Ntpdc version 4.2.6p3 suffers from a local buffer overflow vulnerability.
dfc688a1df19cf25ae360e18efb2e689ec9e974da1249560b0f5d4ea4dcd3424
This Metasploit module exploits a remote file include vulnerability in Railo, tested against version 4.2.1. First, a call using a vulnerable cffile line in thumbnail.cfm allows an attacker to download an arbitrary PNG file. By appending a .cfm, and taking advantage of a directory traversal, an attacker can append cold fusion markup to the PNG file, and have it interpreted by the server. This is used to stage and execute a fully-fledged payload.
0bbe174102c9e26fadfffb5af3c7e341a378b56297c9ad11a3b67c73f86ebcd0
DjVuLibre versions 3.5.25.3 and below suffer from an out of bounds access violation vulnerability.
70e01af5b62931e1091d6505282299ef6626b2697a0e5fe8fad9b8eabb517c9a
This Metasploit module exploits an unauthenticated remote command execution vulnerability in version 0.4.0 of Gitlist. The problem exists in the handling of an specially crafted file name when trying to blame it.
2d10e7f5052c363ec8a9a489e9f7c7fd6b0f2a333365ccb4fc9fa7413a6b823c
Gitlist versions 0.4.0 and below suffer from a remote code execution vulnerability.
00b7d366435cf917c8e9dd552a46f3409e889e65dde7d0753735ef2ebe2b6d00
Ganib versions 2.3 and below suffer from a remote SQL injection vulnerability.
f53669a90a92541ae5ebdad41e56273cd5fd6b51046bd02996f9b2579f3c29e3
This Metasploit module exploits a SQL injection vulnerability in Kimai version 0.9.2.x. The 'db_restore.php' file allows unauthenticated users to execute arbitrary SQL queries. This Metasploit module writes a PHP payload to disk if the following conditions are met: The PHP configuration must have 'display_errors' enabled, Kimai must be configured to use a MySQL database running on localhost; and the MySQL user must have write permission to the Kimai 'temporary' directory.
853a61dfd6df69f1dd037fceb6af76d6aa56c0b508cd161484f30988de0f9da7
Dolibarr ERP/CMS version 3.4.0 suffers from a remote SQL injection vulnerability.
17558383b563f3fc59b866cd4454a1c3f1b147cd861e3918baa96316db448057
aMSN version 0.98.9 suffers from local file inclusion and remote SQL injection vulnerabilities.
139d345468fde77a4b91ccbd0e3b2625bfaeb5e36d34915fa821a8700d4bfe52
OpenEMM-2013 version 8.10.380.hf13.0.066 suffers from cross site scripting and remote SQL injection vulnerabilities.
14456af2c9a5b9e11fb7313fb343d5a731c447e6b28ffc4391db130a2ff55411
ASUS RT56U versions 3.0.0.4.360 and below suffer from a remote command injection vulnerability.
d5ec9bf8cece4256800e07f806a8eeba5ea5018224e988bbddedf118e4b8ca92
PHD Help Desk version 2.12 suffers from a remote SQL injection vulnerability.
5bd6713ae091f3a88456a992a6a2c14fd6a5cd823bb577c71eac2b768737e167
Kimai version 0.9.2.1306-3 suffers from a remote SQL injection vulnerability.
0500e2f1f7402ade9a36fb3bbcdf907836374db397c71ed558baeaefcc940edc
OpenDocMan version 1.2.6.5 suffers from persistent and reflective cross site scripting vulnerabilities.
09a561eea3e2a4cf7a0b605a95ace0f35855e1d5dc113069e4c7516091aab7e1
Ballast Security felt the need to write this paper as almost countless services that we trust with our passwords are handling them irresponsibly. This is a good read for anyone who needs to store password hashes.
9b72c8fd503ebd25cdbebb177f28dba5b59183730431d92ae584879271c90add