Debian Linux Security Advisory 2229-1 - A vulnerability has been found in SPIP, a website engine for publishing, which allows a malicious registered author to disconnect the website from its database, resulting in denial of service.
d3a24d613236e39f5e924b3f6b93c43c31b55d9f59763ffd0b14e838bcab0626
Action Message Format (AMF) Shell is testing tool that demonstrates weaknesses in PHPAMF, especially where the default service 'DiscoveryService' has been left behind.
150be94024e1cfc90965e585dc08ff6eebd351f0b15fba769e5a4ba8ba6f0925
pytbull is an intrusion detection/prevention system (IDS/IPS) testing framework for Snort and Suricata. It can be used to test the detection and blocking capabilities of an IDS/IPS, to compare IDS/IPS, to compare configuration modifications and to check/validate configurations.The framework is shipped with about 300 tests grouped into 8 testing modules.
20923dab52e58d5fe397efcf7bc08c14e87a3541bdc2c6687fe4477b9b0b1fd9
Hi5.com suffers from cross site request forgery, cross site scripting, url redirection, and lack of encryption vulnerabilities.
5341cd0b5d885d93d4a845b388d571fffd33d4f574f0983f3df591be3e2c4bb7
Mandriva Linux Security Advisory 2011-080 - Security researcher Soroush Dalili reported that the resource: protocol could be exploited to allow directory traversal on Windows and the potential loading of resources from non-permitted locations. The impact would depend on whether interesting files existed in predictable locations in a useful format. For example, the existence or non-existence of particular images might indicate whether certain software was installed. Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code.
139b2895ed6cec38a7cbd37a984d8efc5c45dd3312146e5b19d564d7762e49c2
ArpON (Arp handler inspectiON) is a portable ARP handler. It detects and blocks all ARP poisoning/spoofing attacks with the Static Arp Inspection (SARPI) and Dynamic Arp Inspection (DARPI) approaches on switched/hubbed LAN with/without DHCP protocol.
5994c377948a94a2bf500f3562306b9c1ac9f612d5279e8959d8919d7abe78ab
LANSA aXes Web Terminal (TN5250) suffers from a cross site scripting vulnerability.
a015d5357f35b389714d88ff7ffc8b31be4d05cf80d5372754c4d9f4734d92af
Travel411 suffers from a remote SQL injection vulnerability.
6999cf0f1608a5c7ce9d000ebc6e516ff333354c2c33f42bbb0580fbe60051b0
Plinka Design suffers from a file disclosure / local file inclusion vulnerability.
6efb45180dd39cfb8f7374e64d82c4a62318fab4e3e62fb2f1a27073eec89ecc
PresseTool suffers from a remote /etc/passwd file disclosure vulnerability.
542a9ff9cd2f460897a859eb02232dafb6fb4f267d8bcecdf0eedaa8edc3e22a
Phire CMS versions 1.1 and below suffer from remote file disclosure vulnerabilities.
83478b037c17f94c227a1bdaec00baf8e764b217bdac364922bee5da21c7c9dd
Synapse Web Solution suffers from a remote SQL injection vulnerability.
d6088a2df891f679d8f650ae0274ead6e44f1ed8020237dd23e0ec90e6d35f79
Exponent CMS version 2.0 Beta 1.1 cross site request forgery add administrator proof of concept exploit.
b4337c4ca61c7af6920aa89aee4deea2b16352b7c2f9c7edd5bfe6bfa4793509
Asterisk version 1.8.x suffers from a SIP remote user enumeration vulnerability.
5bf98cf221d04c51ddb7d1a9e47f9bbb189d3640a8237aa5efd26b53988ad25c
InterPhoto Gallery version 2.5.0 suffers from the same file disclosure vulnerabilities that prior versions already had disclosed.
79b3305ea68c41ea15a8dcece6b5c2e8be4296599e246272fd6b8a8046c76f53
Parnian Opendata CMS suffers from a remote SQL injection vulnerability.
ef3f669b59bea30af0f56180faa7b4b1d44a09f83ad9af70a7f2984081d192cd
MyBB version 1.6.3 suffers from url redirection and cross site scripting vulnerabilities.
631b0453a961b2f0138e0c7d391d1caec90a38318fde9278d7ed81384acf8eab