GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.
9dd691ad1ccdb7386029809afef6b5ea
Huawei E587 3G Mobile Hotspot version 11.203.27 is prone to a cross site scripting vulnerability in the Web UI. A specially crafted SMS can bypass the function used to sanitize incoming SMS messages.
61262e21de2d8cc49228170738fa0706
Red Hat Security Advisory 2013-1061-01 - PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. A buffer overflow flaw was found in the way PHP parsed deeply nested XML documents. If a PHP application used the xml_parse_into_struct() function to parse untrusted XML content, an attacker able to supply specially-crafted XML could use this flaw to crash the application or, possibly, execute arbitrary code with the privileges of the user running the PHP interpreter. All php users should upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing the updated packages, the httpd daemon must be restarted for the update to take effect.
c8cbb257d245cacf208273bbb18e375a
Saurus CMS version 4.7.1 suffers from cross site scripting, remote file inclusion, local file inclusion, information disclosure, remote SQL injection, HTTP response splitting, cross site request forgery, and directory traversal vulnerabilities.
c5bc8a3e9c7c1dcc21b2e1c2db019482
Huawei E587 3G Mobile Hotspot version 11.203.27 is prone to a command injection vulnerability in the Web UI. Successful exploitation allows unauthenticated attackers to execute arbitrary commands with root privileges.
656cc729ae0243fd7539ac4c1a507dc1
SilverStripe CMS decidedly to quietly fix multiple persistent cross site scripting vulnerabilities without informing the public. Fail.
948de04e40911961d5e4f5b2ba0a6293
Mandriva Linux Security Advisory 2013-195 - A heap corruption vulnerability has been discovered and corrected in PHP.
1ad398ec7927778e9f0611d8bfaef0ca
Red Hat Security Advisory 2013-1060-01 - IBM Java SE version 7 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit.
da99a0ddf13d2ef208ac7881bbc424f3
Red Hat Security Advisory 2013-1059-01 - IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit.
073ac8f9fa1e951d20be914e77ff4634
ZedLog is a robust cross-platform input logging tool (or key logger). It is based on a flexible data logging system which makes it easy to get the required data. It captures all keyboard and mouse events, has a full GUI, and supports logging to a file and basic hiding.
69fe479d1e141735b273ab3b12d85df5
Zoho suffers from information disclosure due to a lack of a content-type being specified and also appears to use mixed content.
3dbd0405c3fbd4aa7b5cc61428fdd3e5
Dell.com suffers from an open redirection vulnerability.
dc64235d7b5bb78e748ebc6d7dbc7769
TinyMCE Image Manager versions 1.1 and below suffer from a cross site scripting and content spoofing vulnerabilities.
76e46fa650b4e7ec9f040e4f8e09fe52
This is a brief summary of how a security researcher discovered a use-after-free vulnerability in Microsoft Internet Explorer versions 6 and 7.
9e203fe8068772588301b4507a4b0e3a
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage. When Medusa, Hydra or other brute-force tools fail to do what you want, Patator might be what you need.
58fb64a58a9ecc1629d35b5680098721
DAVOSET is a tool for committing distributed denial of service attacks using execution on other sites.
46991c53e72b43bcdf8429c4d015cbed