Many of us have now been long aware of the possibility of programming an USB device to emulate a keyboard and
automatically send keystrokes in order to perform malicious actions on a computer. Some of the most interesting
payloads that can be used with this technique are based around downloading or creating an executable file and then
running it.
However, defenses such as Windows’ User Account Control (UAC) and SmartScreen might make…
QuickTime 7.7.9 is now available and addresses the following:
QuickTime
Available for: Windows 7 and Windows Vista
Impact: Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in QuickTime.
These issues were addressed through improved memory…
Posted by changzhao.mao () dbappsecurity com cn on Jan 08
Application: Cacti
Vendor URL: http://www.cacti.net
Bugs: SQL injection
Author:changzhao.mao(DBAPPSecurity Ltd)
Version affected: 0.8.8f and prior
================================
Introduction
================================
Cacti is a complete frontend to RRDTool, it stores all of the necessary information to create graphs and populate
them with data in a MySQL database. The frontend is completely PHP driven. Along with being able to…
Multiple cross-site scripting (XSS) vulnerabilities in the Titan Framework plugin before 1.6 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) t parameter to iframe-googlefont-preview.php or the (2) text parameter to iframe-font-preview.php.
Multiple cross-site scripting (XSS) vulnerabilities in the NEX-Forms Lite plugin 2.1.0 for WordPress allow remote attackers to inject arbitrary web script or HTML via the form_fields parameter in a (1) do_edit or (2) do_insert action to wp-admin/admin-ajax.php.
Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.
The initialize method in the Histogram class in lib/colorscore/histogram.rb in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) image_path, (2) colors, or (3) depth variable.