First public released of libvg, a runtime process manipulation library. Libvg was designed to provide a powerful and portable interface for writing non-complex programs that can get or change information of processes on the system.
6cd35b18473ff6e881f833beb66fec0945da66f0b773f0b6ddbca106622065fb
MAC address modification utility for Windows 2000 / XP / 2003 Server.
33f7901333edc14612ee42fc3eb035638e7eb59411438473257e8959204117cd
Secunia Security Advisory - Santiago Cortes has reported a vulnerability in Sugar Sales, which can be exploited by malicious people to compromise a vulnerable system.
1db32c7f927e913852adcea84f09740e6d13a2eb4af84b5f706543d6a27d2f5b
Locally exploitable flaws have been found in the Linux binary format loaders' uselib() functions that allow local users to gain root privileges. Linux kernel versions 2.4 up to and including 2.4.29-pre3, 2.6 up to and including 2.6.10 are affected. Exploit included.
dc8912477cabd4620eccb9621b77afc571d533b90b200dfc6fc0b9d16173ee04
Proof of concept denial of service exploit for the Amp II 3D game engine that is susceptible to attack when receiving UDP datagrams of zero bytes.
80d677ae8b10d22ddbe0c994296c32782336b61e029dcafac8acdd83a4c4290d
The Amp II 3D game engine is susceptible to a denial of service attack when receiving UDP datagrams of zero bytes.
48f45ec61d3cad1620022de97f403f68e46b8e9f946ff88c7d0f52349256fb6b
Apache Jakarta Tomcat version 5.5.6 is susceptible to cross site scripting attacks.
27105001fc27f96aa1eb4a7805155ca4e01d73ebea5c3512a754a06980fd505e
Secunia Security Advisory - LSS Security Team has reported a weakness in mod_dosevasive for Apache, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
cde707c1ec8034c5dee23d37d8c7db792e02d77e177c4c3bbdbd5eeb64275fb8
New version of the phpBB worm with bot install that makes use of Altavista.
c5803f6012ff7cfa1585917d923f94e611150553d2fb171052cdefe79a0f8b4f
WinAce WinHKI version 1.4d suffers from a directory traversal flaw that allows a compressed archive to overwrite files below the extraction directory.
7acca77e689274d3cd982f9d900df6860a2925ef7a040d858a40a2163d48384e
Secunia Security Advisory - Two vulnerabilities have been reported in Exim, which potentially can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a vulnerable system.
0126c14d80f535abb7d233cf47a538e44964560a4f376cb77e022e4f39ee01cb
Secunia Security Advisory - Ziv Kamir has discovered two vulnerabilities in Jeuce Personal Web Server, which can be exploited by malicious people to disclose sensitive information and cause a DoS (Denial of Service).
d8e80259c936add710258705b3aaa2543a33818e0285a0fd79e80913d7a22bd7
Secunia Security Advisory - r0ut3r has reported a vulnerability in b2evolution, which can be exploited by malicious people to conduct SQL injection attacks.
e68d038b9ba09b2335829760400071a3ffd0b6b1b0bd7eaaabebf90618521775
A stack buffer overflow exists in all Symantec products in all versions until 2005.
1547ccdc34d04f8a18cf75c06785fbcbed245d4632a1fa13b5ff3ead034b0424