Remote exploit for SAP MaxDB versions 7.6.03 build 007 and below which suffer from a pre-authentication remote code execution vulnerability. Launches cmd.exe.
eb4f7cf06c6757a1371d0c92e9e5fc1d080f3f0a62dc8317785e8b3b2d680924
SAP MaxDB versions 7.6.03 build 007 and below suffer from a pre-authentication remote code execution vulnerability.
253d8de800efd9bd9e37418409e3025ae1ec5ce6ea5a35bb1e9fb3e4dbac7c0c
It seems that Omegasoft's Insel 7 may suffer from a cookie validation vulnerability.
47204927eb9c82b6599bf19ac2a58c6fb988a8f4a9207c13bac66b3e789dfc9e
Tuned Studios Templates suffer from a local file inclusion vulnerability in index.php.
e1f8fc52ca4abda2cbbcc3b564f875f2beb79a48537b22fc17dc7a0712f8dd96
Ubuntu Security Notice 564-1 - Bill Trost discovered that snmpd did not properly limit GETBULK requests. A remote attacker could specify a large number of max-repetitions and cause a denial of service via resource exhaustion.
96a0275ff748accff20dd8ef417a4f3a0303bd613973bf35f60f6d4d4d0d7b1f
McAfee E-Business Server versions 8.5.2 and below pre-authentication denial of service exploit.
9fdbf08d12eca23e24b5da2766dfaa3afb090a14d10501e4f61f1a490950b23d
INFIGO IS Security Advisory #ADV-2008-01-06 - The McAfee E-Business Server versions 8.5.2 and below suffer from a pre-authentication code execution and denial of service vulnerability.
7129afa195fe0c40d1247cd6d401cf701a55ca378c31f5c79339a620eade8866
Mandriva Linux Security Advisory - Index Functions Privilege Escalation: as a unique feature, PostgreSQL allows users to create indexes on the results of user-defined functions, known as expression indexes. This provided two vulnerabilities to privilege escalation: (1) index functions were executed as the superuser and not the table owner during VACUUM and ANALYZE, and (2) that SET ROLE and SET SESSION AUTHORIZATION were permitted within index functions. Regular Expression Denial-of-Service: three separate issues in the regular expression libraries used by PostgreSQL allowed malicious users to initiate a denial-of-service by passing certain regular expressions in SQL queries. First, users could create infinite loops using some specific regular expressions. Second, certain complex regular expressions could consume excessive amounts of memory. Third, out-of-range backref numbers could be used to crash the backend. DBLink Privilege Escalation: DBLink functions combined with local trust or ident authentication could be used by a malicious user to gain superuser privileges. This issue has been fixed, and does not affect users who have not installed DBLink (an optional module), or who are using password authentication for local access. This same problem was addressed in the previous release cycle , but that patch failed to close all forms of the loophole.
edab60a1473e35b9b319cf42931a033907dbd44cba5d3b178ce486cce8517747
Mandriva Linux Security Advisory - An integer overflow vulnerability was reported by iDefense with clamav when parsing Portable Executable (PE) files packed in he MEW format. This could be exploited to cause a heap-based buffer overflow. Toeroek Edwin reported an off-by-one error when decompressing MS-ZIP compressed CAB files. As well, an unspecified vulnerability related to the bzip2 decompression algorithm was also discovered.
37b9a19cb61c4a301b58ab8777a496aecba98b36f31673396fda65b345441908
Secunia Security Advisory - IBM has acknowledged a vulnerability in IBM Websphere Application Server for z/OS, which can be exploited by malicious people to conduct cross-site scripting attacks.
aaf190c862be92f4c61ce47a47a22651f9caf2b8ec849c2eb2becc0fdda48776
Secunia Security Advisory - Luigi Auriemma has discovered some vulnerabilities in xine-lib, which potentially can be exploited by malicious people to compromise a user's system.
d8ad6c16e37a2e607a3119949278c0a453a76fe539380462d151f871d7260635
Ubuntu Security Notice 563-1 - Wei Wang discovered that the SNMP discovery backend did not correctly calculate the length of strings. If a user were tricked into scanning for printers, a remote attacker could send a specially crafted packet and possibly execute arbitrary code. Elias Pipping discovered that temporary files were not handled safely in certain situations when converting PDF to PS. A local attacker could cause a denial of service.
489700930be8d4a13257c7209ad13c6df10d30f853eac24c1ae666ddb054ed79
Ubuntu Security Notice 562-1 - Jose Miguel Esparza discovered that certain SIP headers were not correctly validated. A remote attacker could send a specially crafted packet to an application linked against opal (e.g. Ekiga) causing it to crash, leading to a denial of service.
0bae0510745e2d4cc1e920612d25832120f26ff1cd4e53a774b165a882277ed1
Ubuntu Security Notice 561-1 - Jose Miguel Esparza discovered that pwlib did not correctly handle large string lengths. A remote attacker could send specially crafted packets to applications linked against pwlib (e.g. Ekiga) causing them to crash, leading to a denial of service.
52e265988f2840d09d20942061a4e0e7c5807c23b28fec9e912ec1f3f55eedbc
Gentoo Linux Security Advisory GLSA 200801-01 - Erich Schubert from Debian discovered that unp does not escape file names properly before passing them to calls of the shell. Versions less than 1.0.14 are affected.
6afee06078491bc089bcb513e08640815c7fa0ce8688570f5f30481c1991cb2e
Gentoo Linux Security Advisory GLSA 200709-07:02 - Bow Sineath discovered a boundary error in the file mod/server.mod/servrmsg.c when processing overly long private messages sent by an IRC server. Versions less than 1.6.18-r2 are affected. The unaffected ebuild, as reported in the original version of this Security Advisory, did not properly address all vulnerabilities.
12bdf6dfcebf0501efa2b773ca684dc51d714360f8385f47efe931909b04977f
Technical Cyber Security Alert TA08-008A - Microsoft has released updates that address critical vulnerabilities in Microsoft Windows. Exploitation of these vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code, gain elevated privileges, or crash a vulnerable system.
9f9115cfaf27e41368645573db14fbd06cd6820de2ba750fb949112bcb054846
Secunia Security Advisory - Debian has issued an update for freetype. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.
eefc4b1ced6e7b1e19163e1a53a8bf3b457660bb48348ff5d922858822b75568
Secunia Security Advisory - Debian has issued an update for tomcat5. This fixes some vulnerabilities, which can be exploited by malicious people and malicious users to disclose sensitive information.
7d2cd18954446d556e47f9316984970e539d819d303f1b8f285fbf9107e968a8
Gateway Weblaunch ActiveX control insecure method exploit.
d2eb43365020a9d361b6f129aee527ecc567063762665cba85591340d8fab689
Move Networks Quantum Streaming player SEH overwrite exploit that spawns calc.exe.
992465625ee6de48ff658f7e6381b37fa6c5462bacfdd40c50f8e383aa73a731
Microsoft DirectX SAMI file parsing remote stack overflow exploit that binds a shell to port 4444.
891b81acd9ed28a3aeb26a4085e20322e16d833a8297675eed4861882ea54014
PHP Webquest version 2.6 remote SQL injection exploit.
41474b00c26a95d2f11e5f223961db0c34d76ed4beaa5a990d9bc1a425701711
Secunia Security Advisory - Ubuntu has issued an update for tomboy. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges.
7478c4b8581f22393cb4841cf25833542521e0b5cb5125a8705fa942788ed11a
Secunia Security Advisory - Secunia Research has discovered some vulnerabilities and a weakness in Layton HelpBox, which can be exploited by malicious users to conduct script insertion and SQL injection attacks and compromise a vulnerable system, and by malicious people to identify valid user accounts and conduct cross-site scripting, script insertion, and SQL injection attacks.
6128e429e2bcd6ea372c93f3fad30cfafeb9c7ddd3bd4034d4339f5e03161e4f