A possible race condition exists in QNX RTP 6.1 due to a program being called without a complete path.
a9f8a0e80084bb3cbcd294a6a08d9050b2f8a488b2ad2599b22b26500637b8c8
The QNX FTP client is susceptible to a format string attack.
54dbf220789cb41ca47430f8e654f569abfc0cc3ba2d95fd72f40e340ff4ce8d
Various buffer overflow conditions exist in four binaries of QNX Photon.
7d4fd2f4fa6f9fcbf81ffa0c9a0d491f52069de930018beb226dff49f8c43510
Samba 3.0.x is susceptible to multiple denial of services bugs that can remotely crash the daemons nmbd and smbd.
f4537d8e10bef6278b460a495b011aa96a2114153cc957d69798d3055570f110
A vulnerability in Turbo Seek 1.x allows an attacker the ability to access the contents of any file in the file system.
fad5b7e11a59e7a95ea1a03df172d19dd0c7273b055c119e5e06dc2f9135f4e5
Secunia Security Advisory - Secunia has discovered a vulnerability in OpenOffice and StarOffice, which can be exploited by malicious, local users to gain knowledge of sensitive information.
3b42a4de1894fb36879f486d5528b9ab61b6508f9397b5b03fc8fee129db81b1
A directory traversal vulnerability exists in several FTP commands of TwinFTP that may be exploited by a malicious user to access files outside the FTP directory. The problem lies with the incorrect filtering of directory name supplied to CWD, STOR and RETR commands. Versions tested: TwinFTP Server Standard 1.0.3 R2 (Win32) on English WinXP SP1, TwinFTP Server Enterprise 1.0.3 R2 (Win32) on English Win2K SP2.
d6f72bc7fab9132f3f56758b94be272eefba30b76a4c1dabb51e82a11d482c15
courier-imap 3.0.2-r1 and below remote format string vulnerability exploit. Tested on FreeBSD 4.10-RELEASE with courier-imap-3.0.2.
6b6fd0cbc65997bc5ba71342249c8d839b98e3f0017bd1622b2c633be2fd18a1
Kernel module using portknocking to get sshd spawned after challenging a list of specified daemons. Designed for 2.4 kernels.
2303c404a77a1d6f3f56d085ebc66a8d7c5ec6c8da1d01103b154df38163e80c
Local root exploit for readcd that comes setuid default on some Linux distributions.
ebf6074259a64754f450086d3b5f185f63aadb539439f649e0aa62d989444041
Sec-Labs Advisory - Gadu-Gadu is susceptible to a heap overflow that allows for arbitrary code execution. Tested against version 6.0 build 149.
c439851c4bd7fe8790976ac8da0cb2ed86c17f1eda67ae166eb128b68e66b817
Multiple methods exist that allow for a crash of the Serv-U FTP server versions 4.x through 5.x.
d941fdd90d43d505caf64fd5ccd29666e277692cc3b92dcb7f904ebe311179ac
mod_ssl segmentation faults in the char_buffer_read function when reverse proxying SSL originating from an IIS server. Verified in build 2.0.50.
d910ca66c0aedc6006ed88626bf0d22fd6876bafac2e861f30b44b53a18befce