View post: [webapps / 0day] – WordPress Front End Upload 0.5.3 Arbitrary File Upload
>> CATEGORY: exploit
View post: [webapps / 0day] – WordPress Front End Upload 0.5.3 Arbitrary File Upload
View original post here: [webapps / 0day] – PHPNet <= 1.8 (ler.php) SQL Injection Vulnerability
Link: [remote exploits] – Microsoft IIS MDAC msadcs.dll RDS Arbitrary Remote Command Execution
Excerpt from: [remote exploits] – Microsoft IIS MDAC msadcs.dll RDS DataStub Content-Type Overflow
See more here: [remote exploits] – Samsung NET-i viewer Multiple ActiveX BackupToAvi() Remote Overflow
View article: [webapps / 0day] – WordPress Plugins (wp-easy-gallery v1.8) Arbitrary Shell Upload
Read the original: [webapps / 0day] – SN News <= 1.2 (/admin/loger.php) Admin Bypass SQL Injection
Zero Day Initiative Advisory 12-078 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Apple QuickTime handles file with the Sorenson v3 Codec
Zero Day Initiative Advisory 12-077 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the QuickTimeVR.qtx component
Zero Day Initiative Advisory 12-076 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple’s QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.