Secunia Security Advisory - A security issue with an unknown impact has been reported in Rippy the Aggregator.
a431b38a5975c21c1852e2c23c96d44259e4fd28b495b909d9fca551447efc8e
Gentoo Linux Security Advisory GLSA 200410-06 - CUPS leaks information about user names and passwords when using remote printing to SMB-shared printers which require authentication.
51d680d5f4ffa9f890d9be25b843c0fa3bc78813567885a9feec526bb203fe6b
Introduction to Shellcode: How to exploit buffer overflows. A very thorough and well written paper on how it all works. A good read for anyone curious and even those who already think they know it all. It includes step by step examples from vulnerability discovery to a finished exploit. The paper focuses on x86 Intel syntax assembly under Linux.
1929d512b64ef4d90495bb2026a18ce18306161bf9fb0cda06032dfadf958381
Remote proof of concept exploit for old games developed by Monolith that are susceptible to a buffer overflow which occurs when an attacker sends a secure Gamespy query followed by at least 68 chars.
1564b9fcc32a8411d7e8d4aabe4cf7f7d1e6b8381aae6436c4d3f2ca1ae02b3f
Some old games developed by Monolith, such as Alien versus Predator 2 versions 1.0.9.6 and below, Blood 2 versions 2.1 and below, No one lives forever 1.004 and below, etc, all suffer from a classical buffer-overflow which happens when an attacker sends a secure Gamespy query followed by at least 68 chars.
a54a0157d5ee61372713cee3b2bb568e919a7cf059e8b38d062c52781c169736
OpenAanval is an open-source web based Snort intrusion detection console. Currently supporting Snort and syslog, OpenAanval provides dynamic monitoring, comprehensive reporting and powerful alerting capabilities. OpenAanval supports multiple sensors of multiple intrusion detection system types. OpenAanval's web-browser interface provides live auto-updating technology which provides real time event viewing from any Internet connected web-browser.
f4b7fec0c8497ee77587eb5499c23917d90a41b5e63e37a2cfc6f69da6af68c1
Microsoft is currently investigating a reported vulnerability in Microsoft ASP.NET. An attacker can send specially crafted requests to the server and view secured content without providing the proper credentials. This reported vulnerability exists in ASP.NET and does not affect ASP.
5edfd7fddd7a4296dc93cf59e7345dc1f4840e6d75e19ee989f98acdea216cda
Remote proof of concept exploit that demonstrates a denial of service attack against Flash Messaging versions 5.2.0g and below.
deac1c5c870894470d0a9b00b2b28a976adcd9fdb07a17000f9fefee88fc18aa
Flash Messaging versions 5.2.0g and below suffer from a denial of service attack.
0eb6ef79cfb1dee376a503cca7cd8ed98130da6ff32cd7f07e3e1834f9463276
iDEFENSE Security Advisory 10.07.04 - Remote exploitation of a denial of service (DoS) vulnerability in RealNetworks, Inc.'s Helix Server could allow an attacker to restart and potentially disable the server.
d8f3f5f63100ad4fd01415feef4496eba6ccb4ed1c572261d51c038c3e3cfba6
Gentoo Linux Security Advisory GLSA 200410-05 - Cyrus-SASL contains two vulnerabilities that might allow an attacker to completely compromise the vulnerable system.
5ba337b1e28e743843f56389236966ffc54ed2ace62f30a576b2a31086385623
Georgi Guninski security advisory #71 - By opening html in IE it is possible to read at least well formed xml from arbitrary servers. The info then may be transmitted.
e156bc37f51fe57421af3618c35923d4d1555d62766229c4eb0d0edca13f7471
Microsoft Word is susceptible to having an exception triggered due to a lack of sufficient data validation when winword.exe parses a document file. Two types of exceptions can be triggered, with the second being possibly exploitable.
cdc21ddeff9714cf7e828e939a3991db70d3d59f034e5e36ca4d6c5e9788b886
WordPress 1.2 is susceptible to HTTP Response splitting flaws.
740f60574af27e0015c01b1575dadd587cfa403b1a55afaad48978111d3b93a2
When a valid user tries to authenticate via the Neoteris Instant Virtual Extranet VPN solution and the password is expired, the user will be asked to change their password and be directly forwarded to the changepassword.cgi without asking for any form of authentication.
9d6bd69e3a83d7032a8b00df8ff0d7a16f105485d603eaa8ed60656a80d2cdba
Tridcomm versions 1.3 and below suffer from both upload and download directory traversal attacks. Exploitation provided.
d6075947f6d2f00eada4015d79b88b40e7a9cfc943c169bd23a5272cecb42300
iDEFENSE Security Advisory 10.06.04a - Remote exploitation of an input validation error in MySQL MaxDB could allow attackers to trigger a denial of service condition.
e093a929abe48ffdab17ce0899480e9b2a5b4c8494e66e1160e332e98c053d99
CubeCart 2.0.1 is susceptible to full path disclosure and SQL injection attacks.
2268fe5444cf26b20e7ea207085748d11b383bae256e973d5232fd8aac0dee85
Multiple vulnerabilities were found in DCP-Portal. A remote user can conduct cross-site scripting attacks and HTTP response splitting attacks.
22aa26ae2d5dc444cc281d90d2f0be162337b0d1d9ec8595e1a27797ef74b881
Sun Security Advisory - If a local unprivileged user executes the gzip(1) command and specifies the -force or -f command line option, files which are hard linked to the target file(s) will have their permissions changed. This could allow other local unprivileged users the ability to read or modify files owned by the invoking user, or system files if gzip(1) is issued by a local privileged user.
f93306f2b1ee952a74a168404ecc378a434200e0ce91c50075aa6536e06cb3fb
Debian Security Advisory DSA 559-1 - Stefan Nordhausen has identified a local security hole in net-acct, a user-mode IP accounting daemon. Old and redundant code from some time way back in the past created a temporary file in an insecure fashion.
6243c91755b84325516ad488639d2e6f35b4d32a7136b6b4cce4c4d53d73ec7f
Secunia Security Advisory - Multiple vulnerabilities have been reported in DB2 Universal Database, where some of the vulnerabilities can be exploited to compromise a vulnerable system.
35e3e1488ca51b5ebe53a3538faab377172278ce268a071bbe77ca5b8404d192
BlackBoard version 1.5.1 is susceptible to full path disclosure and remote executable code inclusion.
c72ea7662d46ad0335a5869c71c8b2882af16a0a76cb83d531d4f60b91ab113d
Call for Papers for CodeCon 4.0 in San Francisco February 11-13, 2005. All presentations must include working demonstrations, ideally accompanied by source code. Presenters must be done by one of the active developers of the code in question. We emphasize that demonstrations be of working code.
bf24f79c715cd877535d409965f16a88fe534e5a8ac4368a54d545d0c2778a86
Secunia Security Advisory - Gary Smith has reported a vulnerability in CUPS, which can be exploited by malicious, local users to gain knowledge of sensitive information. The problem is that user credentials are stored in the error_log log file when printing to a shared printer via Samba.
dc86fc59df6ecd5275b9ce12b615dc48ca89a7358afddedea28926e9ebbb7182