Trend Micro ServerProtect remote stack overflow exploit that takes advantage of a boundary error condition within eng50.dll via a specially crafted RPC request to the SpntSvc.exe service. Binds a shell to TCP port 4444.
d4cd4342e55c11674ca02c2661b857d3f267c22a415561db270b833b1ee75ce0
The Linux Kernel
Linux Kernel Module Programming Guide
Need help installing Linux?
Proof of concept exploit that demonstrates format string and spoofing vulnerabilities in Alien Arena 2007 versions 6.10 and below.
983c751308a13680144237d2003e68638637bbb64d2d36567cfc028e14b860fe
Alien Arena 2007 versions 6.10 and below suffers from format string and spoofing vulnerabilities.
0b90b11ae59dc5f5ab856a67f3fdea7c517921c1c8c1880e96c20073026919b5
Cisco Security Advisory - The Cisco Content Switching Modules (CSM) and Cisco Content Switching Module with SSL (CSM-S) contain two vulnerabilities that can lead to a denial of service (DoS) condition. The first vulnerability exists when processing TCP packets, and the second vulnerability affects devices with service termination enabled.
2eae6adc493904d58cf29a9020f9964acd42641af4809711b2a28fd12881e07d
Cisco Security Advisory - Cisco Video Surveillance IP Gateway video encoder and decoder, Services Platform (SP), and Integrated Services Platform (ISP) devices contain authentication vulnerabilities that allow remote users with network connectivity to gain the complete administrative control of vulnerable devices. There are no workarounds for these vulnerabilities.
a30a58c0f9caf3b4b29b8c3c01221b85e8d159300a19916169cddfe337b81634
GlobalLink version 2.7.0.8 dlltemCom.dll SetInfo() heap overflow exploit.
3a46e2efb5c1669abdc4de82f5934d12ecf8521a4dc4a43054dd6df3b704b937
AtomixMP3 version 2.3 pls file local buffer overflow exploit.
e217abd24f131e79b4634c73f404fc669c853874db4de41587775adc8fdf7732
AnyInventory versions 1.9.1 and below suffer from a remote file inclusion vulnerability in environment.php.
0c07777e800557aa3c1962862bf10c201bbb2ce45ebfa4b873750badfe523342
Mandriva Linux Security Advisory - Dmitry V. Levin discovered a path traversal flaw in how GNU tar extracted archives. A malicious user could create a tar archive that could write to arbitrary fiels that the user running tar has write access to.
a686299c7ad69af599405065a9fab46b18a1b9f6222ea2f6ef418008486957c6
MIT krb5 Security Advisory 2007-006 - The MIT krb5 Kerberos administration daemon (kadmind) is vulnerable to a stack buffer overflow in the RPCSEC_GSS authentication flavor of the RPC library. Third-party applications using the RPC library provided with MIT krb5 may also be affected. Updated version of the original advisory with a fixed patch.
c517f29d3963a74e5996d51015499a26393ca2069f0a85df1eae3889e291d2f7
Whitepaper entitled "Secure SMTP Proxy for Protecting Mail Transfer Agents". This is a 70 page document that discusses new angles for defending mail daemons and more.
2f99ebdfed8c9fc33472e8325535722cf2edfec2bccf05e4835912ecc2c62817
PHP versions 5.2.4 and below are susceptible to a denial of service condition in iconv_substr().
4dc21229e37704fa8ee09d49f6f81195fc4551e5531e1ea451b7b4051f18aa4e
PHP versions below 5.2.3 are susceptible to a denial of service condition in fnmatch().
6fcdeaf2e62e355be0b46cb875392cf67525f69db9277ced47e0e79a558d4c9a
PHP versions below 5.2.4 are susceptible to a denial of service condition in setlocale().
1bceec8e969589670dd7a6f7ff281ff4ddbfc2b980367bb4461f76e8131f8a20
PHP versions below 5.2.3 are susceptible to a denial of service condition in glob().
caf68498728fc1f3d39b6272b24a0f675492f10065e7239dceac0dfb10e42275