A remotely exploitable vulnerability has been discovered in multiple ACDSee Systems products. Specifically, the vulnerability is due to a boundary errorwhen processing XBM image files and can lead to a buffer overflow condition. This boundary error can allow attackers to inject and execute arbitrary code on the target host with the privileges of the logged-on user.
8aaace2e9bab5ab6a9e82b4fcf0560c7187f33c5aaa7c2f48503f4c3e335d130
The Joomla KsAdvertiser component suffers from a remote SQL injection vulnerability.
630d903ccf12182bfffdd6d11f31f409c0e76d20ad6fdd5d90765684d9dbbcf2
The Joomla Jobads component suffers from a cross site scripting vulnerability.
b90e73ea9dbacfd31e89038ed141ed8cb4f9b8148b9b2c49972f4a21f0e2b223
Exploit Suggester version 1.0 banner grabbing written in Python.
ddbbdd181ff31464e74c37e5fff221a03a03a22ab132e5469825c7c542f64170
Windows Live Messenger 2009 build 14.0.8089.726 suffers from a denial of service vulnerability.
83e91420249d49a3089b66cc8bdd66f401d2de56861f15c38b219e77ce8bc479
Debian Linux Security Advisory 1968-1 - It was discovered that pdns-recursor, the PowerDNS recursive name server, contains several vulnerabilities:
85d14261cdc79228793e37ee79b1af4e21838f5e1fbfe5c1e4ac367700ef6b0b
HLstatsX Community Edition version 1.6.5 suffers from a remote SQL injection vulnerability.
56d2c6fab6e3e74db4f2c72b8f1b918e40e5d53aeca9cde5a967a00c4658d53f
Mandriva Linux Security Advisory 2009-316 - The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than and CVE-2009-3720. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers This update provides a solution to these vulnerabilities. This vulnerability was discovered in the bundled expat code in various softwares besides expat itself. As a precaution the affected softwares has preemptively been patched to prevent presumptive future exploitations of this issue.
f62dec47bbc9c17a6a46964a20dbdad1d44bf7f4e959e624ff64c00668b591fb
DELTAScripts PHPLinks suffers from a remote SQL injection vulnerability.
51ce5347c798eee7b7a223cc15bbee9b820ce8594e019f7da85c53688849eebc
DELTAScripts PHPClassifieds suffers from a remote blind SQL injection vulnerability in rate.php.
9469359805060ff09f594e492d73db67b09c86069fa66dd197f89ca711072a2b
Mac OS X versions 10.5 and 10.6 suffers from a buffer overflow vulnerability in libc/strtod(3).
330c9d7d085bc82da2371af39d43273ccaac08ea388a26d47fb3bf3d953867d8
42 bytes small Linux/x86 eject /dev/cdrom shellcode.
6845eb0ce8a3937438736c190bccc676c056e126fe578c0e08ab2c7b82af726f
CMS Site version 1.0 suffers from a remote blind SQL injection vulnerability.
f00c3fef02f9f1908cd4199d3026385251c0dcd070efdf6bb7632094d97a22d1
UUSee ReliPlayer 2008 Active-X remote execution proof of concept exploit.
82982a0dfb2980cc95dc30af0d5debf9cb142fabc79725c120f79575e2e2ea24
Splayer XvidDecoder version 3.3 Active-X remote execution proof of concept exploit.
7e7b6ffb0b66f50d0ec10231dce5c3a172632c0a23b97607740d76cb3bfa3625
Adobe Illustrator version 14.0.0 suffers from an encapsulated postscript parsing vulnerability.
36d51dc58013b2cfec6c4a0d576a497293e4d1c9930c31950856dfae5527b0bf
Matlab R2009b suffers from an array overrun vulnerability that allows for code execution.
d0fecd045e6348016e15d944f4d2ab38c62e2de8cd2a7176be5367552b8e4e29
SopCast SopCore Active-X Control remote execution proof of concept exploit.
3cbde84b1ac09026fa0c1a96795fe8113e5235d33011ab05f474923285f139d3
Windows Scripts suffers form an access bypass vulnerability.
be3879e0cb8ca5a0937ed09b62d1e7baa478d34f67b3bed71ca5f555221786f0
J version 6.02.023 suffers from an array overrun vulnerability.
07186da5845d16072c45cb784eb5b3b228dfd83cfc5385b39f355ccccd3d8bc2
6 bytes small Linux/x86 fork bomb shellcode.
7c4ca0ae693f3a6498b2b9738bb96be525474aa80b0b75762221b8cbe8801d53
79 bytes small Linux/x86 break chroot shellcode.
fa9ae3203597c66d0efb9483276e75be0aa97909fa4208a354b06870704d02df