Gentoo Linux Security Advisory 201309-12 - Multiple vulnerabilities have been discovered in Apache HTTP Server, possibly allowing remote attackers to execute arbitrary code, cause a Denial of Service condition or perform man-in-the-middle attacks. Versions less than 2.2.25 are affected.
3bd400e0ab251b33c56a2a76c27ff19d
Gentoo Linux Security Advisory 201309-11 - Multiple vulnerabilities have been found in Subversion, allowing attackers to cause a Denial of Service, escalate privileges, or obtain sensitive information. Versions less than 1.7.13 are affected.
929cdeffca997902104b587c3f0fbd1d
WordPress Bradesco Gateway plugin suffers from a cross site scripting vulnerability. Versions prior to 2.0 are affected.
b08cd26a1ca45ad663c7fc19748c00b9
Different Raidsonic NAS devices are vulnerable to OS command injection via the web interface. The vulnerability exists in timeHandler.cgi, which is accessible without authentication. This Metasploit module has been tested with the versions IB-NAS5220 and IB-NAS4220. Since this module is adding a new user and modifying the inetd daemon configuration, this module is set to ManualRanking and could cause target instability.
f3151dd2eca5d42b2a5b5d7426fb71ac
Ubuntu Security Notice 1965-1 - It was discovered that pyOpenSSL did not properly handle certificates with NULL characters in the Subject Alternative Name field. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications.
94c65b5f3e5c45af0bb95d95ef283e26
Ubuntu Security Notice 1964-1 - It was discovered that LibRaw incorrectly handled photo files. If a user or automated system were tricked into processing a specially crafted photo file, applications linked against LibRaw could be made to crash, resulting in a denial of service.
2a1f6811c2a4976de60ee20cbf334a16
Red Hat Security Advisory 2013-1260-01 - The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine hypervisor. It includes everything necessary to run and manage virtual machines: A subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent. Note: Red Hat Enterprise Virtualization Hypervisor is only available for the Intel 64 and AMD64 architectures with virtualization extensions. Upgrade Note: If you upgrade the Red Hat Enterprise Virtualization Hypervisor through the 3.2 Manager administration portal, the Host may appear with the status of "Install Failed". If this happens, place the host into maintenance mode, then activate it again to get the host back to an "Up" state.
46504f697103cd0b73c961a5dae4ae1d
Debian Linux Security Advisory 2762-1 - Multiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail and news client. Multiple memory safety errors and buffer overflows may lead to the execution of arbitrary code.
5a294c52f3b28067cc0d78bacc42a08c
This is a brief whitepaper tutorial discussing stack-based buffer overflow exploitation.
49452c01d181d495290d24ce54c43233
Hook Analyser is a hook tool which can be potentially helpful in reversing applications and analyzing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.
49fd60c1cc2e27369a14ffb2fa49fd65
This is a brief whitepaper tutorial that discusses format string exploitation.
8e7b7a01f95d6da5dfd2dfe3d275b9a6
This whitepaper is called Off-By-One Exploitation Tutorial. The off by one vulnerability in general means that if an attacker supplied input with certain length if the program has an incorrect length condition the program will write one byte outside the bounds of the space allocated to hold this input causing one of two scenarios depending on the input.
5cb2ae53dcd95b808c534a6a209e1c51
Whitepaper called Return-Oriented-Programming (ROP FTW).
f3584b6be0569a29647d60380eb4644e
SolarWinds Server and Application Monitor version 6.0 suffers from an active-x related buffer overflow vulnerability.
a17c432125d326050ffaf3c546b88f44
AspxCommerce version 2.0 suffers from a remote shell upload vulnerability.
cd7ac93dc1639059116bb954a5456dbe