Secunia Security Advisory - Some vulnerabilities have been reported in Opera, which can be exploited by malicious people to disclose sensitive information, conduct spoofing attacks, or compromise a user's system.
88fe54145c98a6c77f19dcf391702805af0b52e3e2192115595845ce5a60db4e
Secunia Security Advisory - A vulnerability has been discovered in multiple Right Hemisphere products, which can be exploited by malicious people to compromise a user's system.
14353307c2e41e72afded14f381a7c12f875d3b4ab1ebf9501bb16d16e5e688e
Secunia Security Advisory - A vulnerability has been reported in certain SEIL routers, which can be exploited by malicious people to cause a DoS (Denial of Service).
a67c8b2f1ffbce8d65dbeb94ab655d5ba986946d78eb3844100f4477eb47a21d
Secunia Security Advisory - Some vulnerabilities have been reported in the SEIL/X1, X2, and B1 routers, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.
757f22898228138cec67aabdc17c5c6f38884c0f8951abe82d1158466ffb5791
Secunia Security Advisory - A vulnerability has been reported in Asterisk, which can be exploited by malicious people to bypass certain security restrictions.
6a0785c6b8e19fd05d60f34bffdeecbe45dafa97063601a4e67b6c36af15a78e
Secunia Security Advisory - A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions.
7df07d21dc8282778320fef097ac50275ec9e48dfc836a9d8e0fba6ba9147160
Improper parsing of the PDF structure by various McAfee products leads to evasion of detection of malicious PDF documents at scantime and runtime.
74ef4730aa72a94a3d6fb571ee56a4ae27ce295cced8e9dca51ce6c1107da9f3
Improper parsing of the PDF structure by various F-Secure products leads to evasion of detection of malicious PDF documents at scantime and runtime.
9f02651ae92071b892771f844ff0763ef40c20e6cfbe5d8fad99e50e0bae8ead
Improper parsing of the PDF structure by various Symantec products leads to evasion of detection of malicious PDF documents at scantime and runtime.
c5195c92e8b5682c7ce5d732aadf8cc4e11df997abb11873f6eaa932099bcaa0
This Metasploit module exploits the Wyse Rapport Hagent service by pretending to be a legitimate server. This process involves starting both HTTP and FTP services on the attacker side, then contacting the Hagent service of the target and indicating that an update is available. The target will then download the payload wrapped in an executable from the FTP service.
e7be07350ced9d99747f9c25b7062ad223b93cc2cecdcacbc714a84918ea9198
This is a Metasploit exploit for the Subversion date parsing overflow. This exploit is for the svnserve daemon (svn:// protocol) and will not work for Subversion over webdav (http[s]://). This exploit should never crash the daemon, and should be safe to do multi-hits.
c81084cf41376c203360dc2c4fd7badff87c3c33602d948682a6905bafe517a2
This Metasploit module exploits the nttrans overflow in Samba 2.2.x.
5485012d74d1e2165aa97cb81b381ddbcdc41bf7b0bc108b48359d6c99529124
This Metasploit module exploits a buffer overflow in RealServer 7/8/9 and was based on Johnny Cyberpunk's THCrealbad exploit. This code should reliably exploit Linux, BSD, and Windows-based servers.
a791dcf6b910dbfe084dccfc98c7268472ca44ed28cf5a7e685b3074addfcfe7
Mandriva Linux Security Advisory 2009-289 - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel. These range from buffer overflows to denial of service vulnerabilities.
9babe556d8283b253ed966788d3377e9f40ffcfb77f3fdc39643b95c68956950
VMware Security Advisory - VMware hosted products and ESX patches resolve two security issues.
8a6dabf23ceea7040d69ab75fbd444328ec53f5a0c451789e2a8b710ca4322bc
VMWare Workstation Virtual 8086 Linux Local ring0 exploit.
8104afbfcccb8e58dfb2979ea634a0801853cd451040e803ba52fb9281ac036d
The Wowd Search Client version 1.3.0 suffers from cross site scripting vulnerabilities.
9807eed58c800fd1707b12be371d05dd395abd117fae53448210f94b3ae35398
The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.
11c29fabf08ae4daa09a057ae1fa390aba9f0849c7c159c81902263c3415d832
Aruba Networks Security Advisory - A Denial of Service (DoS) vulnerability was discovered during standard bug reporting procedures. A malformed 802.11 association request frame causes a crash on the Access Point (AP) causing a temporary DoS condition for wireless clients. Prior successful security association with the wireless network is not required to cause this condition. The AP recovers automatically by restarting itself.
264b95b7689f6326fded006384a190b94d4d410ee035835d686d13a47aec04f7
Boloto Media Player version 1.0.0.9 local crash proof of concept exploit that creates a malicious .pls file.
6a901ac053ed7ae3865f920867a1003d0f4fc947a6b68e9f1e75e6868ce4b8e1
This Metasploit module exploits an integer overflow vulnerability in the unserialize() function of the PHP web server extension.
436f0bc029967671da472d8ca912c40b8636846cfd3d8f81e3a0fd1d8a030e1f
This Metasploit module exploits a stack based buffer overflow in the ntpd and xntpd service. By sending an overly long 'readvar' request it is possible to execute code remotely. As the stack is corrupted, this module uses the Egghunter technique.
009c6a0959755d8609b7f6680a3f93f21f0a42a6559a05ef0c29a657384e5fbd
This Metasploit module allows arbitrary command execution on an ephemeral port opened by Veritas NetBackup, whilst an administrator is authenticated. The port is opened and allows direct console access as root or SYSTEM from any source address.
a9bae98e0bcab8691966ff788261cc6dfa84dda7135a36c18d0e75e0eb5ee9ef
This Metasploit module uses a vulnerability in the OpenView Omniback II service to execute arbitrary commands. This vulnerability was discovered by DiGiT and his code was used as the basis for this module.
26c2c37df75303f2969c51dda36bcd7fb1d2c0584d3a1792600f47b04b5512d6
This Metasploit module exploits an arbitrary memory access vulnerability in the Quicktime for Java API provided with Quicktime 7.
42ae033dbe425fc32ab38f3fc3b946e80a302b5e5f4cecc84aa56930c3a7467d