A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard StorageWorks Storage Mirroring. Authentication is not required to exploit this vulnerability.
a118c902376643ce29a17845a8997a5aba2deb72b473632718632d8308a20b8d
Motorola Timbuktu Pro versions 8.6.5 and below file deletion and creation exploit.
784120f3abd0a37eb684117921e604cdeca952d7b7cb4c8e96bc9970be0e96fa
Backup Exec System Recovery Manager versions 7.0.1 and below file upload proof of concept exploit.
ee1e884145bd69e458fc0939f1a4ccdf7815e2de211d2ce86ec7cc531ae21e68
A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec Backup Exec System Recovery Manager. Authentication is not required to exploit this vulnerability. Backup Exec System Recovery Manager versions 7.0 and 7.0.1 are affected.
2febe6c060baca99c4a70f0ea9a1c410d16626e72a059c4ff90bc5900afd1555
Motorola Timbuktu Pro version 8.6.3 arbitrary file deletion/creation exploit.
874412375d09b6cf6ef3a5277cbd467699ee63e7e2c5be8e6065abfef7c41322
iDefense Security Advisory 08.27.07 - Remote exploitation of multiple buffer overflow vulnerabilities within Motorola Inc.'s Timbuktu allows attackers to crash the service or potentially execute arbitrary code with SYSTEM privileges. iDefense has confirmed the existence of these vulnerabilities within version 8.6.3.1367 of Motorola Inc.'s Timbuktu Pro for Windows. Older versions are suspected to be vulnerable.
2c0be78c19651cec8c3830a3d8035766d457717c504dd033a6cce9c7c645aabf
iDefense Security Advisory 08.27.07 - Remote exploitation of a directory traversal vulnerability in Motorola Inc.'s Timbuktu Pro allows attackers to delete or create files with SYSTEM privileges. iDefense confirmed the existence of this vulnerability in version 8.6.3.1367 of Motorola Inc.'s Timbuktu Pro for Windows. Other versions, including those for other operating systems are suspected to be vulnerable.
18e9855a8b025e8dd06159a3b3c1326937d4ce121fdce33a74edda805b44cfac
iDefense Security Advisory 04.02.07 - Remote exploitation of a buffer overflow vulnerability in an ActiveX control installed by Hewlett-Packard Mercury Quality Center could allow for the execution of arbitrary code. iDefense has confirmed this vulnerability in the control that is installed with the 9.0 version of Hewlett-Packard Mercury Quality Center. The vulnerable ActiveX control is version 9.1.0.4353.
5b7a58a511de0448a1f3aa7cfacb09134ed75ed21003432e47ea7cef077143a6
iDefense Security Advisory 12.08.06 - Remote exploitation of a denial of service vulnerability in Multiple Vendors' Antivirus engines allows an attacker to cause the engines to consume excessive resources. The affected vendors' scan engines are vulnerable to a DoS attack when scanning specially malformed RAR archives. Specifically, the malformed archives will have the head_size and pack_size fields set to zero in Archive Header section. When such a file is encountered, the affected scan engines will enter an infinite loop. Confirmed systems affected: Sophos Small business edition (Windows/Linux) 4.06.1 with engine version 2.34.3. Trend Micro PC Cillin - Internet Security 2006. Trend Micro Office Scan 7.3. Trend Micro Server Protect 5.58.
67c4a280c65b80adddfea7555c151689fa0a7b7c4e14641e6726e9b11f3ce9f5