Zero Day Initiative Advisory 12-102 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required in that a target must visit a malicious page or open a malicious file. The flaw exists within the exposed GetDriverSettings method in the nipplib component imported by ienipp and npnipp. When encountering a realm parameter this user supplied value's length is not properly verified before copying into a fixed length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the process.
dad2278a888a8b86768114f8246f8e419ae73d969cf93902e9da0f392a230cc8
Zero Day Initiative Advisory 12-101 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Cognos. Authentication is not required to exploit this vulnerability. The flaw exists within the tm1admsd.exe component. This process listens on TCP port 5498 by default. Requests to the service include a request type field, a data length field, and a data field. Multiple request types (opcodes) fail to validate user supplied length and data fields before copying their contents to a fixed length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the system.
948d1a63f76e7397259aaddc98b7c87f1d5c6ecaaaaa72a571270335007c2ac7
Hook Analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.
40872e53db04f39bca6a732865f07e2f6c917473b1e6b14b9b3cf3270a04df6d
Chiangrai Enter Soft Design suffers from a remote SQL injection vulnerability.
e301577863b80f8afebc3fab0af02f6a7bc28c1cefa52659a270e1b1dd1244eb
Ballast Security felt the need to write this paper as almost countless services that we trust with our passwords are handling them irresponsibly. This is a good read for anyone who needs to store password hashes.
9b72c8fd503ebd25cdbebb177f28dba5b59183730431d92ae584879271c90add
HP Security Bulletin HPSBMU02786 SSRT100877 - Potential security vulnerabilities have been identified with HP System Management Homepage (SMH) running on Linux and Windows. The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Revision 1 of this advisory.
856251204fbecc5944b74b48232e96b353c5844f102f2b4ea9de3e11e27b5a7d
This is a local exploit for Real Player 10 Gold that uses a division by zero to trigger an exception handler.
bef48a2af7c152b4698cbb3e2c9b4d15795525b8bf8b700a9f8abe631953ac07
VLC version 2.0.1 suffers from an avi playlist denial of service vulnerability.
6400dd1a7d12ff853c19c53043a4fdc93b5051de204e01bf898e62de9dd1b0da
Top Nepal suffers from a remote SQL injection vulnerability.
3ba635007f36f932c35f438db58d698a1d107c3d5ab8dd5f34fde15067be1fb9
Rubysoft Solutions suffers from a remote SQL injection vulnerability.
ba290eedef8200b1eb3154a06936e7759014d52573641910f37674f180b975c1
Rhdesign suffers from a remote SQL injection vulnerability.
994b3f6e5919e91c1ef54e6bb6a1a043d9a4a5d9b2f422fabca853fc9f8a7e19
Rainbowdigital suffers from a remote SQL injection vulnerability.
99d02de14a1f053395b2d6291f379842ae9851cf7644f89cd9216c54bd15763f
Pixel Identity suffers from a remote SQL injection vulnerability.
53f5fcf3cc37318783474b06a01479a5a240e95c4363fa65ca213b751405f7d5
MUSOYAN suffers from a remote SQL injection vulnerability.
e648a2199ca11ed45130c62574b55d301604796519c02fe8df2432b5d4b892f5
HR Software suffers from a remote SQL injection vulnerability.
6ed4ebd0a76076b433760b7c0c296cc21d0a71d1c745f6a84694b245381d769e
ExNet suffers from a remote SQL injection vulnerability.
c394b2e5c9255f4aba70b868255f74dd75974463ba07a272ba4e772dfd07b87d
Red Hat Security Advisory 2012-1046-01 - PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. It was discovered that the PHP XSL extension did not restrict the file writing capability of libxslt. A remote attacker could use this flaw to create or overwrite an arbitrary file that is writable by the user running PHP, if a PHP script processed untrusted eXtensible Style Sheet Language Transformations content. Note: This update disables file writing by default. A new PHP configuration directive, "xsl.security_prefs", can be used to enable file writing in XSLT.
fe71e26fd75c9403f91014baf93c4a6d167a5d5aef0be73d9f6c0fe60b8a1865
Red Hat Security Advisory 2012-1045-01 - PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. It was discovered that the PHP XSL extension did not restrict the file writing capability of libxslt. A remote attacker could use this flaw to create or overwrite an arbitrary file that is writable by the user running PHP, if a PHP script processed untrusted eXtensible Style Sheet Language Transformations content. Note: This update disables file writing by default. A new PHP configuration directive, "xsl.security_prefs", can be used to enable file writing in XSLT.
57bee9f577390f47d09269171763d581bac37a4751fb81fddb955d4db237ace9
Red Hat Security Advisory 2012-1047-01 - PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. It was discovered that the PHP XSL extension did not restrict the file writing capability of libxslt. A remote attacker could use this flaw to create or overwrite an arbitrary file that is writable by the user running PHP, if a PHP script processed untrusted eXtensible Style Sheet Language Transformations content. Note: This update disables file writing by default. A new PHP configuration directive, "xsl.security_prefs", can be used to enable file writing in XSLT.
ad1e0d74169944968d087c38eeee1c4b790cf754e68c22a60bc2f608214be628