3dl.am script Mtxkl Raidrush suffers from a directory traversal vulnerability.
ef641ec6615369fa4ad61a8289948915fb64db161474a396bbe03bdce503403e
Whitepaper called Cisco VoIP Phone - A Hackers Perspective.
2c496289f0aca8550749404683c6af282e9decfb23e9186b238a7db76158f79c
The Joomla Joomdle component versions 0.24 and below suffer from a remote SQL injection vulnerability.
18a11204fa4c7562f0e132f72db346d6c0c2ffd7e0b5fecb25a342472d28929a
Whitepaper called Linux Buffer Overflow Tutorial III. Written in Indonesian.
068e45d875efae58e340ad90b4db8d71bb78b1d4a9e94b2def4fc0769ee305b2
The Joomla ITArmory component versions 0.1.4 and below suffer from a remote SQL injection vulnerability.
25eaa7e9ae09769f184b27863ed884dc9580e39d93ea900ac1f38515884cb529
Joomla Ozio Gallery suffers from a remote SQL injection vulnerability.
16e938780e8a05708d0545e656f2a7cb8f3aa64d4f345e9ed3ba31cecfd73c26
AKY Blog suffers from a remote SQL injection vulnerability.
c3a762b0e66ad9d02464352076649c078bb846a6e7935d488f9cc7243ebbb179
Open Realty versions 2.x and 3.x suffer from a cross site scripting vulnerability.
4edffd92873f6d0432b445dc3aee21e798f34b7ee06ac97855d237da9d1a53ac
sNews version 1.7 suffers from a remote SQL injection vulnerability.
8329c73e296f2263dee0d22900f0090b71d972823e0815a6ee378817958895c5
DM Filemanager version 3.9.11 suffers from a remote shell upload vulnerability.
904489762eb37640de806a4fd5670e130094b0a27d057968fbc176b572dcc444
vBulletin version 3.8.6 suffers from an information disclosure vulnerability in faq.php.
108c236ac3fab0c324e45083ac23839cfa7fc8d0ead4c2c1bd6c28cd0e132ebb
ValidForm Builder Script suffers from a remote command execution vulnerability.
75f6e57e5d860b0e0dccba8af1959d7e6c2335c705a1ab05b97365e2d1b06193
Media Player Classic - Home Cinema suffers from a heap overflow that allows for denial of service.
30e227492e64f775662af66505e9dcafe5e3d54f6030b593accb7af46202fe3d
It has been discovered that certain e-mail message cause Outlook to create Windows shortcut-like attachments or messages within Outlook. Through specially crafted TNEF streams with certain MAPI attachment properties, it is possible to set a path name to files to be executed. When a user double clicks on such an attachment or message, Outlook will proceed to execute the file that is set by the path name value. These files can be local files, but also file stored remotely for example on a file share. Exploitation is limited by the fact that its is not possible for attackers to supply command line options.
ab93992908b391872063eb727124195509f9b1f508ffa2326a5648dea3d63372
It has been discovered that certain e-mail message cause Outlook to create Windows shortcut-like attachments or messages within Outlook. Through specially crafted TNEF streams with certain MAPI attachment properties, it is possible to set a path name to files to be executed. When a user double clicks on such an attachment or message, Outlook will proceed to execute the file that is set by the path name value. These files can be local files, but also file stored remotely for example on a file share. Exploitation is limited by the fact that its is not possible for attackers to supply command line options.
374645d7192e9108d3159d89b407cc6d190d245e40fe2cd224e4b6852b6629ec
This Metasploit module exploits a stack buffer overflow in the RPC interface of the Microsoft DNS service. The vulnerability is triggered when a long zone name parameter is supplied that contains escaped octal strings. This Metasploit module is capable of bypassing NX/DEP protection on Windows 2003 SP1/SP2. This Metasploit module exploits the RPC service using the \\\\DNSSERVER pipe available via SMB. This pipe requires a valid user account to access, so the SMBUSER and SMBPASS options must be specified.
e9b0527ebdd2cf04d5a8b77d31a915ef02a016adafac8d7e3310e2c2e5502c34
This Metasploit module exploits a stack buffer overflow in the RPC interface of the Microsoft DNS service. The vulnerability is triggered when a long zone name parameter is supplied that contains escaped octal strings. This Metasploit module is capable of bypassing NX/DEP protection on Windows 2003 SP1/SP2.
9b7e6f209365505dfcd113a948db7bfb7bbb370bb024a1d2ca6fb2feabc1c1cf
This is an exploit for the chunked encoding buffer overflow described in MS03-051 and originally reported by Brett Moore. This particular modules works against versions of Windows 2000 between SP0 and SP3. Service Pack 4 fixes the issue.
db54b7c9894b5bd5fa70fd5fb0cfa3771711f595d035ff5f695b79fe36ab615c
This exploits a buffer overflow found in the nsiislog.dll ISAPI filter that comes with Windows Media Server. This Metasploit module will also work against the 'patched' MS03-019 version. This vulnerability was addressed by MS03-022.
c72f76f8a8253daffa9c80e5fc0eabf4bd5c86b37e4f1d22740423ea314f5177
Secunia Security Advisory - A vulnerability has been reported in libmspack, which can be exploited by malicious people to cause a DoS (Denial of Service).
0eda8c27c45c0f9cb24c4f78ea5c02f47aec251d7acb61243867ec85dc175839
Secunia Security Advisory - Red Hat has issued an update for seamonkey. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.
06acbd723f01c9897e281bbb4e7996568f2fdf3bba268944bab7507d105d264d
Secunia Security Advisory - A vulnerability has been reported in GnuPG, which can be exploited by malicious people to potentially compromise a user's system.
8bf27e1e3287e789f059beb7e7574ab5e9c0d304520796794385c632d774dc07
Secunia Security Advisory - A weakness has been reported in Dovecot, which can be exploited by malicious users to bypass certain security restrictions.
95e574ee16ad360bccf57c58046a1a3464696cfffb13bcb89802bab6fa371e4f
Secunia Security Advisory - Salvatore Fresta has discovered two vulnerabilities in WhiteBoard, which can be exploited by malicious users to conduct SQL injection attacks.
8459d13bc0ea7418e475004ab225b773073e818808434acfc303c6fd01aafdb4
Secunia Security Advisory - Some vulnerabilities have been reported in Interstage HTTP Server, which potentially can be exploited by malicious people to cause a DoS (Denial of Service), gain access to sensitive information, and compromise a vulnerable system.
417c7c3871f58eed0517e44458de639850abe60e6d4d097976093fd1db62485f