Jolla Phone with Sailfish OS versions 1.1.1.27 and below suffer from a telephone URI spoofing vulnerability.
1e5ea6ababa53a368f6ee034d8c4f08f4e032acffd627cadd356717cfecfc988
This Metasploit module exploits a code execution flaw in SonicWALL GMS. It exploits two vulnerabilities in order to get its objective. An authentication bypass in the Web Administration interface allows to abuse the "appliance" application and upload an arbitrary payload embedded in a JSP. The module has been tested successfully on SonicWALL GMS 6.0.6017 over Windows 2003 SP2 and SonicWALL GMS 6.0.6022 Virtual Appliance (Linux). On the Virtual Appliance the linux meterpreter hasn't run successfully while testing, shell payload have been used.
e1755ee13c8e3130d551fa7c0d3ecece903c21cf67a088b1e4b09747d286333e
SonicWALL GMS/VIEWPOINT version 6.x and Analyzer version 7.x remote root/SYSTEM exploit.
c67e6d05a8d585f1484b8a0f270568483e1cd3458d88448b2156427211649cd6
SonicWALL GMS/Viewpoint/Analyzer suffers from an authentication bypass vulnerability.
a7cdf9ef5dde0b877ce946cd1289e5066843249e2b56404241fd4a4fba9a3e72
Symantec LiveUpdate Administrator suffers from a cross site request forgery vulnerability. Proof of concept is included.
1590de5e204cab69e3bed8c07807a00abee7648f9f8940d58e1c494577fc7b52
Majordomo2 suffers from a directory traversal vulnerability in the help command. The parameter named extra is not properly sanitized. Versions 20110203 and below are affected.
a56132a9257c31bde8e4caffddc1080e11f6ed79939595cb7bcf42ff440d659b
DATEV has multiple pieces of software that are affected by DLL hijacking vulnerabilities.
d9d43eccf321d71371184daa9bc3b327b257eb0782c862f082c54e2ce3ff7941
McAfee LinuxShield versions 1.5.1 and below remote root code execution exploit.
8a712c77c5f815392c4e24ddc1710f3207045d5ed4dc4bab7b4158ef20f58f68
This Metasploit module exploits a format string vulnerability within version 10.0.4.x and 10.5.1 of the SonicWALL Aventail SSL-VPN Endpoint Interrogator/Installer ActiveX control (epi.dll). By calling the 'AuthCredential' method with a specially crafted Unicode format string, an attacker can cause memory corruption and execute arbitrary code. Unfortunately, it does not appear to be possible to indirectly re-use existing stack data for more reliable exploitation. This is due to several particulars about this vulnerability. First, the format string must be a Unicode string, which uses two bytes per character. Second, the buffer is allocated on the stack using the 'alloca' function. As such, each additional format specifier (%x) will add four more bytes to the size allocated. This results in the inability to move the read pointer outside of the buffer. Further testing showed that using specifiers that pop more than four bytes does not help. Any number of format specifiers will result in accessing the same value within the buffer. NOTE: It may be possible to leverage the vulnerability to leak memory contents. However, that has not been fully investigated at this time.
44c91575bcf5cfcee3625ae9794e540cb1b6e65be40393ce904c9bd2a2d9d756
SonicWALL E-Class SSL-VPN Active-X control suffers from a format string overflow.
67c7fe6e92dbbb2e6e59a94b6a3b3b7cf6efb6e1f98c9583e63c488b713538f2
The ArNoText third-party Active-X control suffers from a file overwrite vulnerability.
34155d428a909e04a631c747af4da26e2c45e2605d835f1343b96bd1ad54f868
The AnNoText third-party Active-X control suffers from a buffer overflow vulnerability.
6b96ecd004e9fbc237102174af9a92523efdf01137ea605ce4365fa5de1fd958
Proof of concept exploit that demonstrates a buffer overflow in the Authentium Command On Demand Online scanner service.
6c2c10a5e9d972abb3a5a7fbc85a62a5cee7cb2db8a9f9eeda389ea1ed8e3ca8
Remote exploitation of a buffer overflow vulnerability in Authentium Command On Demand Online scanner service could allow an attacker to execute arbitrary code within the security context of the targeted user.
ff460caf25c81a660277872e6503993e3d1feec0740a20a6221a9d45b03935ff
McAfee LinuxShield versions 1.5.1 and below remote code execution proof of concept exploit.
d06d6fd6943d8a9711649f4fed45d0ff2d2d71cd45f67c4676a3b007c669a219
McAfee LinuxShield suffers from remote and local code execution vulnerabilities. Versions 1.5.1 and below are affected.
6f765889b50a212dd66271f122872290dfb10b802d0b2b02035f85f140f0fa95
The DATEV Active-X control suffers from a remote command execution vulnerability.
0813b6e932bdf3408d8be317740e7fb909e9982105a6a146fa81b12ae71dbb2b
Panda Security suffers from a local privilege escalation vulnerability. Proof of concept code included. This is an updated version of the original advisory.
68c919cfbbcaab6c8202cec461ff70cb5276a6228828dd6772a6c974b0ae4c75
Panda Security suffers from a local privilege escalation vulnerability. Proof of concept code included.
333e665118b3dd5cd7fd86ddef931c6b1f4e53d84228d5a1bf921e05e1003979
This Metasploit module exploits a stack overflow in Symantec ConsoleUtilities. By sending an overly long string to the "BrowseAndSaveFile()" method located in the AeXNSConsoleUtilities.dll (6.0.0.1846) Control, an attacker may be able to execute arbitrary code.
7c2677559b384201501422a3ddf86666515f1b169805b0d9200c4c0e134447b3
The Symantec ConsoleUtilities Active-X control suffers from a buffer overflow vulnerability.
5f09948f29db082ce2353ab83f2d2593b1645423033ffb0e75a67bbc53c8101f
Websense Email Security suffers from a cross site scripting vulnerability. Proof of concept code included.
5d93e6155f2f0145fdb3491464c95fd6bb26d64b3b1b151fa7b7fbd0c0f885f5
The Websense Email Security web administration frontend suffers from a remote denial of service vulnerability. Proof of concept code included.
eb3eb26757df239e889e54f61ddb2352fbee00b8d6c4222cfbbac4db658ca47b