Secunia Security Advisory - Multiple vulnerabilities have been reported in various VMware products, which can be exploited by malicious, local users to gain escalated privileges or cause a DoS (Denial of Service) or by malicious people to compromise a vulnerable system.
69e4a933876b192e79cd5ee6b804200e
Secunia Security Advisory - Doz has reported a vulnerability and a security issue in WebBatch, which can be exploited by malicious people to disclose system information or conduct cross-site scripting attacks.
ef46cb8a709b7998cdfc96380a942504
Secunia Security Advisory - nights_shadow has discovered a vulnerability in PhpWebGallery, which can be exploited by malicious people to conduct script insertion attacks.
86df89e9ef257187c7db8a4751a9d5ee
VMware Security Advisory - Updates have been released for arbitrary code execution, denial of service, and other various vulnerabilities in VMware.
75a1ac8862ee8690edac336336695646
Debian Security Advisory 1364-2 - Several vulnerabilities have been discovered in the vim editor. Ulf Harnhammar discovered that a format string flaw in helptags_one() from src/ex_cmds.c (triggered through the "helptags" command) can lead to the execution of arbitrary code. Editors often provide a way to embed editor configuration commands (aka modelines) which are executed once a file is opened. Harmful commands are filtered by a sandbox mechanism. It was discovered that function calls to writefile(), feedkeys() and system() were not filtered, allowing shell command execution with a carefully crafted file opened in vim. This updated advisory repairs issues with missing files in the packages for the oldstable distribution (sarge) for the alpha, mips, and mipsel architectures.
b58a312c9824db35ed8b97aedf36ed0a
Gentoo Linux Security Advisory GLSA 200709-12 - Poppler and Xpdf are vulnerable to an integer overflow in the StreamPredictor::StreamPredictor function, and a stack overflow in the StreamPredictor::getNextLine function. The original vulnerability was discovered by Maurycy Prodeus. Note: Gentoo's version of Xpdf is patched to use the Poppler library, so the update to Poppler will also fix Xpdf. Versions less than 0.5.4-r2 are affected.
4ba5f6def2b0f95aee10b243b6c4f937
Ubuntu Security Notice 515-1 - It was discovered that t1lib does not properly perform bounds checking which can result in a buffer overflow vulnerability. An attacker could send specially crafted input to applications linked against t1lib which could result in a DoS or arbitrary code execution.
b7118d409a112d9371ea0dc2ee682004
Proof of concept exploit for rFactor versions 1.250 and below that suffer from buffer overflow and code execution vulnerabilities.
2c04ffd658ffb146eb12c1a46c568bfb
AuraCMS version 2.1 suffers from a remote file upload vulnerability.
08ddf89a5cf41e1da156839ca1ff7a5e
The WBR3404TX broadband router suffers from a cross site scripting vulnerability in the web based management interface.
c18e371c0722c81031ca3c2952e3a109
HP Security Bulletin - A potential security vulnerability has been identified in HP-UX running the logins(1M) command. This command incorrectly reports password status. As a result password issues may not be detected, allowing remote unauthorized access.
49084d4aa243b4dd35a9878e3d7681e6
HP Security Bulletin - Various potential security vulnerabilities have been identified in Microsoft software that is running on the Storage Management Appliance (SMA). Some of these vulnerabilities may be pertinent to the SMA, please check the table in the Resolution section of this Security Bulletin.
bec42473e5d89d7c4cd6864e9a6ac162
Mercury/32 version 4.52 IMAPD search command post-auth overflow exploit.
e7d12adf8d60215adacc5347c0b7ee3d
Yahoo! Messenger version 8.1.0.421 CYFT Object arbitrary file download exploit.
d198d92639457575d34c81e3bf8d009b
jetAudio version 7.x ActiveX code execution exploit that makes use of DownloadFromMusicStore().
55bc80287bbab71a6271c82ff7fd7dec
p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to the remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Note that this version is the win32 compiled version. Original code by Michal Zalewski, compiling by David Coomber.
fb66dfbdde92a2e8f81bb057a16205b5
Flip versions 3.0 and below remote password hash disclosure exploit.
70661dab3d3fc5f17b36e8dd18e9dec1
Flip versions 3.0 and below remote admin creation exploit.
72cd124ae963f9060ec332bb4eb9870e
phpBB Plus versions 1.53 and below suffer from a remote file inclusion vulnerability.
773fdae05d4d3177f6aab9fb83c7bc30
OneCMS version 2.4 remote SQL injection exploit that makes use of userreviews.php.
b93f48a7a3fe2c49a9bfaa3cb7d74db5
Streamline PHP Media Server version 1.0-beta4 suffers from a remote file inclusion vulnerability.
ad30d84d02d9411294ad87cba00c052e
dBlog CMS is susceptible to a direct database download vulnerability.
4857d269c5d84522220d4d7f38f81dbf
A vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of the Automated Solutions Modbus TCP Slave ActiveX Control. Authentication is not required to exploit this vulnerability. The specific flaw exists within MiniHMI.exe which binds to TCP port 502. When processing malformed Modbus requests on this port a controllable heap corruption can occur which may result in execution of arbitrary code.
0d534b93256518fcf493b72761cb45fa
Secunia Security Advisory - Shell has discovered a vulnerability in AOL Instant Messenger, which can be exploited by malicious people to execute arbitrary script code.
f034b83e3019261d0138f2ef398b5f18
Secunia Security Advisory - Krystian Kloskowski has discovered a vulnerability in jetAudio, which can be exploited by malicious people to overwrite arbitrary files or to compromise a user's system.
b2e5edaea3fdfb14f470bf8def11b4d2