FS Groupon Clone version 1.0 suffers from a remote SQL injection vulnerability.
8ae174c2beba7417596d3087696fd2049ac099b904c6a29d144c8bbc2be6251c
Ubuntu Security Notice 1415-1 - Louis Rilling discovered a flaw in Linux kernel's clone command when CLONE_IO is specified. An unprivileged local user could exploit this to cause a denial of service.
9c5f57f6ff7ad9d92c173fbfd5f31141814feeec7cf184fbc5b1cfd09f31cbb4
Ubuntu Security Notice 1408-1 - Louis Rilling discovered a flaw in Linux kernel's clone command when CLONE_IO is specified. An unprivileged local user could exploit this to cause a denial of service.
f44af68c03e98ca483c515a0bbab711fa9a2025178c892ca14ec065c994a34ea
Ubuntu Security Notice 1411-1 - Louis Rilling discovered a flaw in Linux kernel's clone command when CLONE_IO is specified. An unprivileged local user could exploit this to cause a denial of service.
edb7173e9e15dc4a929335fa7af7b721f233a71ba887437bfc12602b8699aeeb
Ubuntu Security Notice 1410-1 - Louis Rilling discovered a flaw in Linux kernel's clone command when CLONE_IO is specified. An unprivileged local user could exploit this to cause a denial of service.
f15bf1820fb38e31c5db918dc42e51397cfb0163f7756c6239cbfa4f865f02d6
Secunia Security Advisory - A vulnerability has been reported in GraphicsClone Script, which can be exploited by malicious people to conduct cross-site scripting attacks.
f043334f6681398c14d5e5dc2f3250adf42385b10db17543c57c70f78b46fee8
GraphicClone suffers from a cross site scripting vulnerability.
7e386b1f62fdf95ab4f2156dbfe331cae9df9200886e6339cdf26aab4295c59f
Secunia Security Advisory - Multiple vulnerabilities have been reported in Social Book Facebook clone 2010, which can be exploited by malicious people to conduct cross-site scripting attacks.
fe18893f97c1e730f0706e1c40988dd1f457858d4ccd20e2eb93ec49fa98f030
Social Book Facebook Clone Script suffers from a cross site scripting vulnerability.
ea240a98db0c1a0fadf3d64b54b39e49a30d2cbc394db025127e7210f8992406
Debian Linux Security Advisory 2321-1 - A cross-site scriping vulnerability was discovered in the rst parser of Moin, a Python clone of WikiWiki.
8c0f1a089dabbb44312a9f61dfd8a3a6c5421bd634428c589dcce8b37b4b49b9
Scriptlance Clone suffers from a remote SQL injection vulnerability.
bce776b1301ee781886a458316993d3c85d27021438894522ccc4dd65ec21d98
Zero Day Initiative Advisory 11-182 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Oracle Sun Java Runtime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the JP2IEXP.dll browser plugin. The module creates a window hook when an applet is instantiated within the context of a browser. If the underlying DOM element is cloned and the parent object removed, a dangling reference can exist. When the module attempts to walk the relationship list to call the window hook, the process can be made to jump into uninitialized heap memory. This can be exploited by an attacker to execute code under the context of the user running the browser.
85736bd649bf4812a9393b9c6ab6c4eabca3f9fe0c7db63a9b00d0baddbd29e2
Secunia Security Advisory - Two vulnerabilities have been discovered in the XCloner plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.
3df03b7faba99bc936cabbcc22a32dff4d9a9e4ba1ca756b2d1e38117f3a79b9
Secunia Security Advisory - A vulnerability has been discovered in the XCloner plugin for WordPress, which can be exploited by malicious people to disclose sensitive information.
52a15e9e85753e8af00b1ec21835cdf180a76fd7ab64bcc1b21a9a4fe648b324
Secunia Security Advisory - Multiple vulnerabilities have been discovered in the XCloner plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information.
134f0738d150a8783b73db820153277cae4983e38efabd831e70713466178fee
Secunia Security Advisory - Two vulnerabilities have been reported in the XCloner component for Joomla!, which can be exploited by malicious people to conduct cross-site scripting attacks.
a12697ef231527021dc14eb3c21a9092d1d0725364edfc7c6d42f4f1cb37776e
Secunia Security Advisory - A vulnerability has been discovered in the XCloner component for Joomla!, which can be exploited by malicious people to disclose sensitive information.
77189cecdb7629ffe294bcf7e5774692214ab634a76d57d00a77326529a6ce4e
Joomla XCloner component remote command execution exploit. This component also suffers from information disclosure, local file inclusion, denial of service, and cross site scripting vulnerabilities.
bd1d11cc383f303dac4cb1520a59452b77f741b76b084b5ea0df94bb38723392
This paper describes the basic process of using the proxmark3 to clone Proxcards and then introduces ProxBrute, a new tool for brute forcing valid proxcard values.
2d0fd9f79fb7dbb051b1d0d095dea1dd28993622fb07d852518c7f7100181d3b
Ubuntu Security Notice 1041-1 - Dan Rosenberg discovered that the btrfs filesystem did not correctly validate permissions when using the clone function. Dave Chinner discovered that the XFS filesystem did not correctly order inode lookups when exported by NFS. Kees Cook discovered that the Intel i915 graphics driver did not correctly validate memory regions. Various other issues have also been addressed.
ea26db62a4d97743642eaeed97eb665811c26eb91fe42e08a560cf013565d264
Alibaba Clone B2B version 3.4 suffers from a remote SQL injection vulnerability.
f220fd94d51c44ed3e56ad54f8c3725c55cd1ab55d77e10af4316f4e30135224
Debian Linux Security Advisory 2114-1 - The Debian stable point release 5.0.6 included updated packages of the Git revision control system in order to fix a security issue. Unfortunately, the update introduced a regression which could make it impossible to clone or create git repositories. This upgrade fixes this regression, which is tracked as Debian bug #595728.
d5a562c5b0446b7ebdb0c4377c6a37f6a81cb3a7335ed9b473a406bf9aad3c2f
Ubuntu Security Notice 966-1 - Junjiro R. Okajima discovered that knfsd did not correctly handle strict overcommit. Chris Guo, Jukka Taimisto, and Olli Jarva discovered that SCTP did not correctly handle invalid parameters. A remote attacker could send specially crafted traffic that could crash the system, leading to a denial of service. Mario Mikocevic discovered that GFS2 did not correctly handle certain quota structures. Toshiyuki Okajima discovered that the kernel keyring did not correctly handle dead keyrings. Brad Spengler discovered that Sparc did not correctly implement non-executable stacks. This made userspace applications vulnerable to exploits that would have been otherwise blocked due to non-executable memory protections. Dan Rosenberg discovered that the btrfs clone function did not correctly validate permissions. Dan Rosenberg discovered that GFS2 set_flags function did not correctly validate permissions. Shi Weihua discovered that btrfs xattr_set_acl function did not correctly validate permissions. Andre Osterhues discovered that eCryptfs did not correctly calculate hash values.
e14c23e730862eaa5b43bdf36f4764a5c6a580726d1a6ec790a50f45076c08b7
Debian Linux Security Advisory 2083-1 - It was discovered that moin, a python clone of WikiWiki, does not sufficiently sanitize parameters when passing them to the add_msg function. This allows a remote attackers to conduct cross-site scripting (XSS) attacks for example via the template parameter.
395457bc601af50ef38ae224c858e76317ecb2a7e7548e8412a6fb7969093f8c
Secunia Security Advisory - Two vulnerabilities have been reported in Pre SoftClones Marketing Management System, which can be exploited by malicious people to conduct SQL injection attacks.
504d6eca5491bb0453bc07e7e10c3195eb2b3d0d7b7c97ff94ae7aa67e5fc039
SoftClones Marketing Management System suffers from a remote SQL injection vulnerability that allows for authentication bypass.
5e9b43b5f3b06b5391f598908fe6c8effa8f6ac51bbb071efec0e2288b86ffd2