Mandriva Linux Security Advisory 2010-011 - Multiple vulnerabilities has been found and corrected in mysql.
7c58dfacc77b0b7dc3764e67944dd0ddadc33f2d49d5511c914e60f41b77b2a6
The Joomla Libros component suffers from a remote SQL injection vulnerability.
241c5109b54b2bede6a41977edc93e1221b98b11b7346baa0a3a743fc5599362
Thelia version 1.4.2.1 suffers from a cross site scripting vulnerability.
583ca559f67b12527e479f6c03929ea0c116d5fa078fd67b34c92e05efb2702d
VaroCMS Community Voting Web version 2.0 suffers from a cross site scripting vulnerability.
cc0796520c6385d3b299cd1260ba1b053adf8c095e85ea2f00286a3012c97ed5
Xunlei XPPlayer ActiveX related remote execution proof of concept exploit.
6722d714c670d9df187ab34c3803ffd27fbbc4fff5101939207caa8ae8106d53
The Joomla Prime component suffers from a directory traversal vulnerability.
c34d949f2463fb375985938b270286e11578e6b50a902bff486455def46c1bea
Novatel Wireless Mifi suffers from cross site request forgery, output encoding, gps enabling, and authentication vulnerabilities.
b07c73a7c1c8cca6d14d3e4157f32c6256bcf8e00e3240328484ee58d974ad1e
TrendMicro Web-Deployment Active-X remote execution proof of concept exploit.
9f8ed6c255572fdcce014320aa2ed04daa0bcf50a207b1e99ec40ee63fad45ce
Adobe GetPlus get_atlcom Active-X remote execution proof of concept exploit.
5a723bc27b2d48dcc9dac65ec1de5c189dc886bbbfcb9eaf75e06bb4bb880ade
Super Shop suffers from a database disclosure vulnerability.
7151db27eb2ab22f331278cdeebc99d2254122c1a2cd5c676546b0ed9cc80913
Max's Photo Album suffers from a shell upload vulnerability.
53045392ed89dec52a4ebce83297b9663a2d433bf2c30558bee705c24028f92b
Max's Image Uploader suffers from a shell upload vulnerability.
57c36b40bfb8e2adbd2ea972f3412828ee15c14b6d700795c218385ea8767023
This Metasploit module exploits a memory corruption flaw in Internet Explorer. This flaw was found in the wild and was a key component of the "Operation Aurora" attacks that lead to the compromise of a number of high profile companies. The exploit code is a direct port of the public sample published to the Wepawet malware analysis site. The technique used by this module is currently identical to the public sample, as such, only Internet Explorer 6 can be reliably exploited.
3e85484343b5c78a9c2a0d7d62ce19ffbc47df882e35e2a3de9a917ffb2fa1ad
Max Site Protector suffers from a cross site scripting vulnerability.
53926dbb2ab5d37b7dedda8560add20740f5764d7e8eb41146a37b09067b7352
ASP Sur Portal suffers from a database disclosure vulnerability.
1c6117b3508f54a19c23434e1a736048f624a9efd3e54fb32eb23c1323390c69
Whitepaper called GDT and LDT in Windows kernel vulnerability exploit. This paper discusses using 1 or 4 byte write-what-where conditions to convert a custom Data-Segment Descriptor entry in LDT of a process into a Call-Gate (with DPL set to 3 and RPL to 0).
5c8da344b3b6b9b298c6abf88c6abc9b8388ea7855997e8d22f4bdd058f0fb20
ASP Fiyat 2 suffers from a database disclosure vulnerability.
aacc6775fd735b90da48320b9e42af2261b48043840347bcf778ed2c82fd36ca