iglooftp.txt
A weakness when uploading directories recursively can potentially be exploited by malicious, local users to substitute the uploaded files in IglooFTP version 0.6.1.
View Articleiglooftp2.txt
IglooFTP version 0.6.1 suffers from an input validation error that allows for arbitrary file overwrite.
View Articlegreed.txt
An input validation error that allows for arbitrary command execution and a buffer overflow exist in Greed 0.81p.
View Articlejunkie.txt
Multiple input validation errors exist in Junkie version 0.3.1 that allow for command execution and directory traversal attacks.
View Articleelm-bolthole-filter.txt
Bolthole Filter 2.6.1 is susceptible to a buffer overflow in the save_embedded_address() function.
View Articlejpegtoavi.txt
jpegtoavi version 1.5 is susceptible to a buffer overflow in the get_file_list_stdin() function.
View Articleo3read.txt
o3read version 0.0.3 suffers from a buffer overflow condition in the parse_html() function used when parsing HTML content.
View Articleringtonetools.txt
Ringtone Tools version 2.22 is susceptible to a buffer overflow in the parse_emelody() function.
View Articlenapshare.txt
NapShare version 1.2 is susceptible to a buffer overflow in the auto_filter_extern() function.
View Articlemeshviewer.txt
MeshViewer 0.2.2 is susceptible to a buffer overflow vulnerability in the Mesh::type() function.
View Articlepcal.txt
Buffer overflow vulnerabilities in the getline() and get_holiday() functions of Pcal version 4.7.1 may allow for system compromise.
View Articleuml-utilites.txt
uml-utilities version 20030903 is susceptible to a denial of service vulnerability via the uml-net utility running setuid root and being able to take down the system's ethernet connection.
View Articlevb2c.txt
A buffer overflow in the vb2c 0.02 parse() function allows for system compromise.
View Articlexlreader.txt
xlreader version 0.9.0 is susceptible to a buffer overflow condition in the book_format_sql() function.
View Articlevilistextum.txt
Vilistextum version 2.6.6 is susceptible to a buffer overflow in the get_attr() function.
View Articleyamt.txt
A buffer overflow vulnerability in the YAMT 0.5 id3tag_sort() function can lead to a system compromise.
View Articledsa-611.txt
Debian Security Advisory 611-1 - infamous41md discovered a buffer overflow in htget, a file grabber that will get files from HTTP servers. It is possible to overflow a buffer and execute arbitrary code...
View ArticleSSRT4687.txt
HP Security Bulletin - A potential vulnerability has been identified with the HP-UX newgrp(1) command that may allow authorized users to elevate privileges. Affected versions are HP-UX B.11.00,...
View Articlepaginit.c
Local stack overflow exploit for /usr/bin/paginit on AIX versions 5.3/5.2/5.1.
View Articledsa-612.txt
Debian Security Advisory 612-1 - Rudolf Polzer discovered a vulnerability in a2ps, a converter and pretty-printer for many formats to PostScript. The program did not escape shell meta characters...
View Articletlen.txt
Tlen.pl versions 5.23.4.1 and below suffer from a remote script execution vulnerability.
View ArticleKDE Security Advisory 2004-12-20.1
KDE Security Advisory: Two flaws in the Konqueror webbrowser make it possible to by pass the sandbox environment which is used to run Java-applets. One flaw allows access to restricted Java classes via...
View Article