Gentoo Linux Security Advisory 201006-5 - Multiple vulnerabilities were found in Wireshark. Multiple vulnerabilities were found in the Daintree SNA file parser, the SMB, SMB2, IPMI, and DOCSIS dissectors. Versions less than 1.2.8-r1 are affected.
b3ad545366e00cf0779d93993cc64161a83a5cee466e15c31acb68a34381e716
Persian E107 suffers from a cross site scripting vulnerability.
6564df693ce56d5846c18375e27a12067b7df2eb80981393dabf369cb998d7bd
e107 version 0.7.21 suffers from cross site scripting and remote file inclusion vulnerabilities.
f8b4d66de843d9ce7e1495e2fabc0e17eac81cea36043e2fa7a3f18a41ed1256
Gentoo Linux Security Advisory 201006-4 - Multiple vulnerabilities in xine-lib might result in the remote execution of arbitrary code. Multiple vulnerabilities have been reported in xine-lib. Versions less than 1.1.16.3 are affected.
3d573a1bf8635f59a558d880f1824403c79842bfc90c6d34a2e2239ac6a931c0
Gentoo Linux Security Advisory 201006-3 - An integer overflow in ImageMagick might allow remote attackers to cause the remote execution of arbitrary code. Tielei Wang has discovered that the XMakeImage() function in magick/xwindow.c is prone to an integer overflow, possibly leading to a buffer overflow. Versions less than 6.5.2.9 are affected.
796f9b2ec04256094244d3bd8f9b7619c1e28c80d438532f709209813329140f
QuickTalk version 1.2 suffers from information disclosure vulnerabilities.
0ae012488cc0fc4cc10b7f7ef89850e85c38dfecfb2f82a25a36e90b851494dc
39 bytes small sys_setuid(0) and sys_setgid(0) and execve ("/bin/sh") Linux/x86 shellcode.
dbaf3dcc482eec426063488dfbb3302a6686626891f49fd3d155d681ec9ed767
6 bytes small sys_sync Linux/x86 shellcode.
bf87e6232f695be9623237f338f6d1b1745d377a9003fe4f54ea0711b78a47dc
53 bytes small low frequency system beep Linux/x86 shellcode.
5f03399e4b15d921ce36c589b2b34211991e0da794095d711af1e7fa0a818056
53 bytes small high frequency system beep Linux/x86 shellcode.
5cb9d08717e2ebc911b7b20718905ecab7d9d8f7f037b131c8d504b1286b7c66
Mediacoder version 0.7.3.4672 SEH overwrite exploit.
2506aefd8c980f914cd271ffcf3040ba9975628ca8e83750a667cbfa8dce4922
61 bytes small polymorphic setuid(0) + chmod("/etc/shadow", 0666) Linux/x86 shellcode.
61888bd21438c388e46e4596a889f367332881538c08fb80ba634ec4d5b97c26
Patient Folder suffers from a remote SQL injection vulnerability.
970502949d40e3947811c3fe9c9be5783695017dd7b95b254efd74546f4932f1
61 bytes small Windows 7 x64 cmd.exe shellcode.
df8d657040e51b5cb8fa86b3eb4ccfef05106cd4921e1b6ef6e3af77316d39c6
Visitor Logger suffers from a remote file inclusion vulnerability.
4dd87846ebf234c49a45ac51447f3332ba597f214a9279fd6afcc37279f6fa64
8 bytes small sys_exit(0) Linux/x86 shellcode.
084b0a02e7b447957a7938c05429b024199aa1dde0099d36a87d28c1d8035c55
32 bytes small sys_sethostname("PwNeD !!",8) Linux/x86 shellcode.
b51fcb0067c95b2eb3b0366f4559790489c02ea1ac7c4ad3ea82f13f3fbe98c6
Gentoo Linux Security Advisory 201006-2 - Multiple integer overflows in CamlImages might result in the remote execution of arbitrary code. Tielei Wang reported multiple integer overflows, possibly leading to heap-based buffer overflows in the (1) read_png_file() and read_png_file_as_rgb24() functions, when processing a PNG image (CVE-2009-2295) and (2) gifread.c and jpegread.c files when processing GIF or JPEG images (CVE-2009-2660). Versions less than 3.0.2 are affected.
1ff36330b25690b14be6cce445be259367ecdd35ac1e820015ce28c6f8e38447
Gentoo Linux Security Advisory 201006-1 - Multiple vulnerabilities in FreeType might result in the remote execution of arbitrary code. Multiple issues found in FreeType 2 were also discovered in FreeType 1. For details on these issues, please review the Gentoo Linux Security Advisories and CVE identifiers referenced below. Versions less than 1.4_pre20080316-r2 are affected.
109a3a117318affac0281fc5c8efacd287ad72cdbe76e93b7a92016f4cd799a1
The Joomla GRBridge component suffers from a local file inclusion vulnerability.
d05039323d3a90b7683fdf64247bcb382133d7d8ba5a53c52b11a6e442739699
11 bytes small sys_kill(-1,9) Linux/x86 shellcode.
ff4d5728bafd253729c69331f5056348d2adf26c7279b5007e745e0b04f614ce
39 bytes small change mode 0777 of /etc/shadow with sys_chmod syscall shellcode.
9a6c9f8800bb5588170ac2a62630f368ad0f1985e824cb078fa47c28c40c52a5
46 bytes small cdrom ejecting Linux/x86 shellcode.
36bf7203ba32667c95ac1d781f0cc2e9b918ec18018c3047f402c30295c75916
This is an ascii to shellcode encoder / decoder tool written in Python.
0f20aa3936f92d96b7d5ba9279c97e1407ce5f7847bbe3875b8a6ad73b442a4d
45 bytes small sys_execve("/bin/sh", "0", "0") with umask 16 (sys_umask(14)) Linux/x86 shellcode.
8e54d3a7a5204127f69b19ebb2490b9f775d1525147034ca5ca6911b6773ab36