Secunia Security Advisory - IBM has acknowledged a weakness and multiple vulnerabilities in IBM Rational AppScan, which can be exploited by malicious users to disclose certain information and by malicious people to conduct spoofing and cross-site scripting attacks, disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
4d333496b2ab011dfa51dd6328104952558a225f890f2caf54508c9b5ed4785c
Secunia Security Advisory - A vulnerability has been reported in multiple VMware products, which can be exploited by malicious people to compromise a user's system.
90de6f9f02e3e780445525d4f4b2981c6636a6dc47bf45c0042741c9f4f2267f
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
ae2c1fb52babd9e92264ac7c4486d3e941be6deb91b8a590965848fbbcbd9e88
Code Audit Labs has discovered that Microsoft Internet Explorer versions 8 and 9 suffer from a use-after-free vulnerability in the developer toolbar.
f7298e95d2549588ea1cd82324a1caedfe0a90734ffc624026081336553170f8
Code Audit Labs has discovered a remote code execution vulnerability in Microsoft Internet Explorer 8 due to a use-after-free issue having to do with property ids.
d90822cc1fdf82eaf50e354edf2ba9269a59ae2ff8196eb2ba50bfbd36cfe29b
Drupal Global Redirect third party module versions 6.x and 7.x suffer from an open redirection vulnerability.
f954e02eb6b27fce9898cb582e4a94107053758103ac19cad8ebbdc238d012d4
Drupal Ubercart AJAX Cart third party module version 6.x suffers from an information disclosure vulnerability.
1c1380ec32ac5791363040339561d85968b380b06d722625571b489f7907f87a
Drupal Protected Node third party module version 6.x suffers from an access bypass vulnerability.
b4aaddf3a18e328ac108e52f95a4dcea1a732a0ccdd4f218edd6da70910802f5
ESRI ArcMap suffers from an arbitrary code execution vulnerability when handling a specially crafted map file.
41300a1d1574cd78396223284910e6a41716e4bf600d84b852228613ab075960
Drupal SimpleMeta third party module version 6.x suffers from a cross site request forgery vulnerability.
559caf9547f39a2aeed5b0f1830e8ad64accf5a1df871e48df2290bd93d06919
Adobe Illustrator CS5.5 memory corruption proof of concept exploit that spawns a calculator.
35acd4b2f3b86dad800d4dd1e04e53c4376cae35b9ee1d7a968284f59cf357ee
Drupal Node Hierarchy third party module version 6.x suffers from a cross site request forgery vulnerability.
7e53cac24e1e0b6cf9bc8e8e14e787dfd0e07331fdd56dd24a23c1a3f21721d7
Drupal Janrain Capture third party module versions 6.x and 7.x suffer from an open redirect vulnerability.
5cd86472df348671d59ea4a24f9de07cb78b7d14b9f0f04870be4a0cd322990f
WordPress Invit0r plugin version 0.22 suffers from a remote shell upload vulnerability.
721c03aa5c5e768581e252bff7a0323af56be4f8b13abeb9e211d0128f2e7244
WordPress Evarisk plugin version 5.1.5.4 suffers from a remote shell upload vulnerability.
acf005b9162e1f259ec0430b14dff8146bc48acb8a5093ae793a646c952e8e21
WordPress Annonces plugin version 1.2.0.1 suffers from a remote shell upload vulnerability.
000de251d7e1514cbd248f056229f6203211c01293eaf8acfb60ebd9a51a20a3
Dotcombinat suffers from a remote SQL injection vulnerability.
68a5dcc077787b7f9952f9fa102af7601076ada81fc62ae04d56c721b96f7bd4
A vulnerability in Checkpoint Endpoint Connect VPN causes the client to be susceptible to an attack that result in arbitrary dynamic-library loading. A user with local disk access can carefully construct a DLL that suits a pattern that is being traversed by the client and implement it somewhere along the search path and the client will load it seamlessly.
4d25fbd959e5ee60f126bb396b30dab8ef0c294cb5f29ded00cd0c25b3d9e6f6
RevolutionTechnologies suffers from a remote SQL injection vulnerability.
6cf41aefedcf0de69f59bc7ed0404f84454387b949da9993e1938bc37f925ec5
Advanced Admin Page Finder searches a site for over 800 possible administrative interfaces. Written in Python.
579b03498bcce05149a5c42de2dd6d0b6c95d1437440609f8d48da616759e034
Mozilla Firefox version 13.0 remote denial of service proof of concept exploit.
ae7f511ae4c9e3d17f34eb4e61e113606abd673ebae4661615339b1341be665c
seoPLUSteam suffers from a remote SQL injection vulnerability.
7adc92ada21b2d5c1d43bcdc906519cabeed22d0562232b3ab0e223444b4ba84
BeeWeb suffers from a remote SQL injection vulnerability.
0204704657f2f616f795be6baaa2763dec40d3be555e58780f71238f01e8a07c
Websites designed by Marco Valentino appears susceptible to remote SQL injection vulnerabilities.
cfe8383e708270f8806f14e704993616f1e3ad197fc401073cc7f2bcb946f30c
InternetSol suffers from a remote SQL injection vulnerability.
0aa834e22ed8076a50306ae24d67438b806e1a5a3d44dcbf63652ab6d053e1ed