Layton Helpbox version 4.4.0 suffers from login bypass vulnerabilities due to improper cookie design.
16ee66d4cbd6d224b10fa5f95bc298defb75ded84f60334c0975efd6f7d244e2
Layton Helpbox version 4.4.0 suffers from embedded cross site scripting vulnerabilities.
84e000e3e44575e7d56f64a765baeb3ba0680194d10cef458af3c321b7470c55
Layton Helpbox version 4.4.0 discloses login and password information for the database in an error page.
ffb1e252d827f52f414c14552b658fe20322ca6da03f2bccb5d2f3d6fa1aa597
Layton Helpbox version 4.4.0 fails to use encrypted transport for logging users into the system.
65c129f2aa3caef6fbe2d3cbf9480e7a26059454a9f06e7eb3c1a9a695199165
Layton Helpbox version 4.4.0 suffers from an authorization bypass vulnerability.
8d734fa89fe9433ad116e55adc6c356d0f247f3c345dfda0b0958a1e8896b8d4
Layton Helpbox version 4.4.0 suffers from multiple remote SQL injection vulnerabilities.
6c5cc1580cd23e491855f8f601ab13345165ca92e85aa068fc7ba33c894be7fc
Inventory version 1.0 suffers from multiple cross site scripting vulnerabilities.
1292d00cbc8131c9d80118a786712087616de0bf11a88f616f6a7005190143b5
Inventory version 1.0 suffers from multiple remote SQL injection vulnerabilities.
befb2b4b941cc0e1fb457e807d5670f439ed489fe807f04ff00438accba64dee
The Aladdin Knowledge System Ltd. PrivAgent active-x control version 2.0 suffers from buffer overflow and insecure file download vulnerabilities. Buffer overflow proof of concept included.
9a55abf480664665e35217155ae1a22dc463dfe106da40a050d4ea0d36c8c45e
Debian Linux Security Advisory 2566-1 - It was discovered that Exim, a mail transport agent, is not properly handling the decoding of DNS records for DKIM. Specifically, crafted records can yield to a heap-based buffer overflow. An attacker can exploit this flaw to execute arbitrary code.
db45c689499a88f8489df5e20ca7f2308465812b000bd38146acd009a2dd42a1
Ubuntu Security Notice 1618-1 - It was discovered that Exim incorrectly handled DKIM DNS decoding. This flaw could allow a remote attacker to execute arbitrary code.
1aa6092f2eedee2d304f571946cd33139c425f5a72ba8acf5eae714670a9a625
HP Security Bulletin HPSBHF02819 SSRT100920 2 - Potential security vulnerabilities have been identified with HP, 3COM, and H3C routers and switches. The vulnerabilities could be remotely exploited resulting in disclosure of information. Revision 2 of this advisory.
2f87c33b828e020cdb66b95f0a1edc648b9834e9463fc9faa3800051d0ebb479
Whitepaper called Using Ontologies in a Cognitive-Grounded System: Automatic Action Recognition in Video Surveillance. In particular, the authors focus on the task of classifying the actions occurring in a scene. For this purpose, they developed a semantic infrastructure on top of a hybrid computational ontology of actions. The article outlines the core features of this infrastructure, illustrating how the processing mechanisms of the cognitive system benefit from knowledge capabilities in fulfilling the recognition goal. Ultimately, the paper shows that ontologies can enhance a cognitive architecture's functionalities, allowing for high-level performance in complex task execution.
8273bb7e6d839232b44394526d94de608e4657ad44cdc7fc48a392cd1145f2c8
VicBlog suffers from path disclosure and remote SQL injection vulnerabilities.
067f350bd0ef6ecc3e6552ba562514f7c815b69e8cec2871fbedccc998dd9782
Secunia Security Advisory - Multiple vulnerabilities have been reported in RT (Request Tracker), which can be exploited by malicious users to conduct spoofing attacks, bypass certain security restrictions, and compromise a vulnerable system and by malicious people to conduct cross-site request forgery attacks.
a9f06ccd5aea0f426f7cb12153f508a48448f0da569e765493850ba101a89589
Secunia Security Advisory - A vulnerability has been reported in Tiki Wiki CMS/Groupware, which can be exploited by malicious people to compromise a vulnerable system.
7c964638da5724eca3075f66ed85d4d2652e36e4ca63e53d3a629dd606ba421b
Secunia Security Advisory - A vulnerability with an unknown impact has been reported in IP.Board.
edd99b7b12ff5a64ebf8529969608aedf1cd0390b3c5447559ce8f014112f0bc
Secunia Security Advisory - A vulnerability has been reported in the Freestyle Testimonials component for Joomla!, which can be exploited by malicious people to conduct SQL injection attacks.
ed966d17b4076a47715570c7fb46805172f51ef83ca9db49a94c5bb9fbc5b748
Secunia Security Advisory - A vulnerability has been reported in the MailChimp module for Drupal, which can be exploited by malicious people to conduct script insertion attacks.
f7d638b68d48983b68bdae6f70d5b92b0281d962c23c667dcf2afaf608a61655
Secunia Security Advisory - A vulnerability has been reported in Exim, which can be exploited by malicious people to compromise a vulnerable system.
87e77cb2bf239740588dd767f70ccc60934e0cf1d53394bf1386666496682881
Secunia Security Advisory - A vulnerability has been reported in Xen, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service).
046feecf04db454951b9c9f8f9ae805df204b678507e1552143272013e20b1db
PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
1b8532b1641a75f3ddc49d35229e667dedaa244c10f4f04c1fb64661e85efb66
Ubuntu Security Notice 1617-1 - A large number of security issues were discovered in the WebKit browser and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.
9535b72b28c87a09126bf9f6a5e5371f2b85f0c2a84f7ff222d496b9694461e5
Bitweaver version 2.8.1 suffers from local file inclusion and multiple cross site scripting vulnerabilities.
47ea855b5b88d6c3266a6179cebd05aafa03ffcf5121153a984f4e7fad08a2bc
OATH Toolkit attempts to collect several tools that are useful when deploying technologies related to OATH, such as HOTP one-time passwords. It is a fork of the earlier HOTP Toolkit.
d267055979a3d41e36fb36f193aa9e43832d64e1555b4d2efc6d28083ac40988