eFiction versions 3.1.1 and below suffer from remote file inclusion vulnerabilities.
b84f9bc1af3543e29c87352aa8e38c44310c9e8a42a12648dae281476d637eb8
webSPELL versions 4.01.02 and below remote SQL injection exploit.
7c807c519d7546a867aa112ace64dccde86e27c9a74c12c96c1630f57b2f037c
Snort version 2.6.1 DCE/RPC Preprocessor remote buffer overflow denial of service exploit.
da1bc87a6c602c32578a4597492e36d27fd77a4063f944c9e22bf11fdc35da81
JBroFuzz is an OWASP Project that emerged from penetration testing. It deals with fuzzing stateless network protocols such as HTTP, SOAP, XML, LDAP, etc. This version is the source code release.
de302e09f1d8a0aa5d3fa554801d2cc354e65d09cf41bf79b57a9fa465675582
JBroFuzz is an OWASP Project that emerged from penetration testing. It deals with fuzzing stateless network protocols such as HTTP, SOAP, XML, LDAP, etc. This version is the source code release.
2831a13b234e323bfa47bf6adacf11934e18aae6d474ab9f88f7ad32982b3aac
Pics Navigator is susceptible to a directory traversal flaw.
22365dcfa2b91457530a4cdf15d896a826c758cbf6841b973dff2018ecca8527
There is an interesting vulnerability in how Firefox handles bookmarks. The flaw allows the attacker to steal credentials from commonly used browser start sites.
21a72e3c2e3f73ba1fa951e5bf911498d17a63954a83b0046a2309ac71528a4b
iDefense Security Advisory 02.16.07 - TrendMicro's ServerProtect product uses a web interface which runs on port TCP 14942 to configure the product. This interface is protected with a user configurable password. Upon successful login, a cookie is set with the name 'splx_2376_info' and a valid session id as its value. The ServerProtect web application suffers from a design error vulnerability in its authorization checking routines. Attackers can gain full access to the web application by requesting any internal page while supplying their own 'splx_2376_info' cookie with an arbitrary value. iDefense has confirmed this vulnerability in Trend ServerProtect v1.3 for Linux. This vulnerability is not present in the Windows based versions of Server protect.
7526f737f4d486bbd52cceb0d0f0278593c220859fda585bc67acd98645d1085
Magic News version 1.0.2 suffers from cross site scripting and remote file inclusion vulnerabilities.
4384582c0cd6afca897b34ba556c67c60dfd534b237664b61bde5139c572ac62
Mandriva Security Advisory - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel. A double free vulnerability in the squashfs module could allow a local user to cause a Denial of Service by mounting a crafted squashfs filesystem. The zlib_inflate function allows local users to cause a crash via a malformed filesystem that uses zlib compression that triggers memory corruption. The key serial number collision avoidance code in the key_alloc_serial function in kernels 2.6.9 up to 2.6.20 allows local users to cause a crash via vectors that will trigger a null dereference. The provided packages are patched to fix these vulnerabilities. All users are encouraged to upgrade to these updated kernels immediately and reboot to effect the fixes.
fa3164508ead23714d065780c1d3952998280e75fa1b5ed525adc60dabceb4f8
phpTrafficA version 1.4.1 is susceptible to a local file inclusion vulnerability.
c827b707796dd41d1881da032e4f9795fe1176fa2625f3f6eb0b81e46293e1cc
Call Center Software version 0.93 is susceptible to a cross site scripting vulnerability.
22f055d083af87eb36eefdc65c30e70c2ac66974c838440895210d0c279c1baf
Games developed by SimBin suffer from a denial of service flaw where a UDP packet of zero bytes sent to the server disconnects all clients.
fa5e287f5b93583af9eab52af614b8dc703f1025f7cf7aec03ff410c09fbf9f7
Connectix Boards versions 0.7 and below privilege escalation and remote code execution exploit.
8742c336adf7d155a3f10103baaf50e551901f676c5f3fbd554cce9517ea8658
Cisco Security Advisory - The Cisco Secure Services Client (CSSC) is a software client that enables customers to deploy a single authentication framework using the 802.1X authentication standard across multiple device types to access both wired and wireless networks. A lightweight version of the CSSC client is also a component of the Cisco Trust Agent (CTA) within the Cisco Network Admission Control (NAC) Framework solution. These products are affected by multiple vulnerabilities including privilege escalations and information disclosure.
eb78c56a832abfabd061e6ef8eea55e0f5e27cfc9bf39f65d5b4f45509d7cd8b
Cisco Security Advisory - Certain Cisco Unified IP Conference Station and IP Phone devices contain vulnerabilities which may allow unauthorized users to gain administrative access to vulnerable devices.
d727a0e3104991ebda241524fa3aaa7e93e4e5eb96e8a4ff615cf9e870411a6c
Ubuntu Security Notice 424-1 - Multiple buffer overflows have been discovered in various PHP modules. If a PHP application processes untrusted data with functions of the session or zip module, or various string functions, a remote attacker could exploit this to execute arbitrary code with the privileges of the web server. The sapi_header_op() function had a buffer underflow that could be exploited to crash the PHP interpreter. The wddx unserialization handler did not correctly check for some buffer boundaries and had an uninitialized variable. By unserializing untrusted data, this could be exploited to expose memory regions that were not meant to be accessible. Depending on the PHP application this could lead to disclosure of potentially sensitive information. On 64 bit systems (the amd64 and sparc platforms), various print functions and the odbc_result_all() were susceptible to a format string vulnerability. A remote attacker could exploit this to execute arbitrary code with the privileges of the web server. Under certain circumstances it was possible to overwrite superglobal variables (like the HTTP GET/POST arrays) with crafted session data. When unserializing untrusted data on 64-bit platforms the zend_hash_init() function could be forced to enter an infinite loop, consuming CPU resources, for a limited length of time, until the script timeout alarm aborts the script.
197e3fe41c3837aae3b310eebfbc6f6a0ad763a435fd4e78c72519ae8cd351f0
Nabopoll suffers from a blind SQL injection vulnerability.
6b96a7e362a3d63ef3463228bc2c623dbfe83a1d947a93623af1cc4bcfcb172f
Mandriva Security Advisory - Gnucash versions 2.0.4 and earlier allow local users to overwrite arbitrary files via a symlink attack on the (1) gnucash.trace, (2) qof.trace, and (3) qof.trace.[PID] temporary files.
a58312ea11bca49f80632cb080975f3666c49fff60f447bae1c065dca11d66b2
Mandriva Security Advisory - A format string flaw was discovered in how GnomeMeeting processes certain messages, which could permit a remote attacker that can connect to GnomeMeeting to potentially execute arbitrary code with the privileges of the user running GnomeMeeting.
52d6605509a1caaef0f6e031f119d47bda0ea217efee8fee93ffb4a0a12a01ea
Mandriva Security Advisory - A format string flaw was discovered in how ekiga processes certain messages, which could permit a remote attacker that can connect to ekiga to potentially execute arbitrary code with the privileges of the user running ekiga.
26d6aaa78c29000b479ee56a732674724a936148245f9bba06b92706812a7728
Whitepaper discussing a serious vulnerability in Google Desktop. The attack is composed of web-application security flaws found in Google Desktop along with exploitation of Google Desktop's tight integration with the Google.com website.
0d0fe93a2dd71d7872267488cb64152eb357a94750078e6b22fbba7faac2a033
FlashGameScript version 1.5.4 suffers from a remote file inclusion vulnerability.
064ccba98cd0a32c7338a6e70b3ca2aa2fe96c839e528b455427da783357d108
SendStudio versions 2004.14 and below suffer from a remote file inclusion vulnerability.
8111e92a394b4b0a345bdb53fc3dc6459a98e7cde4417b3a0ea688fe8252e137
It appears that /bin/ls has slipped into the linux-ftpd distribution for Debian as setgid 0. This could possibly be used to leverage root group access.
9a2c4c72d6921d08161dd1e56bc5e49f3512f537413ccb2c789a4aa74343f336