Netscape Navigator is vulnerable to trivial, remote buffer overflow attack when viewing prepared html.
5e00530a07bbcee85e83bc7a5a9c024d8a58a576c2617200505e8c4098a74b86
The Siemens HiNet LP 5100 IP-phone is vulnerable to a buffer overflow when the GET request method is used with a large request size. Vulnerability can lead to a partial or complete crash of phone services.
c2c3fa55e9b3b0ea73526601681a57f6551de6e2ac82d72450d780945bdf8d14
Delphis Consulting Plc Security Team Advisory DST2K0042 - The following vulnerability in Web+ Application Server under Linux has been discovered. Severity: High. If the default example scripts are installed it is possible to execute/read any file which Web+ user (default is 'nobody') has access to using the Web+Ping example.
10156497169d749f0c7bbb71908785ef25e60f8c034c4b9d631b5d3ebeb6ffdd
Delphis Consulting Plc Security Team Advisory DST2K0037 - It is possible to bypass the quotas imposed by QuotaAdvisor by utilizing data streams alternative to the default.
1ed58d9fff73920bf7e048bdf48b1e78c46ea96d5ee17b5f33fc69a1e9e5dde5
DST2K0032: Multiple Issues with Talentsoft WebPlus Application Server. Delphis Consulting Internet Security Team (DCIST) discovered low to medium severity vulnerabilities in Webplus under Windows NT.
ffc1c16883ca0443a77b4ee6a8af25d3b21541d176140bab9d1b83fa8a7d5a3b
INND/NNRP remote root overflow. Overflow occurs in the From: field. Affects INND/NNRP versions prior to 1.6.X. Author Unknown.
f582b0dbe582c4971e25beb245771601cc1da7879d6ed9a6db889e574050df2a
Remote root overflow for linux rpc.statd SM_UNMON_ALL vulnerability. Author Unknown.
0fa89b935371a6e8bab5da0f4bbeb45ce6c63d141c65937a71cff963492e018c
GDM Remote Exploit based on the original bug found by Chris Evans. Vulnerable version : gdm-2.0beta2-23 ( gnome and single version ). Not Vulnerable : 1.0.0.35. Vulnerable Platforms : RedHat 6.0-6.2.
364b987dc6db265a353592620b92a038c7f3f9dac015ffe2adf1d4b0ff39fb4d
FlagShip (from Red Hat Application CD) is a Database Development System for xBase based applications on nearly all Unix brands. Problem: /usr/bin/FSserial is world-writeable! We can replace it with an trojan and trick root to execute it. OS affected: Red Hat 6.0.
19ec639c4df2decbde6f63cfae923d411bbd61a95d9c9e35e587b731bab241fe
Q-POP 2.53 Remote Overflow.
14f6333c3c41bb98f3702483bc222cd3f6e4d37561678fe062e9b9603a08b0c4
Sco 5.0.4 local overflow using xload.
26c0673ca3e5ed50a659abc51601d26e465b764f32a72fccf73af3db0b9d4c2d
Remote root exploit for wu-ftpd on SCO unix. Based on: ADMwuftpd.c from duke.
3add4443742c9fcacd8dc6325d153bd5568353359be857dbe2a37fc3e90a1fc0
Linux wu-ftpd - 2.6.0(1) (tested on RH6.2 wu from rpm).
14dff92e74767741dadcd3056c2c5592a7e7d2e104e9a68e56325ed023e7afbe
Msql local overflow. Author Unknown.
81796ff3a161a4cde169f1cb7ef819ce2c73aa637619778652826eaeb3db1e5d
Solaris 7 Xsun(suid) local overflow - Solaris 2.7/(2.6?) x86 sploit no sparc code.
e14c2c1b5cb8a44823088162f42622b3a6b9199ed68b1d7dde4508dc148dcd0d
Scounix httpd Remote Exploit.
2c39cd377679ecd20589d8a506037fa51a0ab54473f32e86a9cb4167b478f1b9
QPOP 3.0beta AUTH remote root stack overflow (linux x86 version)
905a3984c06a90ecd9866f95685473b2f7637effc7d820cf853eac4b8f2ce274
Local exploit for cxterm 5.1-p1. Tested on: RedHat 5.2/6.0, Slackware 3.6.
e93169ce12af85a371410989f4a2cd00e8d61b6dd974524f5580d3fb1f40e964
IMAPrev1 12.2xx exploit (lsub bug). Slackware 4.0 remote overflow.
a840f6b4a1f6f8925d0503bb5b5f670d7c5af5465aa574892d4e1771507ffe24
WinShellCode. win32 portbinding shellcode.
4359c1d127a45198387c46cccc11eb6234af6fa024f2e4666bbbb918a9669a75
Atstake Security Advisory - PalmOS Password Retrieval and Decoding. Severity: Moderate. PalmOS offers a built-in Security application which is used for the legitimate user to protect and hide records from unauthorized users by means of a password. Passwords can easily be obtained and decoded allowing an attacker to access all private records on a Palm device.
605b134f485bfa1453bdfd428bc29ebf0cd76aa76b8b91cd4a84f25e95ed0c2d
CORE SDI Security Advisory - SCO Unixware 7 default installation includes scohelp, an http server that listens on port 457/tcp and allows access to manual pages and other documentation files. The search CGI script provided for that purpose has a vulnerability that could allow any remote attacker to execute arbitrary code on the vulnerable machine with privileges of user "nobody".
f680f55bfc32747ee179bacde9f8d0a084560d975d1acee0c089638742207f41
IP-Generator is a program that can be used for the creation of long ip lists that are necessary for various utilities which require said listings.
54cabd7bfec1bbeb8519e72bf2ff1bae9bbad62a28443fa345ea7df358a26959
FreeBSD Security Advisory - catopen() may pose security risk for third party code. The catopen() function did not correctly bounds-check an internal buffer which could be indirectly overflowed by the setting of an environment variable. A privileged application which uses catopen() could be made to execute arbitrary code by an unprivileged local user. The catopen() and setlocale() functions could be made to use an arbitrary file as the source for localized data and message catalogs, instead of one of the system files. An attacker could create a file which is a valid locale file or message catalog but which contains special formatting characters which may allow certain badly written privileged applications to be exploited and execute arbitrary code as the privileged user. Patches are available.
7cb98675a822bc8edd2fd3f6bd3b7b4a6cf3569063738705e6b569c0c74c79bf
NDiff compares two nmap scans and outputs the differences. It allows monitoring of your network(s) for interesting changes in port states and visible hosts. NDiff should be useful to network administrators, security analysts, and other interested parties who need to monitor large networks in an organized fashion.
9972d8b39599589019567236844c30ea8201f40105147f24b065d8b0658dd263