Project Bidding Script version 1.1 suffers from a remote SQL injection vulnerability.
6884e6d3fc544d539625b53b71ecac484a8da368d85210f3208a8f77972e58b0
ICDental Clinic version 1.2 suffers from a remote SQL injection vulnerability.
bcb502de23de3e8d7c3848e457535c5beec6d7a23e3e25e2ea3d5b1b96095877
ICEstate version 1.1 suffers from a remote SQL injection vulnerability.
f5095535fba7ead1dae771809959ae5ebfc839a08f3b3f1fd973512226d8d2bf
ICHelpDesk version 1.1 suffers from a remote SQL injection vulnerability.
c576671940925d9c3b8f18e3f38ab07667e59260b9e31409d6a9f6cdda91832d
This Metasploit module exploits a command injection flaw found in the get_log_line function found within Util.pm. The vulnerability is triggered due to an unsanitized $r_file parameter passed to a string which is then executed by the system
14ebb7003ddd92d32096f32666e2bc54c1e1aace1fdf8a426fd5d68b7e981878
This Metasploit module exploits a stack based buffer overflow found in Sielco Sistemi Winlog versions 2.07.16 and below. The overflow is triggered during the parsing of a maliciously crafted packet
b7800da35175855406221f63922413c3f00345939383e69eea5f9f84153c8730
This Metasploit module exploits a vulnerability within the code responsible for parsing client requests. When reading in a request from the network, a 32-bit integer is read in that specifies the number of bytes that follow. This value is not validated, and is then used to read data into a fixed-size stack buffer.
7fa33e91d816df5d477c2e8b7d0d36b10a92882d363ab5e703d2da1e002dfcf1
This Metasploit module exploits a stack buffer overflow found in Lockstep Backup for Workgroups versions 4.0.3 and below. The vulnerability is triggered when sending a specially crafted packet that will cause a login failure.
613182e151de70de17f950e560dafa0845ff260e64016fcceddf19108d53136c
This Metasploit module exploits a stack based buffer overflow vulnerability found in EMC Alphastor Device Manager. The overflow is triggered when sending a specially crafted packet to the rrobotd.exe service listening on port 3000. During the copying of strings to the stack an unbounded sprintf() function overwrites the return pointer leading to remote code execution.
2879d01f8913ead6a90cab85b336de984e013e193a30e5d1247f6989b0fa4674
This Metasploit module exploits a stack based buffer overflow found in EMC Alphastor Library Manager version < 4.0 build 910. The overflow is triggered due to a lack of sanitization of the pointers used for two strcpy functions.
b127f7dc2ea89cebfead7d38c3b78d175b3375c0034def2f4e3b3e6395d6d22a
Enterprise Edition Payment Processor Script version 3.7 suffers from a remote SQL injection vulnerability.
bb670a612c257a376b24a0c3b905110c33c5b03f5a86fe173a64834e6cad5c7f
Adserver Script version 5.6 suffers from a remote SQL injection vulnerability.
380d30e6d141754adc8e9e89ac0e323b75ee10df168379a9dd2ae3872550e1ea
PTC KSV1 Script version 1.7 suffers from a remote SQL injection vulnerability.
df39be1e552f2addb9c73d75a25d694ccbceafefe89e64415c533722b50004e2
ICLowBidAuction version 3.3 suffers from a remote SQL injection vulnerability.
c2ff563de48fcf12f67899a93d3eecbd106cad10a3e8737d9e72c5c9ef87aab4
This Metasploit module exploits a stack based buffer overflow found in Fatek Automation PLC WinProladder version 3.11 Build 14701. The vulnerability is triggered when a client connects to a listening server. The client does not properly sanitize the length of the received input prior to placing it on the stack.
3f6a8bfbce639093ae67dd696b79c8bcb1d78b6454f530630255e7b1576b6ad6
This Metasploit module exploits a file upload vulnerability found in EMC Connectrix Manager Converged Network Edition <= 11.2.1. The file upload vulnerability is triggered when sending a specially crafted filename to the FileUploadController servlet found within the Inmservlets.war archive. This allows the attacker to upload a specially crafted file which leads to remote code execution in the context of the server user.
6bb5591eafa616f5e36341752eb9b1509345a01bc873e86d440ac1a861dcf3a4
This Metasploit module exploits a fileupload vulnerability found in EMC Connectrix Manager Converged Network Edition versions 11.2.1 and below. The file upload vulnerability is triggered when sending a specially crafted filename to the FileUploadController servlet. This allows the attacker to upload a malicious jsp file to anywhere on the remote file system.
3c72a6b492a3a241415f122e7dda5e8764651e326570e7896eb20d1507455311
Microsoft .NET Framework remote code execution exploit toolkit. Affects versions 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7.
3260f18b309e9533f422c85c752e7f6bbc082e52c961ffb3e69ec56a8cf05483
Slackware Security Advisory - New libzip packages are available for Slackware 14.2 and -current to fix security issues.
0b96de93a1bdbed53ab0ac390e6e17025b9150bc82e1705cc940e3bfb8bc99a6
Ubuntu Security Notice 3414-1 - Leo Gaspard discovered that QEMU incorrectly handled VirtFS access control. A guest attacker could use this issue to elevate privileges inside the guest. Li Qiang discovered that QEMU incorrectly handled VMWare PVSCSI emulation. A privileged attacker inside the guest could use this issue to cause QEMU to consume resources or crash, resulting in a denial of service. Various other issues were also addressed.
1adcd2988454f81ab413378d9018f75abff0e1767bf62ec849be6a4459c7be99
Red Hat Security Advisory 2017-2702-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update upgrades Flash Player to version 27.0.0.130. Security Fix: This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletin listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content.
5123fb565df7d75baa9893385bd5e03d644a620c57b671e6d4241bd00b6b06f8
Ubuntu Security Notice 3417-1 - Daniel Genkin, Luke Valenta, and Yuval Yarom discovered that Libgcrypt was susceptible to an attack via side channels. A local attacker could use this attack to recover Curve25519 private keys.
298bc96f884a7028cfe84991472815cd7c6a4ec9808bae9ae4ae74a9eec57944
Red Hat Security Advisory 2017-2731-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: A stack buffer overflow flaw was found in the way the Bluetooth subsystem of the Linux kernel processed pending L2CAP configuration responses from a client. On systems with the stack protection feature enabled in the kernel, an unauthenticated attacker able to initiate a connection to a system via Bluetooth could use this flaw to crash the system. Due to the nature of the stack protection feature, code execution cannot be fully ruled out, although we believe it is unlikely. On systems without the stack protection feature, an unauthenticated attacker able to initiate a connection to a system via Bluetooth could use this flaw to remotely execute arbitrary code on the system with ring 0 privileges.
4602b1a299e1c814f7fe652bad84a8dc011ab0470d2b1e7436ad9acd20762fbb
Red Hat Security Advisory 2017-2732-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.
e97790ffb2c62a5f6ac7783e733db7702695735b7347bc0d0a507d7d31a7cdeb
Red Hat Security Advisory 2017-2728-01 - PostgreSQL is an advanced object-relational database management system. The following packages have been upgraded to a later upstream version: postgresql. Security Fix: It was found that authenticating to a PostgreSQL database account with an empty password was possible despite libpq's refusal to send an empty password. A remote attacker could potentially use this flaw to gain access to database accounts with empty passwords.
4cd3c8541c4de30baa9269f69b84b7120b92899f2bb4fcce29e4e3c2490ef675