Title: Remote Command Injection in Arabic Prawn 0.0.1 Ruby Gem Author: Larry W. Cashdollar, @_larry0 Download Site: http://rubygems.org/gems/Arabic-Prawn CVE: 2014-2322 Date: 12/17/2013 In Arabic-Prawn-0.0.1/lib/string_utf_support.rb, the following
## QNX 6.x Photon denial of service vulnerability by cenobyte 2013# vincitamorpatriae@gmail.com## - vulnerability description:# QNX setuid root /usr/photon/bin/Photon allows users to create new servers with# arbitrary filenames registered with the -
## QNX 6.x phfont file and directory enumeration vulnerability by cenobyte 2014# vincitamorpatriae@gmail.com## - vulnerability description:# QNX setuid root /usr/photon/bin/phfont allows any non-root user to enumerate# files and directories as root
# QNX 6.x phgrafx file enumeration vulnerability by cenobyte 2013# vincitamorpatriae@gmail.com## - vulnerability description:# QNX setuid root /usr/photon/bin/phgrafx allows any non-root user to enumerate# files and directories due to opendir() mess
# # QNX 6.4.x/6.5.x pppoectl disclose /etc/shadow by cenobyte 2013 # vincitamorpatriae@gmail.com # # - vulnerability description: # QNX setuid root /sbin/pppoectl allows any user to gain access to privileged # information such as the root password h
/* * QNX 6.5.0 x86 phfont local root exploit by cenobyte 2013 * vincitamorpatriae@gmail.com * * - vulnerability description: * Setuid root /usr/photon/bin/phfont on QNX is prone to a buffer overflow. * The vulnerability is due to insufficent bounds
/* * QNX 6.5.0 x86 io-graphics local root exploit by cenobyte 2013 * vincitamorpatriae@gmail.com * * - vulnerability description: * Setuid root /usr/photon/bin/io-graphics on QNX is prone to a buffer overflow. * The vulnerability is due to insuffice
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/
#!/usr/bin/python # KMPlayer 3.8.0.117 Buffer Overflow # Author: metacom # Tested on: Windows Xp pro-sp3 En # Download link : http://www.chip.de/downloads/KMPlayer_33859258.html # Version: 3.8.0.117 Kmp Plus # Howto / Notes: # Run KMPlayer Playlist
## # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 Msf::Exploit::Remote Rank = GoodRanking include Msf::Exploit::Remote::Tcp in