Yes ! finally MOAUB (Month of Abysssec Undisclosed Bugs) started and finished as well.

Good Or Bad we released lots of 0days and binary analyses during a month (September) and you can use these info for owning websites UN-patched clients or writing more secure applications .
here is summary:
Day1:
Binary Analysis:
MOAUB #1 – Adobe Acrobat Reader and Flash Player “newclass” invalid pointer
MOAUB #1 – Adobe Acrobat Reader and Flash Player “newclass” invalid pointer – Binary Analysis
0day:
MOAUB #1 – Cpanel PHP Restriction Bypass Vulnerability 0day
MOAUB #1 – Cpanel PHP Restriction Bypass Vulnerability 0day
———————————————————————————–
Day2:
Binary Analysis:
MOAUB #2 – Apple QuickTime FlashPix NumberOfTiles Remote Code Execution Vulnerability
MOAUB #2 – Apple QuickTime FlashPix NumberOfTiles Vulnerability – Binary Analysis
0day:
MOAUB #2 – Rainbowportal Multiple Remote Vulnerabilities
MOAUB #2 – Rainbowportal Multiple Remote Vulnerabilities – 0day
———————————————————————————–
Day3:
Binary Analysis:
MOAUB #3 – Trend Micro Internet Security Pro 2010 ActiveX extSetOwner Remote Code Execution
MOAUB #3 – Trend Micro Internet Security Pro 2010 ActiveX extSetOwner – Binary Analysis
0day:
MOAUB #3 – Visinia 1.3 Multiple Vulnerabilities
MOAUB #3 – Visinia CMS Multiple Vulnerabilities – 0day
———————————————————————————–
Day4:
Binary Analysis:
MOAUB #4 – Movie Maker Remote Code Execution (MS10-016)
MOAUB #4 – Movie Maker Remote Code Execution (MS10-016) – Binary Analysis
0day:
MOAUB #4 – syndeocms 2.8.02 Multiple Vulnerabilities
MOAUB #4 – Syndeocms 2.8.02 Multiple Vulnerabilities – 0day
———————————————————————————–
Day5:
Binary Analysis:
MOAUB #5 – Microsoft MPEG Layer-3 Remote Command Execution Exploit
MOAUB #5 – Microsoft MPEG Layer-3 Remote Command Execution – Binary Analysis
0day:
MOAUB #5 – IfNuke Multiple Remote Vulnerabilities 0day
MOAUB #5 – IfNuke Multiple Remote Vulnerabilities 0day
———————————————————————————–
Day6:
Binary Analysis:
MOAUB #6 – HP OpenView NNM webappmon.exe execvp_nc Remote Code Execution
MOAUB #6 – HP OpenView NNM webappmon execvp_nc Remote Code Execution – Binary Analysis
0day:
MOAUB #6 – InterPhoto Gallery Multiple Remote Vulnerabilities
MOAUB #6 – InterPhoto Gallery Multiple Remote Vulnerabilities – 0day
———————————————————————————–
Day7:
Binary Analysis:
MOAUB #7 – Novell Netware NWFTPD RMD/RNFR/DELE Argument Parsing Buffer overflow
MOAUB #7 – Novell Netware NWFTPD RMD/RNFR/DELE Argument Parsing Buffer overflow
0day:
MOAUB #7 – DynPage <= v1.0 Multiple Remote Vulnerabilities – 0day
MOAUB #7 – DynPage <= v1.0 Multiple Remote Vulnerabilities – 0day
———————————————————————————–
Day8:
Binary Analysis:
MOAUB #8 – Microsoft Office Visio DXF File Stack based Overflow
MOAUB #8 – Microsoft Office Visio DXF File Stack based Overflow – Binary Analysis
0day:
MOAUB #8 – Sirang Web-Based D-Control Multiple Remote Vulnerabilities
MOAUB #8 – Sirang Web-Based D-Control Multiple Remote Vulnerabilities – 0 day
———————————————————————————–
Day9:
Binary Analysis:
MOAUB #9 – Mozilla Firefox XSLT Sort Remote Code Execution Vulnerability
MOAUB #9 – Mozilla Firefox XSLT Sort Remote Code Execution Vulnerability
0day:
FestOS CMS 2.3b Multiple Remote Vulnerabilities
MOAUB #9 – FestOS CMS 2.3b Multiple Remote Vulnerabilities
———————————————————————————–
Day10:
Binary Analysis:
MOAUB #10 – Excel RTD Memory Corruption
MOAUB #10 – Excel RTD Memory Corruption
0day:
MOAUB #10 – aradBlog Multiple Remote Vulnerabilities
MOAUB #10 – aradBlog Multiple Remote Vulnerabilities
———————————————————————————–
Day11:
Binary Analysis:
MOAUB #11 – Microsoft Office Word 2007 sprmCMajority Buffer Overflow
MOAUB #11 – Microsoft Office Word 2007 sprmCMajority Buffer Overflow
0day:
MOAUB #11 – ASP Nuke SQL Injection Vulnerability
MOAUB #11 – ASP Nuke Sql Injection Vulnerability
———————————————————————————–
Day12:
Binary Analysis:
MOAUB #12 – Adobe Acrobat and Reader “pushstring” Memory Corruption
MOAUB #12 – Adobe Acrobat and Reader “pushstring” Memory Corruption
0day:
MOAUB #12 – eshtery CMS SQL Injection Vulnerability
MOAUB #12 – eshtery CMS SQL Injection Vulnerability
———————————————————————————–
Day13:
Binary Analysis:
MOAUB #13 – RealPlayer FLV Parsing Integer Overflow
MOAUB #13 – RealPlayer FLV Parsing Integer Overflow
0day:
MOAUB #13 – Luftguitar CMS Vulnerability: Upload Arbitrary File
MOAUB #13 – Luftguitar CMS Vulnerability: Upload Arbitrary File
———————————————————————————–
Day14:
Binary Analysis:
MOAUB #14 – Novell iPrint Client Browser Plugin ExecuteRequest debug Parameter Stack Overflow
MOAUB #14 – Novell iPrint Client Browser Plugin ExecuteRequest debug Stack Overflow
0day:
MOAUB #14 – FreeDiscussionForums v1.0 Multiple Remote Vulnerabilities
MOAUB #14 – FreeDiscussionForums v1.0 Multiple Remote Vulnerabilities
———————————————————————————–
Day15:
Binary Analysis:
MOAUB #15 – Ipswitch Imail Server List Mailer Reply-To Address Memory Corruption
MOAUB #15 – Ipswitch Imail Server List Mailer Reply-To Address Memory Corruption
0day:
MOAUB #15 – PHP MicroCMS 1.0.1 Multiple Remote Vulnerabilities
MOAUB #15 – PHP MicroCMS 1.0.1 Multiple Remote Vulnerabilities
———————————————————————————–
Day16:
Binary Analysis:
MOAUB #16 – Microsoft Excel HFPicture Record Parsing Remote Code Execution Vulnerability
MOAUB #16 – Microsoft Excel HFPicture Record Parsing Remote Code Execution Vulnerability
0day:
MOAUB #16 – mojoportal Multiple Remote Vulnerabilities
MOAUB #16 – mojoportal Multiple Remote Vulnerabilities
———————————————————————————–
Day17:
Binary Analysis:
MOAUB #17 – Firefox Plugin Parameter EnsureCachedAttrParamArrays Remote Code Execution
MOAUB #17 – Firefox Plugin Parameter EnsureCachedAttrParamArrays Remote Code Execution
0day:
MOAUB #17 – phpmyfamily Multiple Remote Vulnerabilities
MOAUB #17 – phpmyfamily Multiple Remote Vulnerabilities
———————————————————————————–
Day18:
Binary Analysis:
MOAUB #18 – Apple QuickTime FLI LinePacket Remote Code Execution Vulnerability
MOAUB #18 – Apple QuickTime FLI LinePacket Remote Code Execution Vulnerability
0day:
MOAUB #18 – CMSimple XSRF Vulnerability
MOAUB #18- CMSimple XSRF Vulnerability
———————————————————————————–
Day19:
Binary Analysis:
MOAUB #19 – Novell iPrint Client Browser Plugin call-back-url Stack Overflow
MOAUB #19 – Novell iPrint Client Browser Plugin call-back-url Stack Overflow
0day:
MOAUB #19 – JMD-CMS Multiple Remote Vulnerabilities
MOAUB #19 – JMD-CMS Multiple Remote Vulnerabilities
———————————————————————————–
Day20:
Binary Analysis:
MOAUB #20 – Java CMM readMabCurveData Stack Overflow
MOAUB #20 – Java CMM readMabCurveData Stack Overflow
0day:
MOAUB #20 – VWD-CMS CSRF Vulnerability
MOAUB #20 – VWD-CMS CSRF Vulnerability
———————————————————————————–
Day21:
Binary Analysis:
MOAUB #21 – Microsoft Excel WOPT Record Parsing Heap Memory Corruption
MOAUB #21 – Microsoft Excel WOPT Record Parsing Heap Memory Corruption
0day:
MOAUB #21 – Personal.Net Portal Multiple Vulnerabilities
MOAUB #21 – Personal.Net Portal Multiple Vulnerabilities
———————————————————————————–
Day22:
Binary Analysis:
MOAUB #22 – Adobe Shockwave Director tSAC Chunk Memory Corruption
MOAUB #22 – Adobe Shockwave Director tSAC Chunk Memory Corruption
0day:
MOAUB #22 – gausCMS Multiple Vulnerabilities
MOAUB #22 – gausCMS Multiple Vulnerabilities
———————————————————————————–
Day23:
Binary Analysis:
MOAUB #23 – Adobe Acrobat Reader and Flash ‘newfunction’ Remote Code Execution Vulnerability
MOAUB #23 – Adobe Acrobat Reader and Flash ‘newfunction’ Remote Code Execution Vulnerability
0day:
MOAUB #23 – Microsoft Excel HFPicture Record Parsing Memory Corruption (0day)
MOAUB #23 – Microsoft Excel HFPicture Record Parsing Memory Corruption (0day)
———————————————————————————–
Day24:
Binary Analysis:
MOAUB #24 – Microsoft Excel OBJ Record Stack Overflow
MOAUB #24 – Microsoft Excel OBJ Record Stack Overflow
0day:
MOAUB #24 – Microsoft MPEG Layer-3 Audio Decoder Division By Zero
MOAUB #24 – Microsoft MPEG Layer-3 Audio Decoder Division By Zero
———————————————————————————–
Day25:
Binary Analysis:
MOAUB #25 – Mozilla Firefox CSS font-face Remote Code Execution Vulnerability
MOAUB #25 – Mozilla Firefox CSS font-face Remote Code Execution Vulnerability
0day:
MOAUB #25 – VisualSite CMS v1.3 Multiple Vulnerabilities
MOAUB #25 – VisualSite CMS v1.3 Multiple Vulnerabilities
———————————————————————————–
Day26:
Binary Analysis:
MOAUB #26 – Microsoft Cinepak Codec CVDecompress Heap Overflow
MOAUB #26 – Microsoft Cinepak Codec CVDecompress Heap Overflow
0day:
MOAUB #26 – Zenphoto Config Update and Command Execute Vulnerability
MOAUB #26 – Zenphoto Config Update and Command Execute Vulnerability
———————————————————————————–
Day27:
Binary Analysis:
MOAUB #27 – Microsoft Internet Explorer MSHTML Findtext Processing Issue
MOAUB #27 – Microsoft Internet Explorer MSHTML Findtext Processing Issue
0day:
MOAUB #27 – ndCMS Sql Injection Vulnerability
MOAUB #27 – ndCMS Sql Injection Vulnerability
———————————————————————————–
Day28:
0day:
MOAUB #28 – JE CMS 1.0.0 Bypass Authentication by SQL Injection Vulnerability
MOAUB #28 – JE CMS 1.0.0 Bypass Authentication by SQL Injection Vulnerability
0day:
MOAUB #28 – AtomatiCMS Upload Arbitrary File Vulnerability
MOAUB #28 – AtomatiCMS Upload Arbitrary File Vulnerability
———————————————————————————–
Day29:
Binary Analysis:
MOAUB #29 – Microsoft Excel SxView Record Parsing Heap Memory Corruption
MOAUB #29 – Microsoft Excel SxView Record Parsing Heap Memory Corruption
Day30:
Binary Analysis:
MOAUB #30 – Microsoft Unicode Scripts Processor Remote Code Execution
MOAUB #30 – Microsoft Unicode Scripts Processor Remote Code Execution
0day:
MOAUB #30 – ASPMass Shopping Cart Vulnerability File Upload CSRF
MOAUB #30 – ASPMass Shopping Cart Vulnerability File Upload CSRF
———————————————————————————–
Press :
Exploit-Database
Dark-Reading
NetworkAsia
ITBusinessedge
ComputerWorld
Theinquirer
And …
———————————————————————————–
PS : during these project and maybe we made some technical and non-technical mistakes due to complexly and compaction of this work and we hope we can fix some of them.
at end we are happy with result and your kind feedback.
for sure we will have really more interesting projects soon as soon possible and we think you will like them as well .
please follow me on twitter with @abysssec for other news projects and stay tunned for more projects .
as always finally if you have any question feel free to contact :
shahin [at] abysssec.com
info [at] abysssec.com