HT Editor version 2.0.20 buffer overflow ROP proof of concept exploit.
49bab92cc9715b4094781b154fb2921a41a348687cb6f6d38dd2f7646e1a7587
A-PDF All to MP3 Converter version 2.3.0 local buffer overflow exploit that spawns a bind shell on tcp/4444.
cbce68c6b52ddeaed7cf23015787fc7c91f4d9db829f6799dff02e277c9f1f98
Secunia Security Advisory - Multiple vulnerabilities have been reported in Xen, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service).
b524279aeee71897eaa1e7264bf786633afaf22febac12a033bc8773dcc35895
Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft Office Excel, which can be exploited by malicious people to compromise a user's system.
1ff55f323f0fb80fd9dc1ccc009191779314508a8794bffb221f58d5fe7424c5
Secunia Security Advisory - Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.
7e31bc059fadcb042aea4685e488184f7b61b7a209c7f027e6aa1dbcb46df460
Secunia Security Advisory - A security issue and a vulnerability have been reported in Microsoft Internet Information Services, which can be exploited by malicious, local users and malicious people to disclose certain sensitive information.
89ed246c26a8e17ec38354916a75c936e26dbf7268616e645eec07dafea03733
Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a user's system.
2c4ecfa64e39fe7ba5e867f7df3fbc3d4a56b72556c35dd009d02ad964d31e9f
Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft .NET Framework, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.
cd7b149c6d2ea2d965ad618e04c8c8033d27339277fbfd983734380f3d2d5693
Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft Internet Explorer, which can be exploited by malicious people to compromise a user's system.
735013be6312d0163f358f94a7376998e36464e701dfc3dee6b053881a0173f5
Secunia Security Advisory - Red Hat has issued an update for gegl. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library.
964d14061cc5108ef1def0e4a2c27533fc2f82c51ee44b99059562b57cc485aa
Secunia Security Advisory - Multiple vulnerabilities have been discovered in netOffice Dwins, which can be exploited by malicious people to conduct SQL injection attacks.
d7f1e4b86f0c9b449578b071f27037d5768cccc1dbd3093f2576420e71f85128
This Metasploit module abuses the JAX-WS classes from a Java Applet to run arbitrary Java code outside of the sandbox as exploited in the wild in November of 2012. The vulnerability affects Java version 7u7 and earlier.
84f8085a7aae3cc5d26830a695a8c574d4ef5c13dfc3a77061731b06b87041f1
Red Hat Security Advisory 2012-1456-01 - Red Hat Storage is software only, scale-out storage that provides flexible and affordable unstructured data storage for the enterprise. GlusterFS, a key building block of Red Hat Storage, is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnects into one large, parallel network file system. Multiple insecure temporary file creation flaws were found in Red Hat Storage. A local user on the Red Hat Storage server could use these flaws to cause arbitrary files to be overwritten as the root user via a symbolic link attack.
e547ca0ceaf2ae55bf5820dcd30d1b136fcececdf53421a2186da6e2ae54d548
Red Hat Security Advisory 2012-1455-01 - GEGL is a graph-based image processing framework. An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way the gegl utility processed .ppm image files. An attacker could create a specially-crafted .ppm file that, when opened in gegl, would cause gegl to crash or, potentially, execute arbitrary code. This issue was discovered by Murray McAllister of the Red Hat Security Response Team.
e7259c52f0f030b915de52b99e3b7f4431b4ba30262fc2889fe8b4624a57d1b5
Ubuntu Security Notice 1630-1 - It was discovered that Libav incorrectly handled certain malformed media files. If a user were tricked into opening a crafted media file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program.
b39e910317de11213300a2245f845231ea08cff36cc11632c18331b82eee58a5
Ubuntu Security Notice 1629-1 - Tomas Mraz discovered that libproxy incorrectly handled certain PAC files. A remote attacker could use this issue to cause libproxy to crash, or to possibly execute arbitrary code.
2968459de6c88dc6181d4d9051c736f11dd989c514cf37bee924e54a846b2ca1
Debian Linux Security Advisory 2573-1 - Ralf Paffrath reported that Radsecproxy, a RADIUS protocol proxy, mixed up pre- and post-handshake verification of clients. This vulnerability may wrongly accept clients without checking their certificate chain under certain configurations.
c52a0d7665ed19b4e404db0700cf9d400d7e8c62f3067b7fe38e99e5f6899da6