Improper parsing of the PDF structure by various Symantec products leads to evasion of detection of malicious PDF documents at scantime and runtime.
c5195c92e8b5682c7ce5d732aadf8cc4e11df997abb11873f6eaa932099bcaa0
This Metasploit module exploits the Wyse Rapport Hagent service by pretending to be a legitimate server. This process involves starting both HTTP and FTP services on the attacker side, then contacting the Hagent service of the target and indicating that an update is available. The target will then download the payload wrapped in an executable from the FTP service.
e7be07350ced9d99747f9c25b7062ad223b93cc2cecdcacbc714a84918ea9198
This is a Metasploit exploit for the Subversion date parsing overflow. This exploit is for the svnserve daemon (svn:// protocol) and will not work for Subversion over webdav (http[s]://). This exploit should never crash the daemon, and should be safe to do multi-hits.
c81084cf41376c203360dc2c4fd7badff87c3c33602d948682a6905bafe517a2
This Metasploit module exploits the nttrans overflow in Samba 2.2.x.
5485012d74d1e2165aa97cb81b381ddbcdc41bf7b0bc108b48359d6c99529124