Debian Security Advisory 2803-1
Debian Linux Security Advisory 2803-1 - Multiple vulnerabilities were discovered in Quagga, a BGP/OSPF/RIP routing daemon.
View ArticleWondershare Player 1.6.0 DLL Hijacking
Wondershare Player version 1.6.0 suffers from a DLL hijacking vulnerability.
View ArticleExploitPack Security Framework 2.2a
Exploit Pack is an open source security framework that combines the benefits of a Java GUI, Python as an Engine, and well-known exploits in the wild. It has an IDE to make the task of developing new...
View ArticleBoilsoft RM To MP3 Converter 1.72 Denial Of Service
Boilsoft RM to MP3 Converter version 1.72 crash proof of concept denial of service exploit.
View ArticleBZR Player 0.97 DLL Hijack
BZR Player version 0.97 suffers from a dll hijacking vulnerability in codec_mpeg.dll.
View ArticleRed Hat Security Advisory 2013-1767-01
Red Hat Security Advisory 2013-1767-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. A buffer...
View ArticleMandriva Linux Security Advisory 2013-287
Mandriva Linux Security Advisory 2013-287 - Drupal core's Image module allows for the on-demand generation of image derivatives. This capability can be abused by requesting a large number of new...
View ArticleDebian Security Advisory 2804-1
Debian Linux Security Advisory 2804-1 - Multiple vulnerabilities have been discovered in Drupal, a fully-featured pseudo random number generation, code execution, incorrect security token validation...
View ArticleHP Security Bulletin HPSBGN02942
HP Security Bulletin HPSBGN02942 - A potential security vulnerability has been identified with HP Service Manager and ServiceCenter. The vulnerability could be exploited remotely to allow remote code...
View ArticleHack In The Box Amsterdam 2014 Call For Papers
The call for papers for the upcoming Hack in The Box security conference in Amsterdam is now open. It will take place from May 27th through the 30th, 2014.
View ArticleClaroline 1.11.8 Cross Site Scripting
Claroline version 1.11.8 suffers from multiple cross site scripting vulnerabilities.
View ArticleDokeos 2.2 RC2 SQL Injection
Dokeos version 2.2 RC2 suffers from a remote SQL injection vulnerability.
View ArticleChamilo LMS 1.9.6 SQL Injection
Chamilo LMS version 1.9.6 suffers from a remote SQL injection vulnerability.
View ArticleMicrosoft Tagged Image File Format (TIFF) Integer Overflow
This Metasploit module exploits a vulnerability found in Microsoft's Tagged Image File Format. It was originally discovered in the wild, targeting Windows XP and Windows Server 2003 users running...
View ArticleUptime Agent 5.0.1 Stack Overflow
Uptime Agent version 5.0.1 suffers from a stack overflow vulnerability. Proof of concept exploit included in this archive.
View ArticleWapiti Web Application Vulnerability Scanner 2.3.0
Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities.
View ArticleUbuntu Security Notice USN-2035-1
Ubuntu Security Notice 2035-1 - Charlie Somerville discovered that Ruby incorrectly handled floating point number conversion. An attacker could possibly use this issue with an application that converts...
View ArticleRed Hat Security Advisory 2013-1771-01
Red Hat Security Advisory 2013-1771-01 - Red Hat JBoss Web Framework Kit combines popular open source web frameworks into a single solution for Java applications. This release serves as a replacement...
View ArticleKimai 0.9.2 db_restore.php SQL Injection
This Metasploit module exploits a SQL injection vulnerability in Kimai version 0.9.2.x. The 'db_restore.php' file allows unauthenticated users to execute arbitrary SQL queries. This Metasploit module...
View ArticleLiveZilla Cross Site Scripting
LiveZilla versions prior to 5.1.1.0 suffer from a cross site scripting vulnerability.
View ArticleLiveZilla Password Disclosure
LiveZilla versions prior to 5.1.1.0 suffer from a local password disclosure vulnerability.
View ArticleRuckus Access Point Authentication Bypass
A user authentication bypass vulnerability has been discovered in Ruckus Access Point's administrative web interface. This vulnerability may allow a malicious user to gain unauthorized access to the...
View ArticleAndroidOS 4.3 Permission Bypass
AndroidOS version 4.3 suffers from a permission bypass vulnerability.
View ArticleNewsAktuell PressePortal DE SQL Injection
NewsAktuell PressePortal DE suffers from a remote SQL injection vulnerability.
View Article