G-Parted versions 0.14.1 and below suffer from a root privilege escalation command execution vulnerability.
22d59ee6ab3ecbc032151958235d46b8b87c383d2fc085ccae3a73125bc45eb5
A remote buffer overflow vulnerability has been found in ActivePerl PerlIS.dll, affecting Microsoft IIS 4 and 5 servers with ActivePerl 5.6.1.629 and earlier versions installed.
8917c7da229f91182af1d08bb4683f41c970b4a0d38354d7ceb0e73d47c965cc
NSFOCUS Security Advisory (SA2000-07) - A serious flaw in Microsoft IIS 4.0 and 5.0 when handling CGI filenames allows any file on the system to be read and remote command execution, as described in here.
85c25f2dd295eef761bb7ed7766d70fbcfc7d6ba678f8b8cf47e98b2f9c639b7
NSFOCUS Security Advisory (SA2000-09) - EZshopper v2.0 and v3.0 from AHG contains remote CGI vulnerabilities which allow an attacker to get directory listings and sensitive file contents. Exploit URL's included.
26cabffb2d71d094476b9be5255376ed3fa9940c9c2776dc3aa0c73a88675d8a
NSFOCUS Security Advisory (SA2000-08) - Microsoft IIS for Far East Editions File Disclosure Vulnerability. Submitting a malformed URL with a non-ascii character, a different file can be opened and the contents read. Vulnerable versions include IIS 4.0 (Far East Edition) previous to SP6 and IIS 5.0 (Far East Edition). English versions are unaffected. Exploit will be released soon.
18ac62855ee1f46fc88efa8ccb402ebb65f449eb0664a5ce46786c49c83d7b5b
NSFocus Security Advisory(SA2000-04) - A denial of service flaw has been found in the Microsoft Win9x netbios client. An attacker can modify his host file share service and perform DoS attack against a Win9x client that visits it. Windows 95, 98, and 98se are vulnerable.
9236c974af81c4c844db26363d287b64b22ac6b3a14b0d4342716a88acbe836a
NSFocus Security Advisory(SA2000-05) - Microsoft Windows 9x NETBIOS password verification contains a vulnerability which allows an attacker to use a share only knowing the first byte of the password, which can easily be guessed. This is the flaw described in ms00-072 which affects Windows 95, 98, and 98se.
7aef63a9de0679d5b03e709420e8ddace4d85f1bf4c6394a3d8949d58d90ea2a
NSFOCUS Security Advisory(SA2000-03) - A denial of service vulnerability has been found in the IPX/SPX protocol implementation. When a WIN9x host receives a IPX NMPI packet that has the same source and destination machine name of its own, it will be lead to an infinite loop of sending and receiving packets. This attack will consume a large sum of CPU resource of attacked host, causing it to crash.
ee09333c713c3c147526afc9d6f8cea9c39dd915e503348778b1122d7781a015
SA-1996.01.txt
c6c4d1856682d5bf179248b26c5d60c9963b5bb4bfa36fab30f696ff23cdec66
SA-1996.02.txt
194187561e4b812b40241ee73ba4ec2eaa18d2e6e2a13599d87dcd20a05e5274
SA-1996.03.txt
41833f86da7589d94287daa5073319153d6587ce281c37b620f4bf7d050e21fa
SA-1996.04.txt
9739877ec433b66ca021347f39d2aa5aa4b63af913b48cff47c7b722e48b4dc2
SA-1996.05.txt
9f54f002a77bd52b64227ee5e0fe85b5ff801e26d68f741fd34b9c114625e3f3
SA-1996.06.txt
bd44f4cf29e01ef4bfb4b58df2c5adb139cf2f6a0972ce0a86ad71a57d200b5c
SA-1997.01.txt
70896e634d4cce66fe8e7107611f0a3d0964bef89e029e20fd98aa9afd85b5a6
SA-1997.02.txt
b27ad43d9aa61c89a1783c497b76f3073bef9eae8c980596b2cc8c3aa573ac01
SA-1997.03.txt
fdb8dee4a0ff06cbaa4b529859e78219c239f2abaac0e0b89d442bb0059f5c4f
SA-1997.04.txt
8f237646a4ddd57f845a00e30b999b9cedce1ca0b0f34403219b84b4dd6d7236
SA-1997.05.txt
051e1c0b52402c30ab56f76d7da8b4e2d1b47c2d4cb38e75b59ed00332895b37
SA-1997.06.txt
6e18cd23df0bc47daa3a5e25a119c18dee383364ed19210afa819b5c4784f2cc
SA-1997.07.txt
c3f9b2439f13fd002b037a7c7b33414d9579c524e1e22594ceb2d4c15f59e9b6
SA-1997.08.txt
c3dc09a7d823714307835db1ac1adf0ca21a96bc234e09d58dbeaf73b2a01259
SA-1997.09.txt
0d4d584cf05c24a87635e7fefb5b4c24ba8db9aea1d5a5873fba0301101de299
SA-1997.10.txt
d86b41a1ea55481bb6ad86d73739fb65274a58eb4d53e959f346cbb04fc6cfd8
SA-1997.11.txt
8d58fc6869de807ea0908cdd9d6408f8c6320d6446253737f9c67e21f5121306
SA-1997.12.txt
a6529b83f3db11be920f8d4110d64a72d032786614de8a77ed2f03af6af66cf5