ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.
63cd333011cdd550c0a27631a8353e140b57da531c51c13539a22cf06043130b
Guru JustAnswer Professional version 1.25 suffers from multiple remote SQL injection vulnerabilities.
b411599b06af14d877cb69d0191dcba323cdc4737823fe7f423d38036f3c283e
iPhone4 FTP Server 1.0 empty CWD-RETR remote crash denial of service exploit.
475b9126b494053efc37cc13c7a6fa63dedf0a3b5b6cfad131b1b11adc82d7a6
Whitepaper called Reverse Engineering and Memory Patching.
bf5743c2cb8982634575f5c681bc4227d41f8d102007140878aee70541416b69
This Metasploit module can be used to gain a remote shell to a Joomla! 1.6.x install when administrator credentials are known. This is achieved by uploading a malicious component which is used to execute the selected payload.
612d16778b5cce15c16e50253fe4bc1f0dbda9b28aac75b76518ca8050eb526c
A vulnerability was discovered by Aung Khant that allows for exploitable SQL Injection attacks against a Joomla 1.6.0 install. This exploit attempts to leverage the SQL Injection to extract admin credentials, and then store those credentials within the notes_db. The vulnerability is due to a validation issue in /components/com_content/models/category.php that erroneously uses the "string" type whenever filtering the user supplied input. This issue was fixed by performing a whitelist check of the user supplied order data against the allowed order types, and also escaping the input.
647e5aeb46772c7d0cdb8e0649db65e77ffaa67a35949d881a8ff0eac18b6c6d
Kentico CMS versions 5.5R22.23 suffers from a cross site scripting vulnerability.
9f11fec3060e9fb15201282364d5cc0bf0d5d681f43c5b204bee3e6115fd40af
This Metasploit module exploits a vulnerability in the TinyMCE/tinybrowser plugin. By renaming the uploaded file this vulnerability can be used to upload/execute code on the affected system.
f8db17b294efb81fd18b606bdb54bbae4c0ec34e8fe95b0d4a1492781eed0504
GloDerWorks suffers from a remote SQL injection vulnerability.
bd2dd524079f96906063e53d73019cf13f518a5826cfc773ec864ba4cbc7184a
Allied Telesis accidentally divulged secret backdoors in all of their products.
f9dbb783644f15b90e043e5f58f5f8cf1bdf6408610a4487ad0dff928b2a7731
Belkin G Wireless Router with firmware version 5.00.12 suffers from a password hash disclosure vulnerability.
1ff16d35f0826f93976163d23810916b6c842c832770207c9409be7c72c79f0d
This is an HTTP console to remote administer Windows hosts with a browser-based, AJAX-enabled, command-line interface. Server requires .NET 3.5. Written in C# and JavaScript.
7dec994beced4f331b24fde32be7a2e3088ff3ecf40ecae45cd2ec54a69a686b
This Metasploit module exploits multiple vulnerabilities found on IGSS 9's Data Server and Data Collector services. The initial approach is first by transferring our binary with Write packets (opcode 0x0D) via port 12401 (igssdataserver.exe), and then sending an EXE packet (opcode 0x0A) to port 12397 (dc.exe), which will cause dc.exe to run that payload with a CreateProcessA() function as a new thread.
296723ada905112b4245260cd9a74751a41e72054aba11b2d7103f9bf26ee23d
Websolutions suffers from a remote SQL injection vulnerability.
30a65cedb585c3de4627c61682d858af6792fec5474e7dc37acbfadb130be426
Secunia Security Advisory - Two vulnerabilities have been reported in Guru JustAnswer Professional, which can be exploited by malicious people to conduct SQL injection attacks.
d828d86ef972974d7abdbe7ddecc1a58bdae85072798318ed96e5bd419eb36e4
Secunia Security Advisory - Debian has issued an update for unbound. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
2bb9ee2048c02ccc58ec6ee5a81fafa0f9e8f0f1e630bfe70a6adc2ead456477
Secunia Security Advisory - A vulnerability has been reported in the sh404SEF component for Joomla!, which can be exploited by malicious people to conduct cross-site scripting attacks.
ca6f88f0508140eee8d901b179d5ec49b81100314c14e2e948a32e334bd0fdf9
Secunia Security Advisory - Ubuntu has issued an update for pam. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information and perform certain actions with escalated privileges.
07afe114b2c3d6423f6e8bb42e271a6adf3522351ff6bf1fe3a005374f66bea0
Secunia Security Advisory - Ubuntu has issued an update for bind9. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
2efe0275cac53e900eb758949faa5ce420159c70b52de00c145fbdedbe4aacf9
Secunia Security Advisory - A vulnerability has been discovered in the Ajax File Manager plugin for TinyMCE, which can be exploited by malicious people to compromise a vulnerable system.
18e606eb728385ca6d67f176386ee4a11307545729b24326f2b64abbf741654e
Secunia Security Advisory - Ubuntu has issued an update for bind9. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
5bf1bca874f9650ab9bc97e8962ebf4ae7896f9d3b39110b675f6bb58eed7ef1
Secunia Security Advisory - A vulnerability has been reported in IBM Tivoli Management Framework, which can be exploited by malicious users to compromise a vulnerable system.
7a32fd23458e18efd486d740315bb11078bd9e40e41fa2510c19926b85d1869e
Secunia Security Advisory - A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
80b78981c06ab8ba78eae3eccf56cd0d78a072d0beaf719068549bc8de2181b3
Secunia Security Advisory - A vulnerability has been discovered in Puzzle Apps CMS, which can be exploited by malicious people to compromise a vulnerable system.
97cb620e605db565d5626e36385d2b51cc3aac4b5cb3cb6ba0040f61473ef6de
Secunia Security Advisory - Slackware has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
df839adfacf47637123469c2582a70f02d3facf077294542649534dff56e647f