mRemote version 1.50 suffers from an update spoofing vulnerability.
c1de31f6f8728351a15b518d67f8c93d6869670704738ea370459b1e5c0cd954
Royal TS version 2.1.5 suffers from an update spoofing vulnerability.
bbdbe2cbd87607168248afc01ef7c42de353e86ceb6dd83377794643f9bbeb09
Daddy's File Hosting version 2 suffers from a cross site scripting vulnerability.
db44085cab878901dee0a65baa633d3bb9ce62a9c90a07fec1c599811840deac
This archive includes a presentation and code samples. The presentation is called Parsing Binary File Formats with PowerShell.
2ee444a0cd762da3305af205e37bf1cd02f62382b8e740e9691fa5f622881576
This Metasploit module exploits unauthenticated versions of the "STUNSHELL" web shell. This Metasploit module works when safe mode is enabled on the web server. This shell is widely used in automated RFI payloads.
06341fc12ebcf2e13776c2ddafaa57edbd47f88dc20ac17daa4c87e2d4466e2b
This Metasploit module exploits unauthenticated versions of the "STUNSHELL" web shell. This Metasploit module works when safe mode is disabled on the web server. This shell is widely used in automated RFI payloads.
079ce9781a20fac112fd7690e6c284a6257f4927ebf9c7ae45b6ac4eb0b72f57
WordPress podPress third party plugin version 8.8.10.13 suffers from a cross site scripting vulnerability via 1pixelout_player.swf.
9620208825215dde109d0dd4c3734e97da23acc4ff0aa1eb1c302f9168f941c7
MailOrderWorks version 5.907 suffers from multiple cross site scripting vulnerabilities.
cca8817cbdf2e9cf7db4aa0eedb86c8dc3199c58d9e85d491fdf62af4152b113
The PayPal GP+ service application for analyzing websites suffered from a persistent cross site scripting vulnerability.
b1818e383a5b5735c8c66c269294c19ba5b51f5ba01f59bd57a6d45a263e3300
The PayPal content manager system for sellers suffered from a persistent cross site scripting vulnerability.
3112ea858a3dd800858266762e9d7c03ed6e45b96447da5ecb1cb268ae33a435
This Metasploit module exploits a stack buffer overflow in ALLMediaServer version 0.94. The vulnerability is caused due to a boundary error within the handling of an HTTP request.
9e10375f11d2160bc7bb76256fee52ef258402ea5c166bf2a4a74b2a8c0132a5
Debian Linux Security Advisory 2655-1 - Several cross-site-scripting and denial of service vulnerabilities were discovered in Ruby on Rails, a Ruby framework for web application development.
4c3d58135661cc0677501ab58b5ab4b645bf6e20f7be676bc756293c4c589cf2
Red Hat Security Advisory 2013-0689-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the libdns library. A remote attacker could use this flaw to send a specially-crafted DNS query to named that, when processed, would cause named to use an excessive amount of memory, or possibly crash. Note: This update disables the syntax checking of NAPTR resource records.
49ec82c31e09a661de8b7df652d8eee53683f7471acff85a36ad89701d30651f
Red Hat Security Advisory 2013-0691-01 - Red Hat Storage is a software only, scale-out storage solution that provides flexible and agile unstructured data storage for the enterprise. A flaw was found in the way the Swift component used Python pickle. This could lead to arbitrary code execution. With this update, the JSON format is used. Multiple insecure temporary file creation flaws were found in Red Hat Storage. A local user on the Red Hat Storage server could use these flaws to cause arbitrary files to be overwritten as the root user via a symbolic link attack.
bcd07c0db9e96622fb592f3bc2cdf309f96bf245b0da02f1ed7333420a00e28f
Red Hat Security Advisory 2013-0690-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. A denial of service flaw was found in the libdns library. A remote attacker could use this flaw to send a specially-crafted DNS query to named that, when processed, would cause named to use an excessive amount of memory, or possibly crash. Note: This update disables the syntax checking of NAPTR resource records.
8e2fbfef90b9c05004aec10b390bae90ea7731c20f0d59269617c5d40e2c0b39
Red Hat Security Advisory 2013-0688-01 - In accordance with the Red Hat Enterprise Linux Errata Support Policy, Advanced Mission Critical for Red Hat Enterprise Linux 5.3 will be retired on March 31, 2014, and support will no longer be provided. Accordingly, Red Hat will no longer provide updated packages, including critical impact security patches or urgent priority bug fixes, for Red Hat Enterprise Linux 5.3 AMC after that date.
5048abcd9eba6af3cebdcdbd769ab648a5ab74783682ae88ca727b8d8e7d01bf
Sites designed by Voila Syria suffer from a cross site scripting vulnerability. Note that this finding houses site-specific data.
f123f9576092f3e027e57b3df0d7fb2d17366e274ccd657041c6ae8747e18719