Zero Day Initiative Advisory 11-225 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the nsXULCommandDispatcher.cpp source code. During a NS_XUL_COMMAND_UPDATE event dispatch, the user is able to force command dispatcher to remove all the updaters in the mUpdaters chain including the one that is currently in use. As a result, the local variable updater becomes a stale pointer and updater->mNext refers to memory previously freed. Successful exploitation can lead to code execution in the context of the browser.
7863f617a6f44ef8bf90e7543ea93c2246ad911302f2326be55b6031f03e0ecb
Zero Day Initiative Advisory 11-224 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the code responsible for parsing SVG polygon objects. The code within nsSVGPointList::AppendElement() does not account for user defined getter methods modifying or destroying the parent object during a repaint. An attacker can abuse this flaw to create a dangling pointer which is referenced during the traversal of the SVG container hierarchy. This can be leveraged to execute arbitrary code within the context of the browser.
a82536d4f4f1ff9da734433f61f9747354275bf65dee5fc17e6eb93f275febce
The IBM Web Application Firewall can be evaded, allowing an attacker to exploit web vulnerabilities that the product intends to protect. The issue occurs when an attacker submits repeated occurrences of the same parameter.
dd1e9c94795aba4ffecf00c4d23acf69a25e54a0a279d3b90a3b780c202eb617
Zero Day Initiative Advisory 11-223 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the code responsible for parsing SVG path segment objects. The function nsSVGPathSegList::ReplaceItem() does not account for deletion of the segment object list within a user defined DOMAttrModified EventListener. Code within nsSVGPathSegList::ReplaceItem() references the segment list without verifying that it was not deleted in the aforementioned callback. This can be abused to create a dangling reference which can be leveraged to execute arbitrary code within the context of the browser.
82ac5b76e47dd9bb4e8d57a655fd2f96f4bc256c8bf573a722d82424bbebb367
This brief whitepaper gives an overview of the functional uses of the Metasploit Framework.
a868069269ba7f9be7fe3e3764a207b4557d7120f654c3cf5b507537f29c3208
Ubuntu Security Notice 1156-1 - It was discovered that tgt incorrectly handled long iSCSI name strings, and invalid PDUs. A remote attacker could exploit this to cause tgt to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 10.10. Emmanuel Bouillon discovered that tgt incorrectly handled certain iSCSI logins. A remote attacker could exploit this to cause tgt to crash, resulting in a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.
ba1826fb855135b0d2f8008bbddbf61f5e8cfb8c9332cbf066bc74d8ac8342db
Ubuntu Security Notice 1155-1 - It was discovered that NBD incorrectly handled certain long requests. A remote attacker could use this flaw to cause NBD to crash, resulting in a denial of service, or possibly execute arbitrary code.
20e18a4b4c5d1ca6912f57f2ba40b62da3ca3152aff5b4b0849321690eed0f1c
This is the Athcon 2011 Capture The Flag solution paper.
fd730b3a1e648f9ee412307c5e026b859f602446cf26a6eb56a9f8ae24c309f2
This php script is a Plesk Panel brute forcing utility.
4f39c5c3c1f0bbfea67df3fa70f94dc5fdaef76f6e58e93fca95bb2e26d320b9
Sitemagic CMS suffers from a XSS vulnerability when parsing user input to the 'SMExt' parameter via GET method in 'index.php'. Attackers can exploit this weakness to execute arbitrary HTML and script code in a user's browser session.
8e9bd0f1156742f2d83faa0606fca5304a8e3b055624c9077f24c1a8e274c310
Slackware Security Advisory - fetchmail packages have been updated to fix a denial of service vulnerability in the STARTTLS protocol phases.
e105c721442a8baa6254dc4effec15470371d9e6558d8ceb8b547b3371e8cddb
This Metasploit module exploits a stack buffer overflow in FactoryLink 7.5, 7.5 SP2, and 8.0.1.703. By sending a specially crafted packet, an attacker may be able to execute arbitrary code. Originally found and posted by Luigi Auriemma.
180a8907d61d69a4ded59759afdcd03ea9f1757008b99fd69ef2a1c78f4f6f23
This Metasploit module allows remote attackers to place arbitrary files on a users file system by abusing the "DownloadImageFileURL" method in the Black Ice BIImgFrm.ocx ActiveX Control (BIImgFrm.ocx 12.0.0.0). Code execution can be achieved by first uploading the payload to the remote machine, and then upload another mof file, which enables Windows Management Instrumentation service to execute the binary. Please note that this module currently only works for Windows before Vista. Also, a similar issue is reported in BIDIB.ocx (10.9.3.0) within the Barcode SDK.
c654011b0b3147d7a6b19b80df3e17b7fd597bafa54d127293006bedf2615b9d
Secunia Security Advisory - A vulnerability has been reported in DokuWiki, which can be exploited by malicious people to conduct script insertion attacks.
5733f827338e5a871d62236abcad8971d21401c0b59d85a0e08791ba23ca5892
Secunia Security Advisory - Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.
4c6d20bb726c60059291294fad494a7b4b1b2dd786dbad56275350b4d15baecc
Secunia Security Advisory - Gjoko Krstic has discovered a vulnerability in Sitemagic CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.
74d561568cb2fb3f8ede37a1074b6bbfe3c49571f9cdc945b10c6729b4dfc55a
Blue Bison Script suffers from a remote SQL injection vulnerability.
7880a3ca3557c50dac2f14276792af3c24e1534ae07085756946b9256c400508
EA Sports aka ea.com suffers from a cross site scripting vulnerability.
2de1463eb99e58c2c78410d7068ed00f86ce8bc9e7e49e6c254af72e509df958
If-CMS version 2.07 pre-authentication local file inclusion exploit that leverages the newlang parameter.
54e0d5a2b5475f09684e3d5e161e928ef2258de0b02c152c7f1fffea225f343d
DreamBox DM800 versions 1.6rc3 and below suffer from a remote arbitrary file download vulnerability.
9903b5996d825cd58d3ca550b02438e32094e98f800883c5f8767a40223d9173
Secunia Security Advisory - A vulnerability has been reported in Piwik, which can be exploited by malicious people to compromise a vulnerable system.
8c5c090209e382290931fe64848e6ea1e831a977609c3f78d637c42146bfc97f
Secunia Security Advisory - Secunia Research has discovered a security issue in NNT Change Tracker and Remote Angel, which can be exploited by malicious, local users to gain escalated privileges.
015a7fb682705d0816da847b19abc46ac8a6233e948b42e2d1dbcb6642f06c86
Secunia Security Advisory - Some vulnerabilities have been reported in BlackBerry Tablet OS, which can be exploited by malicious people to disclose potentially sensitive information and compromise a user's system.
6134712f18921b5bf3174918b3f19926a1d6407e7c497d560e317397c6539153
Secunia Security Advisory - Debian has issued an update for perl. This fixes a weakness, which can be exploited by malicious people to bypass certain security features.
2a3ade82df916b2d08adfbcdba55d7bf636de2d01346d73d4e6d0868c7cff924
Secunia Security Advisory - Some vulnerabilities have been reported in SAP NetWeaver, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, and bypass certain security restrictions.
80c7e3a3f0b82036f7b2979ed11098e0914d2b3e2a2bb83a573076fe473d18ac