CVE-2006-2176 – PHP Linkliste 1.0 - 'Linkliste.php' Multiple Cross-Site Scripting Vulnerabilities
https://notcve.org/view.php?id=CVE-2006-2176
Multiple cross-site scripting (XSS) vulnerabilities in links.php in PHP Linkliste 1.0b allow remote attackers to inject arbitrary web script or HTML via the (1) new_input, (2) new_url, or (3) new_name parameter. • https://www.exploit-db.com/exploits/27812 http://d4igoro.blogspot.com/2006/05/php-linkliste-10b-xss.html http://secunia.com/advisories/19925 http://www.securityfocus.com/bid/17828 http://www.vupen.com/english/advisories/2006/1627 https://exchange.xforce.ibmcloud.com/vulnerabilities/26229 •
CVE-2006-1526
https://notcve.org/view.php?id=CVE-2006-1526
Buffer overflow in the X render (Xrender) extension in X.org X server 6.8.0 up to allows attackers to cause a denial of service (crash), as demonstrated by the (1) XRenderCompositeTriStrip and (2) XRenderCompositeTriFan requests in the rendertest from XCB xcb/xcb-demo, which leads to an incorrect memory allocation due to a typo in an expression that uses a "&" instead of a "*" operator. NOTE: the subject line of the original announcement used an incorrect CVE number for this issue. • http://lists.freedesktop.org/archives/xorg/2006-May/015136.html http://secunia.com/advisories/19900 http://secunia.com/advisories/19915 http://secunia.com/advisories/19916 http://secunia.com/advisories/19921 http://secunia.com/advisories/19943 http://secunia.com/advisories/19951 http://secunia.com/advisories/19956 http://secunia.com/advisories/19983 http://securitytracker.com/id?1016018 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102339-1 http://www.gentoo.org •
CVE-2006-1592
https://notcve.org/view.php?id=CVE-2006-1592
Buffer overflow in the is_client_wad_ok function in w_wad.cpp for (1) Zdaemon 1.08.01 and (2) X-Doom allows remote attackers to execute arbitrary code via a long filename argument. • http://aluigi.altervista.org/adv/zdaebof-adv.txt http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/044775.html http://secunia.com/advisories/19496 http://secunia.com/advisories/19509 http://www.securityfocus.com/archive/1/429521/100/0/threaded http://www.securityfocus.com/bid/17340 http://www.vupen.com/english/advisories/2006/1198 http://www.vupen.com/english/advisories/2006/1199 https://exchange.xforce.ibmcloud.com/vulnerabilities/25592 •
CVE-2006-1593 – Zdaemon 1.8.1 - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2006-1593
The (1) ZD_MissingPlayer, (2) ZD_UseItem, and (3) ZD_LoadNewClientLevel functions in sv_main.cpp for (a) Zdaemon 1.08.01 and (b) X-Doom allows remote attackers to cause a denial of service (crash) via an invalid player slot or item number, which causes an invalid memory access, possibly due to an invalid array index. • https://www.exploit-db.com/exploits/27547 http://aluigi.altervista.org/adv/zdaebof-adv.txt http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/044775.html http://secunia.com/advisories/19496 http://secunia.com/advisories/19509 http://securityreason.com/securityalert/662 http://www.securityfocus.com/archive/1/429521/100/0/threaded http://www.securityfocus.com/bid/17340 http://www.vupen.com/english/advisories/2006/1198 http://www.vupen.com/english/advisories/2006/11 • CWE-399: Resource Management Errors •
CVE-2006-0745 – X.Org X11 (X11R6.9.0/X11R7.0) - Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2006-0745
X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile. • https://www.exploit-db.com/exploits/1596 http://secunia.com/advisories/19256 http://secunia.com/advisories/19307 http://secunia.com/advisories/19311 http://secunia.com/advisories/19316 http://secunia.com/advisories/19676 http://securityreason.com/securityalert/606 http://securitytracker.com/id?1015793 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102252-1 http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm http://www.mandriva.com/security/advisories?name=MDKSA •