GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.
c6fbcdcd32b2f38cca3bbfa10759556d66f4795ac6e6e50503f2ee5c08c081b7
The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.
6813d0b16b92618b0fef1b7fe92bb5a791828234de88360d218974919a608688
Nagios Looking Glass versions 1.1.0 beta 2 and below suffer from a local file inclusion vulnerability.
b559942ca1d79679b01289352c21da35b85fe34317420496d47a3ec476513f4a
MobileIron version 4.5.4 suffers from a cross site scripting vulnerability in the device registration functionality.
0086a60987e5725b61729a566ad575d52c9d7f81ffe6150d619bb1da469fb747
ILIAS eLearning CMS versions 4.3.4 and 4.4 suffer from a persistent cross site scripting vulnerability.
59f2e84c3cc83759cdb50071ff2bddc46f93834010bcb679cfd619392d3bbd7d
WatchGuard Firewall XTM version 11.7.4u1 suffers from a remote buffer overflow vulnerability in the handling of the sessionid cookie. This is the perl version of the exploit.
45ceb4ca62ced50ff5102abdde412ea0e3161ebbaec885e97cd203a93e46c185
WatchGuard Firewall XTM version 11.7.4u1 suffers from a remote buffer overflow vulnerability in the handling of the sessionid cookie. This is the Metasploit module version of the exploit.
25e73d8a0ef4e8e0a8edf7728db4ae486de866a485e52d6b0401d2ff36d67792
Struts version 2.3.15.3 suffers from multiple cross site scripting vulnerabilities.
c6554f49acdc80a0d54e90157d4de1ee7f01933f3569c0eb965debf94761230d
Proof of concept exploit that demonstrates remote command execution on Netgear ReadyNAS.
7ae30b42d1addf06dce009c2571e44ead9195cf7589aebbb33dbd101756f76dd
Ops View version pre 4.4.41 suffers from multiple cross site scripting vulnerabilities.
f03cc918c29800f4fb81785310e92c629c35a77aaa048713a3b86f607b6c1b59
Mandriva Linux Security Advisory 2013-262 - In PyCrypto before v2.6.1, the Crypto.Random pseudo-random number generator exhibits a race condition that may cause it to generate the same 'random' output in multiple processes that are forked from each other. Depending on the application, this could reveal sensitive information or cryptographic keys to remote attackers.
5fc98e0d42f5fd76de60ac4145a29bc092240bcb14f6ed7ad75cba5b75bbecb6
Mandriva Linux Security Advisory 2013-261 - Possible memory exhaustion denial of service due to the size of decompressed payloads in dropbear before 2013.59. Inconsistent delays in authorization failures could be used to disclose the existence of valid user accounts in dropbear before 2013.59.
aba56fe4695484e1274e59199138625389fdcdffdb016feda736408ca221f0e3
Mandriva Linux Security Advisory 2013-260 - Multiple vulnerabilities have been discovered and corrected in x11-server. The updated packages have been patched to correct these issues.
50969d2a09bdf2e48ce14b12843f678f7e90396dd3d3c735132e96cfb2be5013
Mandriva Linux Security Advisory 2013-259 - Use-after-free vulnerability in the doImageText function in dix/dixfonts.c in the xorg-server module before 1.14.4 in X.Org X11 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted ImageText request that triggers memory-allocation failure.
d73de32034766dc93737b3ea8cb07c6ae13f7aee39585ad2d16563b6745e2abb
Mandriva Linux Security Advisory 2013-258 - It was discovered that ICU contained a race condition affecting multi-threaded applications. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. It was discovered that ICU incorrectly handled memory operations. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program.
548ed919c730db114b9bd87b6261a35bd35e86d1171dfc5eb7b59850b01cd652
Gentoo Linux Security Advisory 201310-21 - Multiple vulnerabilities have been found in MediaWiki, the worst of which could lead to Denial of Service. Versions less than 1.21.2 are affected.
ac99ffc7a59e19273c6f7c08c59b9e2e2bc135cfd07f27fd127001d0bd0ca8d6
Gentoo Linux Security Advisory 201310-20 - A vulnerability in acpid2 may allow a local attacker to gain escalated privileges. Versions less than 2.0.17 are affected.
aabf1d5fd5c7875c07a261f92c1372e4e767ccd10a4f2bdc817de1fb02971c38
Gentoo Linux Security Advisory 201310-19 - A path vulnerability in X2Go Server may allow remote execution of arbitrary code. Versions less than 4.0.0.2 are affected.
1b4d8c2d5d5e5cc903e0656136ff595271108c26520fa60e84ddf1fb892a61a6
Debian Linux Security Advisory 2786-1 - The Google Chrome Security Team discovered two issues (a race condition and a use-after-free issue) in the International Components for Unicode (ICU) library.
fff614ff927cf78e679c00b762b70597a0e8fafbaa8f65901ab464f3c04fa797
Gentoo Linux Security Advisory 201310-18 - Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to Denial of Service. Versions less than 2.12.23-r1 are affected.
dae2553c4427a86dc8b3c9a695288ffe228b8243b84bee882ce07c7536efbf41
Gentoo Linux Security Advisory 201310-17 - pmake uses temporary files in an insecure manner, allowing for symlink attacks. Versions less than 1.111.3.1 are affected.
720961ebfdd7c172ab996cfa7fe9379f3ed54bc16906d9e466e5d2cf72806d13
Debian Linux Security Advisory 2787-1 - It was discovered that roundcube, a skinnable AJAX based webmail solution for IMAP servers, does not properly sanitize the _session parameter in steps/utils/save_pref.inc during saving preferences. The vulnerability can be exploited to overwrite configuration settings and subsequently allowing random file access, manipulated SQL queries and even code execution.
16835cafc45de428b561f8da656aead6d60655755a053be0641fc356c2a3e1f6
Debian Linux Security Advisory 2785-1 - Several vulnerabilities have been discovered in the chromium web browser.
48628ebb43be4560f718b05e27f8d8a4debb8f5353ec1e118afdb50298d992fd
Gentoo Linux Security Advisory 201310-16 - Two buffer overflow vulnerabilities in TPTEST may allow remote attackers to execute arbitrary code or cause Denial of Service. Versions less than 3.1.7-r2 are affected.
8ea7d93b3f09f11db13f0a5774d837544a744a76e8540d8d14e2145af3fda22c
vBulletin versions 4.1.x and 5.x.x suffer from a remote unauthenticated administrative user injection vulnerability via upgrade.php.
56d71874ee918e0adb9b0501022ef1127c5fdefdaf17dc30ef3b50197d6283f7