WordPress XCloner plugin version 3.1.0 suffers from a cross site request forgery vulnerability.
1b43ccd566ecc819a8631b2364333ccdce7ad4630d5ae45dac153d6588b86a9d
Capstone is a multi-architecture, multi-platform disassembly framework. It has a simple and lightweight architecture-neutral API, thread-safe by design, provides details on disassembled instruction, and more.
49e41d662c5ed4dcd391ec4cfce75fb31ca4bfd245eba9e8f0cb69d6f6e8d7cc
MobileIron VSP versions prior to 5.9.1 and Sentry versions prior to 5.0 suffer from password obfuscation and XPath injection vulnerabilities.
d6a5bba8acefd20a11c0a78f4ae846a3e103e0ec9d568120f814bbe1909a34e1
Red Hat Security Advisory 2014-0355-01 - YAML is a data serialization format designed for human readability and interaction with scripting languages. LibYAML is a YAML parser and emitter written in C. A buffer overflow flaw was found in the way the libyaml library parsed URLs in YAML documents. An attacker able to load specially crafted YAML input to an application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. An integer overflow flaw was found in the way the libyaml library handled excessively long YAML tags. An attacker able to load specially crafted YAML input to application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.
985b797772febf39f2a055c7e5717023fa52100140512e16f14531afd2fc7ee4
Drupal Custom Search module version 7.x-1.13 suffers from a cross site scripting vulnerability.
7bdbca78f76cdfb570405b85d714e31737dedaf8f1ea9202a2b52e26625e517d
Rhythm Software File Manager version 1.16.6 and Rhythm Software File Manager HD version 1.11.5 suffer from local file disclosure, privilege escalation, and unauthenticated remote command injection vulnerabilities.
d2c9981bbbf77d707cbae26f950c18a38e350aeb4c84dd1f06e79d90a6679677
Ubuntu Security Notice 2159-1 - It was discovered that NSS incorrectly handled wildcard certificates when used with internationalized domain names. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could be exploited to spoof SSL servers.
59eeaf80e77b5d2da5ea6c9291d43a73f0a90cc51e60b05e5644d1d1cffe0f68
Red Hat Security Advisory 2014-0354-01 - YAML is a data serialization format designed for human readability and interaction with scripting languages. LibYAML is a YAML parser and emitter written in C. A buffer overflow flaw was found in the way the libyaml library parsed URLs in YAML documents. An attacker able to load specially crafted YAML input to an application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. An integer overflow flaw was found in the way the libyaml library handled excessively long YAML tags. An attacker able to load specially crafted YAML input to application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.
18cf675c1a778b82aff5215d8b922b230d0b956a2687269b1543c56ab9231935
Red Hat Security Advisory 2014-0353-01 - YAML is a data serialization format designed for human readability and interaction with scripting languages. LibYAML is a YAML parser and emitter written in C. A buffer overflow flaw was found in the way the libyaml library parsed URLs in YAML documents. An attacker able to load specially crafted YAML input to an application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. An integer overflow flaw was found in the way the libyaml library handled excessively long YAML tags. An attacker able to load specially crafted YAML input to application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.
42f2a4af7313023b4447c83284b6e0c5a3c351bca32adbb02d8acaaceed775bb
iShare Your Moving Library version 1.0 for iOS suffers from local file inclusion and remote file upload vulnerabilities.
d94407d4716a8dc010686a1ab391632cc35f1eaede798f733ee34e8638a1ee8f
Apple Security Advisory 2014-04-01-1 - Safari 6.1.3 and Safari 7.0.3 are now available and address multiple security vulnerabilities.
4cef548e7aad6ec6c0abcca4dcf5b8211f19aa0d0c88b3b825047c58177dc019
A10 Networks ACOS version 2.7.0-P2 suffers from a buffer overflow vulnerability.
fad867b999aa71b64950f57ef04bdfacb548b571cf4a00d26e8903e0a2f29fa5
The Kyocera FS5250 printer suffers from a cross site scripting vulnerability.
e975fa501f2382287ddafe16e11342fa8788d46be35d2169b1af61ad71e056ae
ICOMM 610 wireless modem suffers from a cross site request forgery vulnerability.
21f6e63b81cb81511aa9c5520164732e3b61380d8954cd91b6668d2b521cf7ba