This Metasploit module exploits a stack overflow in the Arkeia backup client for the Mac OS X platform. This vulnerability affects all versions up to and including 5.3.3 and has been tested with Arkeia 5.3.1 on Mac OS X 10.3.5.
ebc9848511c662d2d6efa684039176f4dfa816c15b3dfcced903cb341a9beab5
This Metasploit module exploits a stack overflow in the AppleFileServer service on MacOS X. This vulnerability was originally reported by Atstake and was actually one of the few useful advisories ever published by that company. You only have one chance to exploit this bug. This particular exploit uses a stack-based return address that will only work under optimal conditions.
d6bfb60bac8c1bd2da8a4cbf66db3c5ce0562ab709e98ce7361c7a2a4864ea31
This Metasploit module exploits a stack overflow in the NetWare CIFS.NLM driver. Since the driver runs in the kernel space, a failed exploit attempt can cause the OS to reboot.
4bba3e7a44ce638324115d8e506825063bbbb75c408bacc8182766ec0d144501
Secunia Security Advisory - Red Hat has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service).
e416cd2107d6cc5d04c7c6a84753cf176f3b581ca1cba77c424819a9ca0a7e15
Secunia Security Advisory - A vulnerability has been reported in VMware Server, VMware ESX, and VMware ESXi, which can be exploited by malicious people to disclose sensitive information.
702bf68d8c7f421e1a7c5f0c7e1771d9c06c5612914b630d6906097504830fac
Secunia Security Advisory - Red Hat has issued an update for samba. This fixes some vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information, and by malicious users to bypass certain security restrictions, disclose sensitive information and cause a DoS (Denial of Service).
c575ba580cb8a745ed58f3e616d26ec2a05b237d2c0802e7147b56731e41cdec
Secunia Security Advisory - A security issue has been reported in Sun Solaris, which can be exploited by malicious, local users to bypass certain security restrictions.
c757b94a87736b0c71c0242786bd03602fc0f770cbf6923f7d8b73c62305ef48
Secunia Security Advisory - A vulnerability has been reported in various VMware products, which can be exploited by malicious, local users in a guest virtual machine to gain escalated privileges.
81f11416d276e25b00acbba4475236cd29aa9cbd0b389284d68ec84bc766a39f
Secunia Security Advisory - Maxim A. Kulakov has discovered a security issue in multiple Rising products, which can be exploited by malicious, local users to gain escalated privileges.
9bd11d50dbfbdae6ae0d8fb546765dd63f2a76ebc8226324e09a90d0ad64775d
Secunia Security Advisory - Some weaknesses have been reported in various McAfee products, which can be exploited by malware to bypass the scanning functionality.
4115b59e09887b8e9124b3a611dee1cc63427cce1dc9a2711e5ab7eeebe9e8c8
KDE suffers from multiple insufficient validation vulnerabilities that can result in the execution of active content. Versions below 4.3.2 are affected.
ecdec1474c60e06f8d03ae23981515ca996b2e57443237988e158fc66e77b190
PHP168 version 6.0 suffers from a remote command execution vulnerability.
7d3ac50b84ef1608fd1f5fe0d8857116e4802f6cc6d2420ed0136ca88706a75a
Secunia Research has discovered a vulnerability in Mozilla Firefox, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an array indexing error while allocating space for floating point numbers. This can be exploited to trigger a memory corruption when a specially crafted floating point number is processed. Successful exploitation allows execution of arbitrary code.
05b17d26fc240e5536f74dc59738ad403661d05c0d57cc1e692e5b1e21dc161c
Debian Linux Security Advisory 1921-1 - Peter Valchev discovered an error in expat, an XML parsing C library, when parsing certain UTF-8 sequences, which can be exploited to crash an application using the library.
a8c61f99857e60177edcb2d381f99d669fa2b271562368559e0a5e2d3e388682
Secunia Security Advisory - Red Hat has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, or compromise a user's system.
d299fe95d0ce342e7b4c0f72f4e3e186cd845d479baaaa026710a4341016c1a7
Secunia Security Advisory - Red Hat has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, manipulate certain data, or compromise a user's system.
6dea2b14dc54b13b7e26a3788f336c4db30d7cb097c50c3adaffe2724a872ca9
Secunia Security Advisory - A vulnerability has been reported in Bftpd, which potentially can be exploited by malicious users to cause a DoS (Denial of Service).
deedb5e698667a0f7eceef49a6de8dbddc97b0dfc1fd805015bf3c04518e832c
Secunia Security Advisory - Some vulnerabilities have been reported in Opera, which can be exploited by malicious people to disclose sensitive information, conduct spoofing attacks, or compromise a user's system.
88fe54145c98a6c77f19dcf391702805af0b52e3e2192115595845ce5a60db4e
Secunia Security Advisory - A vulnerability has been discovered in multiple Right Hemisphere products, which can be exploited by malicious people to compromise a user's system.
14353307c2e41e72afded14f381a7c12f875d3b4ab1ebf9501bb16d16e5e688e
Secunia Security Advisory - A vulnerability has been reported in certain SEIL routers, which can be exploited by malicious people to cause a DoS (Denial of Service).
a67c8b2f1ffbce8d65dbeb94ab655d5ba986946d78eb3844100f4477eb47a21d
Secunia Security Advisory - Some vulnerabilities have been reported in the SEIL/X1, X2, and B1 routers, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.
757f22898228138cec67aabdc17c5c6f38884c0f8951abe82d1158466ffb5791
Secunia Security Advisory - A vulnerability has been reported in Asterisk, which can be exploited by malicious people to bypass certain security restrictions.
6a0785c6b8e19fd05d60f34bffdeecbe45dafa97063601a4e67b6c36af15a78e
Secunia Security Advisory - A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions.
7df07d21dc8282778320fef097ac50275ec9e48dfc836a9d8e0fba6ba9147160
Improper parsing of the PDF structure by various McAfee products leads to evasion of detection of malicious PDF documents at scantime and runtime.
74ef4730aa72a94a3d6fb571ee56a4ae27ce295cced8e9dca51ce6c1107da9f3
Improper parsing of the PDF structure by various F-Secure products leads to evasion of detection of malicious PDF documents at scantime and runtime.
9f02651ae92071b892771f844ff0763ef40c20e6cfbe5d8fad99e50e0bae8ead