Gentoo Linux Security Advisory GLSA 200506-09 - A format string vulnerability exists when opening files with names containing format specifiers. Versions less than 2.10.3 are affected.
fc90c527d7e271ff9a2c0c417016edb215786c0cdfab6a0b221568f56f91e330
Gentoo Linux Security Advisory GLSA 200506-08 - Eric Romang has discovered that GNU shtool insecurely creates temporary files with predictable filenames (CVE-2005-1751). On closer inspection, Gentoo Security discovered that the shtool temporary file, once created, was being reused insecurely (CVE-2005-1759). Versions less than 2.0.1-r2 are affected.
6b3196c1924e2d34a98d572a52f24f54d3f9884fa2c04389757444e236dded2c
osCommerce versions 2.2-MS2 and below suffer from an HTTP response splitting vulnerability.
531b316f510afad812574cbcce1b9e82817e91becc82a9c728033ba7b98c441f
Ubuntu Security Notice USN-139-1 - A remote Denial of Service vulnerability was discovered in Gaim. By initiating a file transfer with a file name containing certain international characters, a remote attacker could crash the Gaim client of an arbitrary Yahoo IM member.
2b5672e73fce996b3fdee6fa3257e6d488ac300c8fbbf32b654d5e72414444dd
eping, the ping plugin for the e107 portal system, has an arbitrary command execution flaw.
845adfe9242d7a064e1e16d1b6b9f3fd4c4f83cdc31db34ce6a9568eba3dfe44
Invision Gallery versions prior to 1.3.1 suffer from cross site scripting and SQL injection vulnerabilities. Exploitation details included.
cab84da4a86eb75dd0850fa421865bc4a8a258f54008812d358752470a8235fa
Ubuntu Security Notice USN-138-1 - A format string vulnerability has been discovered in gedit. Calling the program with specially crafted file names caused a buffer overflow, which could be exploited to execute arbitrary code with the privileges of the gedit user.
0ce97dde8631d24171d804eb94642996dd4567dfedea8cd4000ca2bb36ef5693
Invision Blog versions prior to 1.1.2 Final suffer from cross site scripting and SQL injection vulnerabilities. Exploitation details provided.
7bef5c8eac4a95a9f16a59d1af902a88074e0c7960573fa8242abdbee636e191
FlatNuke 2.5.3 Referer poisoning remote command execution exploit created with the Metasploit Framework.
bdb8e0f1ec9e0995117219b95dfbce225b3cd9ea328c1965dd83ab860f6485bf
FreeBSD Security Advisory FreeBSD-SA-05:12 - A DNSSEC-related validator function in BIND 9.3.0 contains an inappropriate internal consistency test. When this test is triggered, named(8) will exit.
8fccf0614b4cae1a8f3081cb6f85fef6c558ed5fcde321cc9167d2225a2c0f87
xmysqladmin versions 1.0 and below suffer from a symlink vulnerability.
2fa75758826d6d03130e584c9f1f59190b2772d66994dcc3615620ff5cfca684