The Linux 2.4.x kernel series comes with an i2c driver that has an integer overflow vulnerability during the allocation of memory.
6b9ab2a22bb370c236040f89eaeb9f52f07672f8bd3c635617f0c7a744113500
Aspell is susceptible to a stack overflow when it makes use of a wordlist file that has an entry exceeding 256 bytes.
7b148643f8b27cc0b5251d418834bd40e6879c6455093a920ae35722acfa711d
The usage of the SCTP implementation in all versions prior to 2.4.26 of the Linux kernel are susceptible to an integer overflow.
f066b2cbb6af3fe4fe3ad12ba310fa17c52d57e4b55c41f6d53c4a9f4d6b0539
A stack-based buffer overflow vulnerability exists in the popular shar utility packaged in the GNU sharutils distribution, due to a lack of bounds checking when handling the -o command-line option. By default, this file is not setuid nor setgid, but if used in conjunction with other tools, it is possible that this can be manipulated for nefarious purposes.
b6dceda7216ae56f8997fa05d3bb0b438c5ce4c248e40197d99a60a8f531c1c6
xine-bugreport suffers from insecure file creation in /tmp that can lead to a symlink attack.
4fcbc54a6a9efec0d6e0816d90e344ec790ee578689ee2db652db4331f3b7d11
smbprint insecurely writes to files in /tmp allowing for a symbolic link attack. Full details on exploitation included.
5f8fabd4db56afb335dc8f91646c031c7ae3fbc783d0d675174bdc907f203a29
Remote denial of service exploit that makes use of a command buffer overrun in Serv-U MDTM versions 5.0.0.4 and below.
b2d3006fc0646e31f2974ba75991ad575fe9b9f0032eb41efccfeb84a3983900
Proof of concept DoS exploit for 3Com OfficeConnect DSL Routers. Successful exploitation of the vulnerability should cause the router to reboot.
254023ca8d4768c04c5c20cfa49d209a6bbc5b70b7a80ccd6bf8833bff56ebcb