mRemote version 1.50 suffers from an update spoofing vulnerability.
5f0a05105f4eac25a94fcdac8802592f
Royal TS version 2.1.5 suffers from an update spoofing vulnerability.
716632b0b203b43be35e845638c4c9b1
Daddy's File Hosting version 2 suffers from a cross site scripting vulnerability.
0db64aecf4510c5ed6ebf7a988ddd54c
This archive includes a presentation and code samples. The presentation is called Parsing Binary File Formats with PowerShell.
11fae6f510557858aa55bb3d3098365d
This Metasploit module exploits unauthenticated versions of the "STUNSHELL" web shell. This Metasploit module works when safe mode is enabled on the web server. This shell is widely used in automated RFI payloads.
14fe20dbc0bd59c275dc99df677548aa
This Metasploit module exploits unauthenticated versions of the "STUNSHELL" web shell. This Metasploit module works when safe mode is disabled on the web server. This shell is widely used in automated RFI payloads.
f26790bb1fd499aae352a4ad6c8754a0
WordPress podPress third party plugin version 8.8.10.13 suffers from a cross site scripting vulnerability via 1pixelout_player.swf.
23b3c8ff0f431cb3accef9a7a1caf12d
MailOrderWorks version 5.907 suffers from multiple cross site scripting vulnerabilities.
0416fc31d9a84249488a44c0f31e36f6
The PayPal GP+ service application for analyzing websites suffered from a persistent cross site scripting vulnerability.
8b9b0ec34469b618d47df0ad6b1a69ef
The PayPal content manager system for sellers suffered from a persistent cross site scripting vulnerability.
5c3a52b8fea4e5a703b7d4fcd32502f4
This Metasploit module exploits a stack buffer overflow in ALLMediaServer version 0.94. The vulnerability is caused due to a boundary error within the handling of an HTTP request.
b3294c5e0ea33e94dc0aab374786f72e
Debian Linux Security Advisory 2655-1 - Several cross-site-scripting and denial of service vulnerabilities were discovered in Ruby on Rails, a Ruby framework for web application development.
6e9a4c36a5c842bbc63f38cb0b1539e7
Red Hat Security Advisory 2013-0689-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the libdns library. A remote attacker could use this flaw to send a specially-crafted DNS query to named that, when processed, would cause named to use an excessive amount of memory, or possibly crash. Note: This update disables the syntax checking of NAPTR resource records.
cf7e62f486d152619cd602cc94117fab
Red Hat Security Advisory 2013-0691-01 - Red Hat Storage is a software only, scale-out storage solution that provides flexible and agile unstructured data storage for the enterprise. A flaw was found in the way the Swift component used Python pickle. This could lead to arbitrary code execution. With this update, the JSON format is used. Multiple insecure temporary file creation flaws were found in Red Hat Storage. A local user on the Red Hat Storage server could use these flaws to cause arbitrary files to be overwritten as the root user via a symbolic link attack.
1dcd3fbb4f13f36f971ca73d88fd152c
Red Hat Security Advisory 2013-0690-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the libdns library. A remote attacker could use this flaw to send a specially-crafted DNS query to named that, when processed, would cause named to use an excessive amount of memory, or possibly crash. Note: This update disables the syntax checking of NAPTR resource records.
fce351f8b68afdcd0216c43bbe76c25b
Red Hat Security Advisory 2013-0688-01 - In accordance with the Red Hat Enterprise Linux Errata Support Policy, Advanced Mission Critical for Red Hat Enterprise Linux 5.3 will be retired on March 31, 2014, and support will no longer be provided. Accordingly, Red Hat will no longer provide updated packages, including critical impact security patches or urgent priority bug fixes, for Red Hat Enterprise Linux 5.3 AMC after that date.
d12d9b8cbe0651ec8215ee84714a89c9
Sites designed by Voila Syria suffer from a cross site scripting vulnerability. Note that this finding houses site-specific data.
b87a2b1bc52c077fc56354268fe2bdd3