Secunia Security Advisory 14437
Secunia Security Advisory - FraMe has reported a vulnerability in CuteNews, which can be exploited by malicious people to conduct script insertion attacks.
View ArticleSecunia Security Advisory 14414
Secunia Security Advisory - Doctor Grim has reported two vulnerabilities in MercuryBoard, which can be exploited by malicious people to conduct script insertion and SQL injection attacks.
View ArticleGentoo Linux Security Advisory 200503-5
Gentoo Linux Security Advisory GLSA 200503-05 - Tavis Ormandy of the Gentoo Linux Security Audit Team has reported that xli and xloadimage contain a flaw in the handling of compressed images, where...
View ArticleSecunia Security Advisory 14438
Secunia Security Advisory - Multiple vulnerabilities have been reported in the CA License software, which can be exploited by malicious people to compromise a vulnerable system.
View ArticlegoldenFTP192.txt
Golden FTP server version 1.92 suffers from a buffer overflow when more than 284 characters is entered in the Username field at logon. As EIP can be overwritten, it is possible to execute arbitrary...
View ArticleCProxyRemote.txt
Computalynx CProxy versions 3.3.x and 3.4.x are susceptible to denial of service and directory traversal attacks. Detailed exploitation provided.
View ArticleiDEFENSE Security Advisory 2005-03-02.1
iDEFENSE Security Advisory 03.02.05 - Remote exploitation of a buffer overflow vulnerability in Computer Associates International Inc. License Server and License Client can allow attackers to execute...
View ArticleiDEFENSE Security Advisory 2005-03-02.2
iDEFENSE Security Advisory 03.02.05 - Remote exploitation of a buffer overflow vulnerability in Computer Associates International Inc. License Server can allow attackers to execute arbitrary code. The...
View ArticleiDEFENSE Security Advisory 2005-03-02.3
iDEFENSE Security Advisory 03.02.05 - Remote exploitation of a directory traversal vulnerability in Computer Associates International Inc. License Client can allow attackers create files in arbitrary...
View ArticleiDEFENSE Security Advisory 2005-03-02.4
iDEFENSE Security Advisory 03.02.05 - Remote exploitation of a buffer overflow vulnerability in Computer Associates License Server and License Client can allow attackers to execute arbitrary code. The...
View ArticleiDEFENSE Security Advisory 2005-03-02.5
iDEFENSE Security Advisory 03.02.05 - Remote exploitation of a buffer overflow vulnerability in Computer Associates License Server and License Client can allow attackers to execute arbitrary code. The...
View ArticleiDEFENSE Security Advisory 2005-03-02.6
iDEFENSE Security Advisory 03.02.05 - Remote exploitation of a buffer overflow vulnerability in Computer Associates License Server and License Client can allow attackers to execute arbitrary code. The...
View Articleksb26-2.6.11.tar.gz
KSB26, Kernel Socks Bouncer for 2.6.x, is a Linux 2.6.x-kernel patch that redirects full tcp connections through a socks5 proxy. KSB26 uses a character device to pass socks5 and the target IPs the the...
View ArticleSSRT4866.txt
HP Security Bulletin - A potential security vulnerability has been identified with HP OpenVMS VAX version 7.x and 6.x and OpenVMS Alpha Version 7.x or 6.x that may allow a local authorized user to gain...
View ArticleeEye.CAlicense.txt
eEye Security Advisory - eEye Digital Security has discovered multiple stack-based vulnerabilities within the licensing component that processes incoming network requests in the Computer Associates...
View Articleida_sync.zip
IDA Sync was written to allow multiple analysts to synchronize their reverse engineering efforts with IDA Pro in real time. Users connect to a central server through the ida_sync plugin. Once...
View Articlefunction_analyzer.zip
Written as a C++ class, Function Analyzer was originally developed to provide an abstracted layer over chunked functions frequently found in Microsoft optimize compiled binaries. As of IDA version 4.7...
View ArticlepGRAPH.zip
Built on top of the IDA Function Analyzer, pGRAPH (Pedram's Grapher), provides an interface to generate more detailed and user defined control-flow graphs using the bundled Wingraph package. Extended...
View ArticleSecunia Security Advisory 14451
Secunia Security Advisory - A security issue has been reported in Squid, which may disclose sensitive information to malicious people.
View ArticleSecunia Security Advisory 14462
Secunia Security Advisory - Tavis Ormandy has reported a vulnerability in Xloadimage, which potentially can be exploited by malicious people to compromise a user's system.
View ArticleSecunia Security Advisory 14464
Secunia Security Advisory - benjilenoob has reported a vulnerability in D-Forum, which can be exploited by malicious people to conduct cross-site scripting attacks.
View ArticleSecunia Security Advisory 14450
Secunia Security Advisory - A vulnerability has been reported in Burning Board and Burning Board Lite, which can be exploited by malicious people to conduct SQL injection attacks.
View Articleawstats_shell.c
Awstats remote exploit that allows for remote command execution on the host with privileges of the httpd process. Versions 5.7 through 6.2 are affected.
View Article
More Pages to Explore .....