, which can be exploited by malicious people to compromise a user's system.
3fd8d55dd3db53d4f2b55e8b782bea35d2a08590b096c1ef47cf893eaf574626
Secunia Security Advisory - Secunia Research has discovered a vulnerability in MP3 Normalizer, which can be exploited by malicious people to compromise a user's system.
52945a2ab9224dd27556a19694771bb1bbdae431a0374467d689ca8531803701
Secunia Security Advisory - Secunia Research has discovered a vulnerability in various Roemer Software products, which can be exploited by malicious people to compromise a user's system.
68a4e8c950631421655bd282b41152264c2d211522049e2e16e574eff659ccd8
Secunia Security Advisory - Secunia Research has discovered a vulnerability in various Joshua Software products, which can be exploited by malicious people to compromise a user's system.
6dfd15adf0f65fc4aacada23935c2db07b6d0cabb94aa8c7d98a00ff459ebf64
Secunia Security Advisory - Secunia Research has discovered a vulnerability in two Virtual CD products, which can be exploited by malicious people to compromise a user's system.
2a83a875ce847c9caa02d4bca542b9c7ff3ae43118a9d29ab07acd5c4a211fb2
Secunia Security Advisory - Secunia Research has discovered a vulnerability in Cheetah CD Burner and Cheetah DVD Burner, which can be exploited by malicious people to compromise a user's system.
ae92040f1fb09bb2a6a4ad6cf5db7034132217381d2f9a5fafbe69db49cad4ad
Secunia Security Advisory - Secunia Research has discovered a vulnerability in various Mystik Media products, which can be exploited by malicious people to compromise a user's system.
92f53cfce5016d735de797a8f4778f72f41e2c29d2d77a0adc7ba155e8d591ae
Secunia Security Advisory - Secunia Research has discovered a vulnerability in Power Audio Editor, which can be exploited by malicious people to compromise a user's system.
c64eef14989a06d9b9c299ae7ddb0cb7674873df5593190241a6e0f20ab6cfe4
Secunia Security Advisory - Secunia Research has discovered a vulnerability in various DanDans Digital Media products, which can be exploited by malicious people to compromise a user's system.
58da71727d56903bfcd6754aea9fcf5d2cd60ede3adbc6a6f3175421bb23de0f