Secunia Security Advisory - Multiple vulnerabilities have been reported in various VMware products, which can be exploited by malicious, local users to gain escalated privileges or cause a DoS (Denial of Service) or by malicious people to compromise a vulnerable system.
08f09e82199488119ccb28852685050d7fedc7bb928e4f58a42631edb144d384
Secunia Security Advisory - Doz has reported a vulnerability and a security issue in WebBatch, which can be exploited by malicious people to disclose system information or conduct cross-site scripting attacks.
3fed0e6a201c068783a42e567213e093fffdcfa2ff0e05defb763534057a7c48
Secunia Security Advisory - nights_shadow has discovered a vulnerability in PhpWebGallery, which can be exploited by malicious people to conduct script insertion attacks.
4433b0ce41d9db1b129963bccd2f1df085f927dc65c7b174f54509674be9d9cb
VMware Security Advisory - Updates have been released for arbitrary code execution, denial of service, and other various vulnerabilities in VMware.
f186f94a09bad9dba4b82b1daa59265b1954d193e8533587d0fe2348c1f58bec
Debian Security Advisory 1364-2 - Several vulnerabilities have been discovered in the vim editor. Ulf Harnhammar discovered that a format string flaw in helptags_one() from src/ex_cmds.c (triggered through the "helptags" command) can lead to the execution of arbitrary code. Editors often provide a way to embed editor configuration commands (aka modelines) which are executed once a file is opened. Harmful commands are filtered by a sandbox mechanism. It was discovered that function calls to writefile(), feedkeys() and system() were not filtered, allowing shell command execution with a carefully crafted file opened in vim. This updated advisory repairs issues with missing files in the packages for the oldstable distribution (sarge) for the alpha, mips, and mipsel architectures.
c3785b66e8f5c4940f2f5cff8cbacf0010c2280153e65ca2f3c5312f02e34028
Gentoo Linux Security Advisory GLSA 200709-12 - Poppler and Xpdf are vulnerable to an integer overflow in the StreamPredictor::StreamPredictor function, and a stack overflow in the StreamPredictor::getNextLine function. The original vulnerability was discovered by Maurycy Prodeus. Note: Gentoo's version of Xpdf is patched to use the Poppler library, so the update to Poppler will also fix Xpdf. Versions less than 0.5.4-r2 are affected.
80f2606293732b921ba29576656b474b32143b7b5042cb15416ed2d5c74a76f8
Ubuntu Security Notice 515-1 - It was discovered that t1lib does not properly perform bounds checking which can result in a buffer overflow vulnerability. An attacker could send specially crafted input to applications linked against t1lib which could result in a DoS or arbitrary code execution.
d244d3b0f668fdadb3b381efe448f72d60df6e9b29980fd755279eea68404437
Proof of concept exploit for rFactor versions 1.250 and below that suffer from buffer overflow and code execution vulnerabilities.
f640dea92530135cfcc9ae38ce63f181d5d4d0ef906dbce5bdbaf133a7a4cae5
AuraCMS version 2.1 suffers from a remote file upload vulnerability.
3abda0be837af24dfe99452a3011eecc3c151f1f9ebf51ba5a64a89e8d13c058
The WBR3404TX broadband router suffers from a cross site scripting vulnerability in the web based management interface.
a3bdc43059b6289242ec22e3ed84d6d3017c230a024c7643b299663d377ae62c
HP Security Bulletin - A potential security vulnerability has been identified in HP-UX running the logins(1M) command. This command incorrectly reports password status. As a result password issues may not be detected, allowing remote unauthorized access.
950446ae88ba4959b2aca04a7acd588a1e533248c41aa0b4bc14dd5e8c3f6fd2
HP Security Bulletin - Various potential security vulnerabilities have been identified in Microsoft software that is running on the Storage Management Appliance (SMA). Some of these vulnerabilities may be pertinent to the SMA, please check the table in the Resolution section of this Security Bulletin.
a137ba38e770c6459675cd0b1d76e2e8e40f26ef9d25ab6465d6a5bd54fe88d5
Mercury/32 version 4.52 IMAPD search command post-auth overflow exploit.
76899a76ae38bffed872b8dd336e0d8fb8d277ffa8d2516cadf39dac5ea35d0b
Yahoo! Messenger version 8.1.0.421 CYFT Object arbitrary file download exploit.
6e64af05fb091cf2cfce9ff05574ea96017e38f93d78f223d7427fab7cb8114a
jetAudio version 7.x ActiveX code execution exploit that makes use of DownloadFromMusicStore().
5625d7033969e6c0c3e5ba1813662b2381af214cef565714cce7e8a9033a88cd
p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to the remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Note that this version is the win32 compiled version. Original code by Michal Zalewski, compiling by David Coomber.
dd38a277cf5f75bd141c92c52d4a943be4377fb60f3ec5a8fd8b6e6d380f4122
Flip versions 3.0 and below remote password hash disclosure exploit.
cff6a107f1c4d2d5467974c6b1524004521a920907c03807630e5696886a2e8a
Flip versions 3.0 and below remote admin creation exploit.
ab23cf363e9e4f88cda78909a85f0bc3d0a105367b23254fac3a0909722854ae
phpBB Plus versions 1.53 and below suffer from a remote file inclusion vulnerability.
d7840a40e5cce9f07595fc3ef06a122c61ea33afef7221aeec3b44c12e107b0a
OneCMS version 2.4 remote SQL injection exploit that makes use of userreviews.php.
12705178b0a56cfd875a2f603dbeb7f7a8da02c4ce5f5ab5a22130d37b64fbf3
Streamline PHP Media Server version 1.0-beta4 suffers from a remote file inclusion vulnerability.
9cd7c978e6a572a3fdec146c2e208a17cf2817369c03cbc95d94e33c3aee3f43
dBlog CMS is susceptible to a direct database download vulnerability.
c962d0a358906fec392c42277a9199629b0b580195ce6b8911cfa79bc42a8ac8
A vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of the Automated Solutions Modbus TCP Slave ActiveX Control. Authentication is not required to exploit this vulnerability. The specific flaw exists within MiniHMI.exe which binds to TCP port 502. When processing malformed Modbus requests on this port a controllable heap corruption can occur which may result in execution of arbitrary code.
f0520f8bf90c6787cc532807988649bb63df556515fb667dade3c955d0dd7f3a
Secunia Security Advisory - Shell has discovered a vulnerability in AOL Instant Messenger, which can be exploited by malicious people to execute arbitrary script code.
c6d51e315925f26cfc8c8e78c6e3393ca1936c88a2fa78e3864e434f9ee94a70
Secunia Security Advisory - Krystian Kloskowski has discovered a vulnerability in jetAudio, which can be exploited by malicious people to overwrite arbitrary files or to compromise a user's system.
4eacf917a648b66c9276b68fa7186c52ea05daad5147aa275056d449f6defff7