A vulnerability in the web-based management interface of the Cisco RV130W Wireless-N Multifunction VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit this vulnerability by sending malicious HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device as a high-privilege user. RV130W Wireless-N Multifunction VPN Router versions prior to 1.0.3.45 are affected. Note: successful exploitation may not result in a session, and as such, on_new_session will never repair the HTTP server, leading to a denial-of-service condition.
09f07f0e9d2f9b46f8c355fbdac1e89d6992aeb917ea250f9d23b8b7c6760b66
MailCarrier version 2.51 POP3 TOP command remote SEH buffer overflow exploit.
5e3cfc7a086a3ee6b354e87378e4218d1d8f32e911c2c2075269a0ae3098c550
MailCarrier version 2.51 POP3 LIST command remote SEH buffer overflow exploit.
0acc339f07429dfc0f2beb0c5c7c0eeb24241c16aa9860feb1dbff3278220106
MailCarrier version 2.51 POP3 USER command remote buffer overflow exploit.
a137125e236c4e956266d78de14d425b87cc0c8ead564c4b98597e075719e76c
Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals.
80fb69bd26cf7d8895d8f7c1f088a02b1182321ded9c054d2e2b9523ced723d1