Mint Haber Sistemi version 2.7 suffers from a remote SQL injection vulnerability.
59487127d95a5373d137684b91c611a5664a83a4d927fb006a74f6618b05bfb1
Microsoft Vista NTRaiseHardError privilege escalation exploit.
d6bf5b3179cf3fc170a222405d417273d5ed6e2ace592811b1097e73a401392c
This Metasploit module exploits a format string vulnerability in the Berlios GPSD server. This vulnerability was discovered by Kevin Finisterre.
402a9fad7ed01ebd5d37f83abeb35909f2e896f1fba750a9c3ef9832f3426f70
This Metasploit module exploits the buffer overflow found in the LIST command in fileCOPA FTP server pre 18 Jul 2006 version discovered by www.appsec.ch.
f25a8a610606ce2536b71ee4fa08f1f50550ae6904323d8724939d02e5fb2960
This Metasploit module exploits a classical stack overflow in Navicopa Web Server 2.01 version. Credit to h07 for the discovery of this vulnerability. This is a port to the original h07 c code.
b7044add722392d88e706c99af870a67fcd52afc19b6a4d1270d7a0308aaaaed
CA BrightStor ARCserver tapeeng.exe remote buffer overflow exploit for Windows 2000 that binds a shell to port 4443.
55a4cbc6b2c99480c96018ead1f53c77828c32fe522cf290e8d6af97e97deb49
Apple Quicktime buffer overflow exploit for Windows 2000 that makes use of the rtsp URL Handler vulnerability. The qtl file created binds a shell to port 4444.
8668be442ac4578cbed1084e63009713cd92e994d70f4d374f3b519c655904a9
Mandriva Linux Security Advisory - KsIRC 1.3.12 allows remote attackers to cause a denial of service (crash) via a long PRIVMSG string when connecting to an Internet Relay Chat (IRC) server, which causes an assertion failure and results in a NULL pointer dereference.
972005eb98cf4aeb7bad16b564a697ebd65c7f31c55ac95c64d6c87097857c0f
Mandriva Linux Security Advisory - A vulnerability in the RPC library in Kerberos 1.4.x and 1.5.x as used in the kadmind administration daemon calls an uninitialized function pointer in freed memory, which could allow a remote attacker to cause a Denial of Service and possibly execute arbitrary code via unspecified vectors.
699eadf06107b013881e40f59f8a3d015127c5a77af5ca495b05c155650a55a3
WMF proof of concept denial of service exploit.
01eb36fd3efa0db479fddf89490ffde8d0ac689ea814163c3555851aedbe573b
Mandriva Linux Security Advisory - A vulnerability in the NVIDIA Xorg driver was discovered by Derek Abdine who found that it did not correctly verify the size of buffers used to render text glyphs, resulting in a crash of the server when displaying very long strings of text. If a user was tricked into viewing a specially crafted series of glyphs, this flaw could be exploited to run arbitrary code with root privileges.
eb28a9746eaf813126f1c03596064c89e878831d32e80fde7e8967986bb68d0c
Finder is affected by a memory corruption vulnerability, which leads to an exploitable denial of service condition and potential arbitrary code execution, that can be triggered by DMG images.
238bec1ecee79fefb9639412113e7fdbb037de09b513fba37017e218ba87e114
OmbiWeb version 5.51 suffers from a format string vulnerability.
a78831973f24a948d49ed59403543dddce63a381877be9ae52dfb7e565dfb568
Jshop Server version 1.3 suffers from a remote file inclusion vulnerability.
ad1157db1933f6e6bb79e89ee230ae5f3e018e5c213358054f0532c62ee90e24
Remote exploitation of a null pointer dereference exception allows for remote attackers to crash the EIQ Network Security Analyzer DataCollector service. Proof of concept code included.
c0b59ba8423b52c53bb5d71af4b0a0a7949088f8c0b4de25895ca990ce8a071d
Gentoo Linux Security Advisory GLSA 200701-04 - An anonymous researcher found evidence of memory corruption in the way SeaMonkey handles certain types of SVG comment DOM nodes. Georgi Guninski and David Bienvenu discovered buffer overflows in the processing of long Content-Type: and long non-ASCII MIME email headers. Additionally, Frederik Reiss discovered a heap-based buffer overflow in the conversion of a CSS cursor. Several other issues with memory corruption were also fixed. SeaMonkey also contains less severe vulnerabilities involving JavaScript and Java. Versions less than 1.0.7 are affected.
082334a0641de1d8e3cc244adadd26fbea6629bbd1f039e1db1e73d5b6d68e27
Mandriva Linux Security Advisory - Several integer overflows were discovered in the OpenOffice.org WMF file processor. An attacker could create a carefully crafted WMF file that would cause OpenOffice.org to execute arbitrary code when opened.
54359cc62b41d21d5b71d1c55ece91127f3286ca5b2dcb06734bad15295ced42
Cisco Security Advisory - A vulnerability exists in the Data-link Switching (DLSw) feature in Cisco IOS where an invalid value in a DLSw message could result in a reload of the DLSw device. Successful exploitation of this vulnerability requires that an attacker be able to establish a DLSw connection to the device.
342ad9d3d6170bd8a57aad58dd19f3780725ed7124f24f35074d1ef705132a67
Cisco Security Advisory - Cisco Unified Contact Center Enterprise, Cisco Unified Contact Center Hosted, Cisco IP Contact Center Enterprise, and Cisco IP Contact Center Hosted editions are affected by a vulnerability that may result in the restart of JTapi Gateway process. Until this process restarts, no new connections can be processed. Existing connections will continue to work.
a1d2288259123655afc91c0ee0f9ef156b1fd0a36d56e1deab154b7af1c068a2
OpenPKG Security Advisory - According to vendor security advisories, two security issues exist in the Kerberos network authentication system implementation MIT Kerberos. First, the RPC library could call an uninitialized function pointer, which created a security vulnerability for kadmind(8). Second, the GSS-API "mechglue" layer could fail to initialize some output pointers, causing callers to attempt to free uninitialized pointers. This caused another security vulnerability in kadmind(8).
18eb84638a0aa1af34b0b1cdc4873ec6ac8264aa88bdd3cd284bf7eb213a80c4
Adobe Reader versions 7.0.8 and below suffer from a remote heap memory corruption vulnerability.
7fefcb2fb637ae16fe9ea6a212555de6f4a6f5f1f3c7d0e4153b45c993094fcb
iDefense Security Advisory - Remote exploitation of an input validation vulnerability in Adobe Systems Inc.'s Macromedia ColdFusion MX 7 may allow an attacker to view file contents on the server. The vulnerability specifically exists in that URL encoded filenames will be decoded by the IIS process and then again by the ColdFusion process. By supplying a URL containing a double encoded null byte and an extension handled by ColdFusion, such as '.cfm', it is possible to view the contents of any file which is not interpreted by ColdFusion. iDefense has confirmed this vulnerability exists in Adobe Macromedia ColdFusion MX 7.0.2, with all available fixes, running on Microsoft IIS vulnerable.
4eb93328aca8b7d23af5ba4e80ae002d8aabb5f92bb543f0ae7df03430243dd3
CS-Cart version 1.3.3 suffers from a remote file inclusion vulnerability in install.php.
9047d43072e61744a358148010164b35d657c38c31561230ae63be09516c61a6
sazcart version 1.5 suffers from a remote file inclusion vulnerability in cart.php.
9da684b1ee8cd2f7546e9cac540694704e884836bac8d47806509bca8736c88f
Technical Cyber Security Alert - The MIT Kerberos administration daemon contains two vulnerabilities that may allow a remote, unauthenticated attacker to execute arbitrary code.
30f9aeab9d8c4b630599687ec2112c6087b51807c82237c59322bc676f0ec774