Sun Security Advisory - There is a potential buffer overflow in ping which could result in a local unprivileged user gaining elevated privileges.
b9cb02f78c261c989a2fdeb80789457ef8c83270746f25f804814473fe5e0475
IPCop suffers from a cross site scripting vulnerability in proxylog.dat. Version 1.4.1 is affected. Older versions have not been tested.
d59eb12e5bbe5ceef338184b82b1fac9c3a6e988d1838bdfd2258a2389d111e7
It seems that the IPB forums has a password reset feature that allows a disabled account to regain access.
6655bba54cb396d63f885489dbd4592e3de24761f6dc899981b76935d1dd95f4
Brief analysis on the Symb/Cabir-B worm that was written specifically for the Nokia Series 60 mobile phones running the Symbian operating system.
d88a99b49aac9da3d26fb558eb119b553a9571fe97443460ff28b76b9d69d758
Remote denial of service exploit for Jana server 2 versions 2.4.4 and below.
a53eb7696fdc2332399b894e113d5bfe7a6f8f00ef949e0c5bdba3fc6cffd92f
Jana server 2 versions 2.4.4 and below are susceptible to denial of service attacks that result in 100% CPU utilization and endless loops.
9ef7c4be53f9b2ccbb5a95ae377c996b29578cde7c5e2c34b38a910a9b7938bb
Secunia Security Advisory - A vulnerability has been reported in FreeImage, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.
6b98f6f0137614044828b08bae004abbe4f9c2796e4773e7cfb0bc2ff20b6a5f
Universal remote exploit for the buffer overflow vulnerability in Mercury Mail 4.01 (Pegasus) IMAP server.
1992e2ec6ee91bec2e209f5d8942e15e93e225cd81bc0a56fc5540e11094d323
Mercury Mail 4.01 (Pegasus) IMAP remote buffer overflow exploit.
63374e92c80843538c8627f6b67f409bd9fb8bb850b2462fd9da4c9129f882a2
CuteFTP Professional version 6.0 suffers from a client side overflow.
3d1365f98ceefb195b9e65563d96258df09207d3b47bda6994de142a33159201
An attacker can change hidden fields to any dollar amount and misrepresent purchases for businesses providing products or services using the PayFlow Link system.
6a59ea388b7c1e8fbdee656f2a3eb197dcb0fc5b6c06ff22eafd48908224ecfb
Remote proof of concept exploit for Orbz versions 2.10 and below which suffer from a buffer overflow in the password field of the join packet.
b7866a8811b382a054ae7fb62572e6e373eb33af3e44cfec542ed5f71f5dca85
Orbz versions 2.10 and below suffer from a buffer overflow in the password field of the join packet.
605ee016d735f2c5fda4cfdac9fb1f4a8b1e1063b3e131c04441e54a78312a10
Remote exploit for IPSwitch WS_FTP version 5.03 that binds a shell to port 4444.
0e9f16d2eb219cb6649d8a93058aceadd447cca259e088bba13b7e2bcf6a5f46
Multiple buffer overflows exist in WS_FTP Server Version 5.03, 2004.10.14. There are four vulnerable commands that can be used to cause these buffer overflows. Three of the vulnerable commands can be used to stop the WS_FTP Server service resulting in a denial of service. The vulnerable commands are SITE, XMKD, MKD, and RNFR.
9489824c23ea54bc66e29683258b34ac29edea9addcf9e869e14e6f8c196a65c
Debian Security Advisory 602-1 - Wait.. No.. what is this? Even more potential integer overflows have been found in the GD graphics library which were not covered by security advisory DSA 589 and DSA 601. They could be exploited by a specially crafted graphic and could lead to the execution of arbitrary code on the victim's machine.
5aa52586a3e7c7fca87c947b2bcf703e4fec57e6bd5e72e8b8687fc94417c86f
A local privilege escalation vulnerability exists with MDaemon 7.2 that allows a user to gain SYSTEM level access.
0bf2ceef32fcac791004f42845f98912b0a3b6b0da97801fcebb9b6068efaee7
Secunia Security Advisory - A security issue has been reported in IberAgents, which can be exploited by malicious, local users to gain knowledge of sensitive information.
4e75086888710dcbf32f71f1e0754079f31eb192ee1d70743d2096698357be80
Debian Security Advisory 601-1 - More potential integer overflows have been found in the GD graphics library which were not covered by security advisory DSA 589. They could be exploited by a specially crafted graphic and could lead to the execution of arbitrary code on the victim's machine.
a912cac2bab61d164be2f9ed1beea7664368eec5f3e72a7cea359b3236f48371
Secunia Security Advisory - Two vulnerabilities have been reported in Groupmax World Wide Web and Groupmax World Wide Web Desktop, which can be exploited to conduct cross-site scripting attacks or access arbitrary HTML files.
6977c2be14bf30686c9ae680f71239ac4db6aa3d19bd446400ae8c608f878816
Buffer overflows have been discovered in ncplogin and ncpmap in ncpfs.
c294b3360b3ddff9fac26764f6fdbeaf48fbc3a3c0cf6921df14103682138576
Secunia Security Advisory - XioNoX has reported a vulnerability in Nuked-Klan, which can be exploited by malicious people to conduct script insertion attacks.
5fdbc01ef4b95bd500e5be4bc5beca398d0683f404a221c9799bb0c6698c0bb1
The KDE program Konquerer allows for browsing SMB shares comfortably through the GUI. By placing a shortcut to an SMB share on KDE's desktop, an attacker can disclose his victim's password in plaintext.
d82ec6638f5d0580ca26f1a42305b4b27eb5326e45e9c6fec5e0cf1b63ceed39
On Double Byte Character Set Locale systems, such as Chinese, Japanese, etc, there exists a spoofing vulnerability within Microsoft Internet Explorer that enables attackers to fake the Address field.
3a77f862571fc252998d7700222e875fc627c98ac39e82150f4091acce5c76cd
Remote denial of service exploit for games using the Serious engine. Generates UDP packets that have fake players enter a room. The system fails to limit the amount of users that can enter.
73f4dcb9226f5e9726827b4fbf00a53e50c64b329583482853dbd42a63d49d11