Asleap is a tool that exposes the weaknesses in Cisco's LEAP protocol. It can read live from any wireless interface, can monitor a single channel, perform channel hopping to look for target networks running LEAP, will actively deauthenticate users on LEAP networks so they will be forced to reauthenticate, and more.
4dc44be7567b4b2ddb253a6a70bb6a96f180f6b079ca0c5b3d7b33fefcdb9bdc
Symantec Virus Detection is susceptible to a buffer overflow.
31a857797e3983ace0f26dc8e18ec9b0bc7e387b4858a2de50c91d2630b74419
Mcafee FreeScan is susceptible to buffer overflow and private information disclosure attacks.
965b844a3cdf53e9218191c6a7f6de76daa2d357f51cad2f8a2e1a8cd4df2ca2
Panda ActiveScan version 5.0 has a buffer overflow that allows for arbitrary code execution with SYSTEM level privileges.
bb4d99560509598cb4f1c03ef93898aab049201920dcb2e36a4f8e75db55b32f
A stack-based buffer overflow vulnerability exists in the popular shar utility packaged in the GNU sharutils distribution, due to a lack of bounds checking when handling the -o command-line option. By default, this file is not setuid nor setgid, but if used in conjunction with other tools, it is possible that this can be manipulated for nefarious purposes.
b6dceda7216ae56f8997fa05d3bb0b438c5ce4c248e40197d99a60a8f531c1c6
blaxxun3d Platform 7 is susceptible to a buffer overflow that allows for arbitrary code execution with SYSTEM level privileges.
b7a2530778d78625e62544550d13ed956a7c096171f22fca7e63522ee4c5716e
Foundstone Labs Advisory - Citrix MetaFrame Password Manager 2.0 has a flaw where it will locally store credentials unencrypted if the agent is not pointed to a central credential store.
1c9632d94f5f40b0cc99ad07a73eaec4580053d25e6d9dafb7e2c377dbb5468b
Gentoo Linux Security Advisory GLSA 200404-01 - A flaw has been found in the temporary file handling algorithms for the sandboxing code used within Portage. Lockfiles created during normal Portage operation of portage could be manipulated by local users resulting in the truncation of hard linked files; causing a Denial of Service attack on the system.
827805dcda3188f92aa65e2f7210d6d2fa512f105b8baa91369883d9d206c28e
Heimdal releases prior to 0.6.1 and 0.5.3 have a cross-realm vulnerability allowing someone with control over a realm to impersonate anyone in the cross-realm trust path.
259dec0f92b706cac74eb9b8dc8d72650d17e97cbf936f9e2367234a60d97a99