MAXdev version 1.0.83 suffers from a cross site scripting vulnerability.
a7da500352e7af25c48b8f35221173ff218facd7ccc0267f8cebde20d0f2fa43
FTPGetter version 3.51.0.05 suffers from a directory traversal vulnerability.
96ae185d1cf3ef5dfd0fde37f12a56f5dffe109f8aa73913a669a2f0ff924562
Microsoft Excel Featheader buffer overflow exploit that leverages the vulnerability noted in MS09-067.
d8819693a6d8e59e92d65180638700bc847187637b8b54ba49a9da9ce54a19ff
The Joomla Newspaper component suffers from a remote SQL injection vulnerability.
5a5f271135fea2708ddee26312f0c5b8565d3d34efa74781d38ede88dfc4a65b
Zero Day Initiative Advisory 10-155 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco WebEx Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists during the parsing of strings defined within the ARF file format. Strings are typically prefixed by their valid length. By supplying a string much longer than the defined length a heap overflow will occur which can be further leveraged to execute arbitrary code under the context of the current user.
d2e392fe807d272ede817bfc2454d47eb9ffed4697d65963603ca8c3e6578f23
This Metasploit module presents a directory of file extensions that can lead to code execution when opened from the share. The default EXTENSIONS option must be configured to specify a vulnerable application type.
005913ddf25b7acabbb0edd6681266dc995949db8aea2e77e72ddf197898b629
This Metasploit module exploits a buffer overflow in A-PDF WAV to MP3 v1.0.0. When the application is used to import a specially crafted m3u file, a buffer overflow occurs allowing arbitrary code execution.
98f77271a20e935a5608bf3a7851354616670e5d252200c33c57d725a70cc30e
This Metasploit module exploits a vulnerability in Java Runtime Environment that allows an untrusted method to run in a privileged context. The vulnerability affects version 6 prior to update 19 and version 5 prior to update 23.
d70326c1bf38b8c797b6f540f14b84d6bbf3dc1e21b408f1a5f1d4f8408a19f6