GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.
c7c367ee06f7f05ddb1e36a444a142ed
The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.
87f76e7cce22c990819f6794ba36872d
Nagios Looking Glass versions 1.1.0 beta 2 and below suffer from a local file inclusion vulnerability.
93c8d2bb6a3bf34ac4ae8484cfdc6ac7
MobileIron version 4.5.4 suffers from a cross site scripting vulnerability in the device registration functionality.
745e1f7dbab157688bed397ec6c5c792
ILIAS eLearning CMS versions 4.3.4 and 4.4 suffer from a persistent cross site scripting vulnerability.
55438148bfc2d26c41df778ab01683a1
WatchGuard Firewall XTM version 11.7.4u1 suffers from a remote buffer overflow vulnerability in the handling of the sessionid cookie. This is the perl version of the exploit.
291cacb6492108f6b1776ae3cfd67700
WatchGuard Firewall XTM version 11.7.4u1 suffers from a remote buffer overflow vulnerability in the handling of the sessionid cookie. This is the Metasploit module version of the exploit.
e04d705b954f907d3922f58be6170907
Struts version 2.3.15.3 suffers from multiple cross site scripting vulnerabilities.
917c62ebfe2f7ca24774d0e124dc3931
Proof of concept exploit that demonstrates remote command execution on Netgear ReadyNAS.
5b0d4c4a67a2b093cc77fefbf354b429
Ops View version pre 4.4.41 suffers from multiple cross site scripting vulnerabilities.
e06b5f0bc8804df2abab5a8887e63a04
Mandriva Linux Security Advisory 2013-262 - In PyCrypto before v2.6.1, the Crypto.Random pseudo-random number generator exhibits a race condition that may cause it to generate the same 'random' output in multiple processes that are forked from each other. Depending on the application, this could reveal sensitive information or cryptographic keys to remote attackers.
c914eb6d7cd918d111b7385f10b3736c
Mandriva Linux Security Advisory 2013-261 - Possible memory exhaustion denial of service due to the size of decompressed payloads in dropbear before 2013.59. Inconsistent delays in authorization failures could be used to disclose the existence of valid user accounts in dropbear before 2013.59.
8acc3d49b0f96fe673ed7e7b8514305b
Mandriva Linux Security Advisory 2013-260 - Multiple vulnerabilities have been discovered and corrected in x11-server. The updated packages have been patched to correct these issues.
e3591cc9c7148e10a44ce40218eb092e
Mandriva Linux Security Advisory 2013-259 - Use-after-free vulnerability in the doImageText function in dix/dixfonts.c in the xorg-server module before 1.14.4 in X.Org X11 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted ImageText request that triggers memory-allocation failure.
d125f59b83cd24a55e5f83e4d2e7dbd9
Mandriva Linux Security Advisory 2013-258 - It was discovered that ICU contained a race condition affecting multi-threaded applications. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. It was discovered that ICU incorrectly handled memory operations. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program.
c67f90b398ba7f3b727ea6732ff4e513
Gentoo Linux Security Advisory 201310-21 - Multiple vulnerabilities have been found in MediaWiki, the worst of which could lead to Denial of Service. Versions less than 1.21.2 are affected.
927b589499f288ee024d0d4db3f46e6c
Gentoo Linux Security Advisory 201310-20 - A vulnerability in acpid2 may allow a local attacker to gain escalated privileges. Versions less than 2.0.17 are affected.
d5986df22459ab18b7584a7774af17d7
Gentoo Linux Security Advisory 201310-19 - A path vulnerability in X2Go Server may allow remote execution of arbitrary code. Versions less than 4.0.0.2 are affected.
f99990412cb03ddfa673d4651e354f16
Debian Linux Security Advisory 2786-1 - The Google Chrome Security Team discovered two issues (a race condition and a use-after-free issue) in the International Components for Unicode (ICU) library.
b7c2ffee26d8819db958c987dcb0af13
Gentoo Linux Security Advisory 201310-18 - Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to Denial of Service. Versions less than 2.12.23-r1 are affected.
3bd373195a2954d3ad1c151032ac68b5
Gentoo Linux Security Advisory 201310-17 - pmake uses temporary files in an insecure manner, allowing for symlink attacks. Versions less than 1.111.3.1 are affected.
fcc1af65e598005447484c48671497c3
Debian Linux Security Advisory 2787-1 - It was discovered that roundcube, a skinnable AJAX based webmail solution for IMAP servers, does not properly sanitize the _session parameter in steps/utils/save_pref.inc during saving preferences. The vulnerability can be exploited to overwrite configuration settings and subsequently allowing random file access, manipulated SQL queries and even code execution.
ce0385e27ad71d653a72155c0a9a389e
Debian Linux Security Advisory 2785-1 - Several vulnerabilities have been discovered in the chromium web browser.
b4e024ee4525eb80a93f124881d1ceb3
Gentoo Linux Security Advisory 201310-16 - Two buffer overflow vulnerabilities in TPTEST may allow remote attackers to execute arbitrary code or cause Denial of Service. Versions less than 3.1.7-r2 are affected.
6bc77f724fb5f22f671b4ea88bd60396
vBulletin versions 4.1.x and 5.x.x suffer from a remote unauthenticated administrative user injection vulnerability via upgrade.php.
7b0af1994f2dfa5aaf6675fb81c62955