Secunia Security Advisory - Some vulnerabilities have been reported in Sun Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
1cf5b0851acdf4d0caa4fd97e113c2e6a8b6f53cf39ef505348d10663cadc5a3
Secunia Security Advisory - Fedora has issued an update for php-pear-Net-Traceroute. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.
4df58e9e3224b13a298412ad5b271a66d24b101940acc193a64e8e15ce6c56c6
Secunia Security Advisory - Debian has issued an update for php5. This fixes multiple vulnerabilities, some of which have unknown impact and others that can be exploited by malicious, local users and by malicious users to bypass certain security restrictions, and by malicious people to cause a DoS (Denial of Service).
520d563dd3c951d8aefd2c187185b805c0587c4c4f9e8a00c27fff69ab9b0548
Secunia Security Advisory - Debian has issued an update for poppler. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise an application using the library.
0340eaa8f35767715bed5a4b8e7c4fe5aaed35327feb27fe7c16c1c3789502bb
Secunia Security Advisory - A vulnerability has been discovered in Serenity, which can be exploited by malicious people to compromise a user's system.
c69fe9d2ac8c5cc02f8f1f94df0d7e921e1642d783eadaa5b46a4be15cf46fbd
Secunia Security Advisory - Janek Vind has reported some vulnerabilities in SugarCRM, which can be exploited by malicious users to conduct SQL injection attacks, bypass certain security restrictions, and compromise a vulnerable system.
b0b862aa3fbb12216a2decdfd991346dbf1bf1768dc42e102470fdacf3fad9bc
Secunia Security Advisory - Some vulnerabilities have been reported in Ingate Firewall and SIParator, which can be exploited by malicious people to cause a DoS (Denial of Service).
a295b093688648b938b06ea201eb52b931d78d900d24cd2fc39895c095a10c96
This Metasploit module exploits a username sprintf stack overflow in GAMSoft TelSrv 1.5. Other versions may also be affected. The service terminates after exploitation, so you only get one chance!
bfbc833e65270019d840fbfcd6e70dac6677788a965836dafaaafb7b81a9b917
This Metasploit module exploits a vulnerability in the 3Com 3CDaemon FTP service. This package is being distributed from the 3Com web site and is recommended in numerous support documents. This Metasploit module uses the USER command to trigger the overflow.
815045260e465802c35cbda9285c0622bfe5f32298f8df68633b64d3f5a3b2a0
This Metasploit module exploits a buffer overflow in ACDSee 9.0. When viewing a malicious XPM file with the ACDSee product, a remote attacker could overflow a buffer and execute arbitrary code.
706f221bbef230a67ec4e852b1c3aaf50be9f1de72a3b66900a221e061c04a9e
This Metasploit module exploits a stack overflow in activePDF WebGrabber 3.8. When sending an overly long string to the GetStatus() method of APWebGrb.ocx (3.8.2.0) an attacker may be able to execute arbitrary code. This control is not marked safe for scripting, so choose your attack vector accordingly.
9163f61dc97f511b2e58317df4a025bc80a9b3778c59ee7308c803bdd503b511
This Metasploit module exploits a buffer overflow in Adobe Reader and Adobe Acrobat Professional 8.1.1. By creating a specially crafted pdf that a contains malformed Collab.collectEmailInfo() call, an attacker may be able to execute arbitrary code.
518aaf1102414303ab4491f0657827b243a86c8bd0569ed8dd01e3e5a762cfb3
This Metasploit module exploits a buffer overflow in Adobe Reader and Adobe Acrobat Professional < 8.1.4. By creating a specially crafted pdf that a contains malformed Collab.getIcon() call, an attacker may be able to execute arbitrary code.
d4a91c898b2b649b678e2e14b004ed1827360112073820eebd1bb1198e2c3e7a
This Metasploit module exploits a heap-based pointer corruption flaw in Adobe Reader 9.0.0 and earlier. This Metasploit module relies upon javascript for the heap spray.
c70e7201fb6677429aa372f8e4d78ab8b21364ee9a98a1ffc919b117d64949be
This Metasploit module embeds a Metasploit payload into an existing PDF file. The resulting PDF can be sent to a target as part of a social engineering attack.
09a56101a149879ad1e7dd5419aa9168cb66336439178af46431113ea67abec4
This Metasploit module exploits a authentication bypass vulnerability which allows remote attackers to upload and execute arbitrary code.
6a9990e0a446456d233f36ace46eca260847af5ae39b82be3254f1d524a2d1af
This Metasploit module exploits a buffer overflow in Adobe Reader and Adobe Acrobat Professional < 8.1.3. By creating a specially crafted pdf that a contains malformed util.printf() entry, an attacker may be able to execute arbitrary code.
97136b48e204e50ed975b0d248d3e807fc8bfc21f553834a21665ee774475b17
This Metasploit module exploits a flaw in the handling of AOL Instant Messenger's 'goaway' URI handler. An attacker can execute arbitrary code by supplying a overly sized buffer as the 'message' parameter. This issue is known to affect AOL Instant Messenger 5.5.
3f9f669a44333e450e5fc4a71660d89955d2e85848f584c1c6d9d52d001ed850
This Metasploit module exploits a buffer overflow in AOL's AIM Triton 1.0.4. By sending an overly long CSeq value, a remote attacker could overflow a buffer and execute arbitrary code on the system with the privileges of the affected application.
1400d3cfff7200162909897a766209788942d0f1caac020f8e267b40af56e5cd
This Metasploit module exploits a stack overflow in EMC AlphaStor 3.1. By sending a specially crafted message, an attacker may be able to execute arbitrary code.
8d5b6a48b3d7f5a8de8e276bf81f237545164da6f22f4d76a285254c369b1853
This Metasploit module exploits a buffer overflow in Altap Salamander <= v2.5. By creating a malicious file and convincing a user to view the file with the Portable Executable Viewer plugin within a vulnerable version of Salamander, the PDB file string is copied onto the stack and the SEH can be overwritten.
ebf80be5e1b04701f27a0c9bc26e038dbcf822655731d47db5156edbcff7ef55
Alt-N WebAdmin is prone to a buffer overflow condition. This is due to insufficient bounds checking on the USER parameter. Successful exploitation could result in code execution with SYSTEM level privileges.
07321bfe13486c72db95bf9c5992da051b5fe4111a96286914e261a01257e730
This Metasploit module exploits a stack overflow in the Amaya v11 Browser. By sending an overly long string to the "bdo" tag, an attacker may be able to execute arbitrary code.
412b394380677fab8c8871f5e96e3347d60f33fa5e46d1fa954bd1b5be97d7b8
This Metasploit module exploits a buffer overflow vulnerability in the LoadAniIcon() function of USER32.dll. The flaw is triggered through Outlook Express by using the CURSOR style sheet directive to load a malicious .ANI file. This vulnerability was discovered by Alexander Sotirov of Determina and was rediscovered, in the wild, by McAfee.
ff5578fdfc8c36ccaad517474220f3b7300ff9d3ecf2bb352b81b0e1dffd7516
This Metasploit module exploits a stack-based buffer overflow in AOL IWinAmpActiveX class (AmpX.dll) version 2.4.0.6 installed via AOL Radio website. By setting an overly long value to 'ConvertFile()', an attacker can overrun a buffer and execute arbitrary code.
b255bff048b696b83be33b74127329a23af7e1d356d9b41e180802e9add63785