Nuggetz CMS version 1.0 suffers from a remote code execution vulnerability.
310b44cbfe418b0343922a14821545b165d5feb28615ca8605c5e3bdbfd392ed
The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. Metasploit is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.
d9c8449f489efcce2ae006e4ed806ce911cb7fc671593232151ba25f8b098095
This Metasploit module exploits a buffer overflow in the Eureka Email 2.2q client that is triggered through an excessively long ERR message.
215303af9fa1743f8f050624ab0a364dc6fdc4218fbee1b68806a9c6c18c6bd6
Free ASP suffers from a remote shell upload vulnerability.
9bba26c9ce7fe30951060c79b0d86c5e96c82e0a5289088edf6fdf17cd77bf7c
PHP Inventory version 1.2 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
5b899f60b55daf260d568e9d4308e55bcf5bb478b1e25e983b52b60e485267eb
OPMANAGER suffers from a remote blind SQL injection vulnerability.
ecd6d4686ed778d90f4f09e7257a17fc3ff354a7f8a9d56ce86276e63ba28e71
HP Security Bulletin - Potential security vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). These vulnerabilities could be exploited remotely to execute arbitrary code.
4b95345dd39e85718053b8c02acbf3b6063a33c0f0367ad4bf7808042a164723
oBlog suffers from cross site scripting, cross site request forgery, and a lack of brute forcing protection.
b4501eeff178b670963c76b7bb82ce0b8dd258827b16de5521355d3f7fd7f593
HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running VRTSweb version 5.0. The vulnerability could be exploited remotely to execute arbitrary code or increase privilege.
c065bfd6e8c71363a98cbc56e26f1bf6eb10523be76c23e498ac52558a284d57
Core Security Technologies Advisory - The TestLink Test Management and Execution System suffers from cross site scripting and remote SQL injection vulnerabilities. Versions below 1.8.5 are affected.
2bbdda7eafe32f627a758e47e2c6db60062bf70f69910951129140b25d14cab6
iDefense Security Advisory 12.08.09 - Remote exploitation of a heap corruption vulnerability in Microsoft Corp.'s Indeo32 Codec could allow an attacker to execute arbitrary code in the context of the affected user. iDefense has confirmed that ir32_32.dll version 3.24.15.3, as included in fully patched Windows XP as of October 2008, is vulnerable. All previous versions are suspected to be vulnerable.
888ecfafd140b35868b4ef6ea7ef78a496f76eb5faa2b5557aec406398d77738
iDefense Security Advisory 12.08.09 - Remote exploitation of an integer overflow vulnerability in Microsoft Corp.'s WordPad could allow an attacker to execute arbitrary code with the privileges of the current user. iDefense has confirmed the existence of this vulnerability in WordPad version 5.1 for Windows XP SP3 and SP2. Other versions of Windows may also be affected. However, Vista and Server 2008 are not affected as they no longer contain the Word97 converter.
4a7ab1715bf7bf9f3e49fd7c137a769d655d1bc36bc533cc4eec0e9fb9cba6a6
iDefense Security Advisory 12.08.09 - Remote exploitation of a memory corruption vulnerability in Microsoft Corp.'s Internet Explorer could allow an attacker to execute arbitrary code with the privileges of the current user. iDefense confirmed the existence of this vulnerability in Internet Explorer versions 6 and 7. Internet Explorer versions 5 and 8 do not appear to be affected.
02c288bac610a30750b24e5ac7d76b96ca73822fa4f83a51387d4eb8f92e1474
Ubuntu Security Notice 869-1 - David Ford discovered that the IPv4 defragmentation routine did not correctly handle oversized packets. A remote attacker could send specially crafted traffic that would cause a system to crash, leading to a denial of service. (The fix was included in the earlier kernels from USN-864-1.) Akira Fujita discovered that the Ext4 "move extents" ioctl did not correctly check permissions. A local attacker could exploit this to overwrite arbitrary files on the system, leading to root privilege escalation.
7f47fd71c13c0fa03884c9c33d24664d1e4439bd5e70aae109e817c88809a2c0
It appears that the recently discovered vulnerability in GeN3 version 1.3 also works against GeN3 version 1.4.
f129b156270f9e9b305e018efa6a922f749a8f8c21c27ca416a0d76f8945d15c
Mandriva Linux Security Advisory 2009-329 - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel.
08f4f173bf8eb330eefa90013138ef9fc8a4b99f9374ed90921abb4467c6c6de
It was discovered that Piwik versions 0.4.5 and below unserialize data from the user supplied cookie. By unserializing some of Piwik's objects it is possible to write arbitrary files to writable locations on the webserver which can be used to upload e.g. PHP files to writable directories within the webserver's document root which usually exist in a standard Piwik installation. In newer versions of Piwik it is also possible to execute arbitrary PHP code directly.
a00c0312ce8b82b8cd2813df0c76f936110fcb0c4c828532db7a31e0622117d2
PHPIDS versions 0.6.2 and below unserializes() user input which allows an attacker to send a carefully crafted cookie that when unserialized can utilize existing classes which e.g. can lead to upload of arbitrary files or execution of arbitrary PHP code in Zend Framework Applications.
2b8975c5803e603dad1a6004fc5744a745207c5abcd0dc71d48308c12e249650
Fortinet's FortiGuard Labs has discovered memory corruption vulnerabilities in the Adobe Flash Player.
9a052fa1415f954029989d6440286dc0b418f6bae555c06990af4d02c9892652
A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ovwebsnmpsrv.exe application which is launched when a request is received for the jovgraph.exe CGI application. This process copies the contents of the 'sel' POST variable a user-controllable amount of times into a static stack buffer. By repeating a specific string as the contents of the 'arg' POST variable this buffer can be overflowed leading to arbitrary code execution.
28ad9e9af0c800bc5f8a1ddce5cb1893870ca2cd7788f4e97910230fc8ae3a63
A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the snmpviewer.exe CGI application. This process copies the Host header from HTTP requests into a fixed-length buffer located on the stack via a call to strcat. By specifying a string length within a certain range this buffer can be overflowed leading to arbitrary code execution.
b0d41d19ab8754232f64d092b29530e20456986f27ab0588a3fc3fed689c8cba
A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ovalarm.exe CGI application. If the OVABverbose POST variable is set, this process takes the value of the Accept-Language HTTP header and copies it without any length checks into a 0x100 byte stack buffer. By providing a large enough string this buffer can be overrun leading to arbitrary code execution.
7d20c5ff25eafe4a0d9a9a4b4d08d40f2a49c728269fcfbe907eac2b47d120d1
A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the OvWebHelp.exe CGI application. During a string concatenation the process takes the value of the Topic POST variable and copies it without any length checks into a static 0x400 byte heap buffer. By providing a large enough string this buffer can be overrun leading to arbitrary code execution.
bc3a170b7c023d93cce2e71f5f18aae14f58b419c61aa33eea31e2d81a8e8cdf
A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the webappmon.exe CGI application. This process copies the Host header from HTTP requests into a fixed-length buffer located in the .DATA section via a call to strcat(). By specifying a string length within a certain range this buffer can be overflowed leading to arbitrary code execution.
e9285c3564b9a9fed271a5fa68086e36a26f9e7fd64d6783330ec170d71256dd
sqlsus is a MySQL injection and takeover tool, written in perl. Via a command line interface that mimics a mysql console, you can retrieve the database structure / contents, inject a SQL query, download files from the web server, upload and control a backdoor, and much more.
3ac31ec61fc3009c88c24749920a68b2abfeec486f2dfcc6a9678ed802e7e157