CitrusDB version 2.4.1 suffers from local file inclusion and remote SQL injection vulnerabilities.
3261f62b366c137cf812dbd6f9ba7bfb04e6a429ce61712fe444e9dd2f22640e
This whitepaper takes a closer look at a zero day attack that performs a privilege escalation to run commands in the system, which normally would be restricted because of the access level of the logged in user account. The particular vulnerability used in this case is "MS11-046: Vulnerability in Windows AFD.sys" which is a kernel level arbitrary memory overwrite, that is, the attacker can replace the content of that particular memory address with any value that he desires.
0a69787c386dfc16ddd8bbf4a7da17536e82ec889960d1f993506c6416d45a79
Digital Whisper Electronic Magazine issue 30. Written in Hebrew.
fd0245e6cf9a7fd74eeacfc293ff0fd3fe091f4d5f53405e2b1b3a53b5a8023c
Apache Hadoop suffers from a user impersonation vulnerability. Versions 0.20.203.0, 0.20.204.0, 0.20.205.0, 1.0.0 to 1.0.1, and 0.23.0 to 0.23.1 are affected.
f18d6fe1a65b53c7bf4c4fb8af009952274a8ee8ebd8a89c223cb57b2eec58b7
Dolibarr ERP and CRM suffers from an operating system command injection vulnerability. Versions 3.1.1 and below and 3.2.0 and below are affected.
12cbccf9e032e58bbcfb558ce094025f740cd5c49cca609440f370009e6de991
This Metasploit module exploits a vulnerability in the XSL parser of the XSL Content Portlet. When Tomcat is present, arbitrary code can be executed via java calls in the data fed to the Xalan XSLT processor. If XSLPAGE is defined, the user must have rights to change the content of that page (to add a new XSL portlet), otherwise it can be left blank and a new one will be created. The second method however, requires administrative privileges.
7495092f0f3708dd15dbc023f72927b1df95d3321e5d2ee8abfac8bf7f05f086
w-CMS version 2.0.1 suffers from cross site request forgery, cross site scripting, file disclosure and shell upload vulnerabilities.
a54a57a19b0b91498aa3b82d36c50cd8b5837a2b5eb5797aff500f8693ef7abf
This Metasploit module exploits a vulnerability found in TRENDnet SecurView Internet Camera's ActiveX control. By supplying a long string of data as the sFilter argument of the OpenFileDlg() function, it is possible to trigger a buffer overflow condition due to WideCharToMultiByte (which converts unicode back to) overwriting the stack more than it should, which results arbitrary code execution under the context of the user.
dbd0c9ab83279260de0fbf18041f491375843cf365e6a1c3874208c117b871ef
This Metasploit module exploits a buffer overflow in Csound before 5.16.6. The overflow occurs when trying to import a malicious hetro file from tabular format. In order to achieve exploitation the user should import the malicious file through csound with a command like "csound -U het_import msf.csd file.het". This exploit doesn't work if the "het_import" command is used directly to convert the file.
2cf13f78ded375c63bae698c2466604d37bb00327f7749fa76c00ef2cae3a62c