Blue Coat Security Gateway OS (SGOS) 3.x releases suffer from a private key disclosure vulnerability where the key and passphrase are stored in clear text when being imported via the web-based management console.
618fc697e20741645614005f71356499b25ff5da2c4770eaab63019f287b71c3
Microsoft Outlook 2003 allows for a security zone bypass when an embedded OLE object with a reference to a Windows media file in a Rich Text Format (RTF) message is received.
5bf5bc65e12021c3781270decf58bd776d636f05498f59327d50d8ef47731e58
Secure Computing has reported multiple denial of service vulnerabilities in their Sidewinder G2 firewall.
174e7ee25f3feb9fddbfa8a1396ac9d3eb41c7891c1870711074ce1e244ed73f
SGI Security Advisory 20040503-01-P - Under certain conditions, rpc.mountd goes into an infinite loop while processing some RPC requests, causing a denial of service. Affected releases: SGI IRIX 6.5.x.
60b6fab3dcc07e154a22aa2c18072a5e408070846522782d959a9681d25da497
ActiveState's ActivePerl version 5.8.0 and 5.8.3 on the Win32 platform seems to have a buffer overflow that allows for the crashing of Perl.exe.
cb74262362d1bc8c25961c0aed2a211fdd10c5d0201a54eb37c69c18a3cff6b0
PHP-Nuke versions 6.x to 7.3 allow for possible file inclusion.
4d43d506de22ba54c5b3d72da244b7c2d217bc83ffb12200388c179db7006a74
A vulnerability has been found in Microsoft Internet Explorer that allows an attacker to use a specially coded ImageMap to spoof the URL displayed in the lower, left hand corner of the browser.
8c3fdeaa071f14ee81765c1b6df9a48ff1f40f432e665e83159d54309433249d
Safari versions 1.2 and below suffer from a vulnerability that can lead to remote arbitrary code execution via the runscript aspect of the HTML rendering functionality.
9e44db693ef039ea12ac05b37053e283a17b3e84e0532483b7f21b85bf1753f8
WebCT is susceptible to cross site scripting vulnerabilities.
773b3e54431153fe94a1a32d6773c83940f16f7a00f8f405d5b7c3f5865313e0
TTT-C is susceptible to multiple cross site scripting attacks due to the fact that it does not sanitize variables.
c91bdc0933621f5763fcee66756f8fc9671ef644afef3cba1e18de848a62e167
NetChat, an application intended to allow users on the same subnet to chat with one another, is susceptible to a stack-based buffer overflow. Versions 7.3 and below are affected. The overflow allows for arbitrary code execution under the user running the application.
0b23d03452960631df48fd8aceeddd1515e1df9580a7a65525607ba2e60e0f00
Wget versions 1.9 and 1.9.1 are susceptible to a symlink attack during a phase where it downloads the file to a temporary filename but does not actually lock the file.
3e19a9e65f1b07c2febfde7d6bffc9cc7a814a75db5421d998b8a9cb89dcc8c5
AUSCERT Advisory - A vulnerability exists in hardware implementations of the IEEE 802.11 wireless protocol that allows for a trivial but effective attack against the availability of wireless local area network (WLAN) devices.
a46c2a37097c474213beefb0ef777f388574dfbff75a232f91c1838edbf91fe4
LHA has some additional buffer overflows in the extract_one function.
5a53496931d36f0f0629ce52c2693ceccacf6032e71a671af6253290e91d1570
Mailbomb is a Perl script used to aid system administrators in locking down spam filters.
bd9b327974cf2fc56b8afff647d595772d8002fdff6715b18a99617f665b8b65
This utility was written to allow for easy access to the kernelspace for testing insertion of modules, accessing miscellaneous kernel information, and allows for an easy test environment.
14b2a36a62e422787d27a7c092ba4f5173809ea1b33331a8a949a7e234f67f46
AIRE is an 802.11 network discovery utility for Microsoft Windows XP. Upon finding a wireless access point, it displays pertinent information (timestamp, ESSID, channel, mode, etc) and has various useful features like a power meter display and other APs within range.
3cda61bb9f2d7d08af278454ecb10065fe45d20e4c2f20c68b87c0fdbd223293
Oinkmaster is simple Perl script released under the BSD license to help update and manage Snort 2.0+ rules and to comment out the unwanted ones after each update. It will report what has changed since the last update, offering good change control.
acd85eeb4b35eecc6aace83f16e870501f129c00ce925eb81da5576ff45a6827