Cisco Security Advisory - Cisco IOS XR Software contains a vulnerability in the Border Gateway Protocol (BGP) feature. The vulnerability manifests itself when a BGP peer announces a prefix with a specific, valid but unrecognized transitive attribute. On receipt of this prefix, the Cisco IOS XR device will corrupt the attribute before sending it to the neighboring devices. Neighboring devices that receive this corrupted update may reset the BGP peering session.
f289418468686904e2e0ad70c7d696956365e73fe3f9d83ba0946ae893e3f353
LEADTOOLS ActiveX Raster Twain version 16.5 remote buffer overflow proof of concept exploit that leverages LtocxTwainu.dll.
d621a52b3e4d10ca46462b146fbbc96a27cb4bda25c731aa2e4ea0fe565e009f
Wiccle version 1.00 suffers from a cross site scripting vulnerability.
fd3e3923c2b75840215147cced0dcf3e0b625a1fa06262a4c0c9b2e7f7c0f004
Pixie version 1.04 suffers from cross site scripting vulnerabilities.
1c7bf772bd2679c9962e92158fadb76cee55c899649e9165089719a8f71f914a
It appears that many browsers will gladly accept wildcard certificates for IP addresses versus expecting proper domain names for the CN. This is,.. well, very interesting and violates RFC 2818.
469285a2d833d9b4bcd7b10c8a68f5c5ca09223404f03c1675b62b8780642ca2
iGaming CMS version 1.5 suffers from SQL injection vulnerabilities.
35f8762686a86bd9657ab5476f9cd4039a307bb034634886fea1cd604d7d4dc8
Professional Site Immobiliare suffers from a remote SQL injection vulnerability.
1ef6bcaf9386474e2fd4b53671de31db7030b2bfa208c9f83e83a02c604232db
Mozilla Firefox version 3.6.8 with Adobe Reader Plugin version 9.3.4.218 DLL hijacking exploit that leverages CoolType.dll.
99b1038919a894399559f28e22a581cef9029d7635eb4ceea25c27fb6843af9f
Pc4Uploader version 9.0 suffers from a cross site request forgery vulnerability.
b4e148a748154a2c68863fd6735e6d5ec9a20ee739e0b64bedb923ec17ddc5b7
Esvon Classifieds version 4.0 suffers from remote command execution and remote file inclusion vulnerabilities.
ba286c5b90431e63571bc153d6cd5e00797ba1cde81a804da302c50d26e143e2
Flash Player 9 DLL hijacking exploit that leverages schannel.dll.
d077543b744cfcf5a514dd332e72e19c9224facb232abc81d08a9d32f872f096
Linux Kernel versions prior to 2.6.36-rc1 CAN BCM privilege escalation exploit.
72e086a014a41a623ca930856f57c9a2e1ea6f163b29e800d67473f6e614b2f1
McAfee LinuxShield versions 1.5.1 and below remote root code execution exploit.
8a712c77c5f815392c4e24ddc1710f3207045d5ed4dc4bab7b4158ef20f58f68