Secunia Security Advisory - A vulnerability has been reported in EC-CUBE, which can be exploited by malicious people to conduct cross-site scripting attacks.
50af4cbf26f65e8bbd93408e09c6f8a6d8c69e3c6078044e2cefc82d854f0869
Secunia Security Advisory - NetBSD has issued an update for BIND. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
1415def8527c5e3bb9d4f5f7c2836158b65619fac9a7e72bf4d6e115b75eda7b
Secunia Security Advisory - Blue Coat has acknowledged a vulnerability in Blue Coat Director, which can be exploited by malicious people to bypass certain security restrictions.
5873792efd0b8879f3262c2937d770578d1816c3dbc55389d777539d0a2df676
Secunia Security Advisory - AutoSec Tools has discovered a vulnerability in Limny, which can be exploited by malicious people to bypass certain security restrictions.
22342ddcbe3e7dd5149b7927075f8b46729aa50227ddf6f1720a3f0c63265921
Secunia Security Advisory - Fedora has issued an update for dhcp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
5f91f60d2bc7ee19ef91f20acce78c85186c39fffb91b61e4a3381512a2bf448
Secunia Security Advisory - Multiple vulnerabilities have been discovered in Terminal Server Client (tsclient), which can be exploited by malicious people to compromise a user's system.
ac12b089dc90737dcca51d9af9a18ef8db55ead8185fb24199205ea5184c4e81
Secunia Security Advisory - Multiple vulnerabilities have been reported in Cisco WebEx Player, which can be exploited by malicious people to compromise a user's system.
afd4919fc2ef3d6756e27105f665c34e514210fdeefd74a3c37cc067d95ad32c
Secunia Security Advisory - Blue Coat has acknowledged a vulnerability in Blue Coat CacheFlow, which can be exploited by malicious people to bypass certain security restrictions.
78f96ba592b0a56cecace1d2bc663bacbd37b3e542eefe206a92fd6dfe77a0c0
Secunia Security Advisory - Two vulnerabilities have been reported in Aruba Mobility Controller, which can be exploited by malicious people to cause a DoS (Denial of Service) and bypass certain security restrictions.
24ee0d187ee4df77e3eb722a3d05cc79c9ab69cd7e839b473972e870a41c3261
Secunia Security Advisory - Multiple vulnerabilities have been discovered in TinyWebGallery, which can be exploited by malicious people to conduct cross-site scripting attacks.
76a09079cf43502cd0a4e2b96ddcaaf8444b16c640c7fa757eba47e121527929
Secunia Security Advisory - Blue Coat has acknowledged a vulnerability in Blue Coat ProxyOne, which can be exploited by malicious people to bypass certain security restrictions.
922d36af5865effd753df82b7cf98c4bc479500d8aa5821f6d7461cc1754d700
Secunia Security Advisory - Blue Coat has acknowledged a vulnerability in Blue Coat ProxySG, which can be exploited by malicious people to bypass certain security restrictions.
75858e82ccc4793bf01ba71bcb390fe50c02bc9264eb3886162b025fdc64b8f8
Ubuntu Security Notice 1054-1 - Gleb Napatov discovered that KVM did not correctly check certain privileged operations. A local attacker with access to a guest kernel could exploit this to crash the host system, leading to a denial of service. Steve Chen discovered that setsockopt did not correctly check MSS values. A local attacker could make a specially crafted socket call to crash the system, leading to a denial of service. Dave Jones discovered that the mprotect system call did not correctly handle merged VMAs. A local attacker could exploit this to crash the system, leading to a denial of service. Vegard Nossum discovered that memory garbage collection was not handled correctly for active sockets. A local attacker could exploit this to allocate all available kernel memory, leading to a denial of service.
06dbb5e01b944299deccb88d5069d0243dcec4c7f68e9d46380138f362abea3b
Whitepaper called Attacking Server Side XML Parsers.
0f965f93708f4321b9c5655c6b1dd542898ed6a87ee0ea9523d55f8980f547ab
Cisco Security Advisory - Multiple buffer overflow vulnerabilities exist in the Cisco WebEx Recording Format (WRF) and Advanced Recording Format (ARF) Players. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system of a targeted user. The Cisco WebEx Players are applications that are used to play back WebEx meeting recordings that have been recorded on the computer of an on-line meeting attendee. The players can be automatically installed when the user accesses a recording file that is hosted on a WebEx server. The player can also be manually installed for offline playback after downloading the application from www.webex.com. If the WebEx recording player was automatically installed, it will be automatically upgraded to the latest, non-vulnerable version when users access a recording file that is hosted on a WebEx server. If the WebEx recording player was manually installed, users will need to manually install a new version of the player after downloading the latest version from www.webex.com. Cisco has released free software updates that address these vulnerabilities.
b683e91ff48b26c27a3a43efd012c8c476d5f02bdea7b32585bd0c448f52fcac
This archive contains all of the 241 exploits added to Packet Storm in January, 2011.
1a696fd6df76ed7b4048e21cb3615d03bcd970273b4fcbff3d439fbdbe58d7fc
Redaxscript version 0.3.2 suffers from path disclosure and remote SQL injection vulnerabilities.
eeabad1902e169e9c47552473d52107a08bac2d81af68e8a68549677a2954dc3