SAP BusinessObjects Explorer version 14.0.5 is vulnerable to XML External Entity (XXE) attacks. This vulnerability could be triggered by an unauthenticated user, as the login request uses vulnerable XML processing as well.
194d0ab6b1771e690644f55e1384ffcd80f5cdd83e9e34d23361c839f047ad44
neuroML version 1.8.1 suffers from cross site scripting, local file inclusion, XXE injection, and path disclosure vulnerabilities.
b0797e90c57370ea9ac2cbdf0a97866919b2e088293231fcc37ab45c45bb8ebd
Red Hat Security Advisory 2014-1371-01 - Network Security Services is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime provides platform independence for non-GUI operating system facilities. A flaw was found in the way NSS parsed ASN.1 input from certain RSA signatures. A remote attacker could use this flaw to forge RSA certificates by providing a specially crafted signature to an application using NSS.
634b6dfc998db983c7e89be22b46420778f990756889c14c31ae9d0d1d7dfec3
SAP BusinessObjects Explorer version 14.0.5 does not validate the user defined inputs of parameter CMS name, which consists of a host name and port number. This can be used to perform a port scan within the network range where the BusinessObject Explorer server is located. This vulnerability could be triggered as unauthenticated user.
da3b141d39bd4e752dc80ab85d3821ea612ba63b8b712c967c735c9bd4c7e6dc
SAP BusinessObjects Explorer 14.0.5 suffers from a cross site flashing vulnerability. It is possible to directly load and display the com_businessobjects_polestar_bootstrap.swf Flash file and specify a configUrl. This requires the victim to be logged and the attacker needs to know the /webres/ URL, which is known as soon as the attacker is in possession of valid credentials. The configuration file specified in the configURL parameter may reside on a foreign host. The configuration file itself may contain URLs of further Flash files residing on a foreign domain. If successful, the victim loads foreign Flash files, which leads to Cross Site Flashing.
0aef611f8c015cff5ee67abcc68c426c2945005a8e245828e06d099362e16d2f
The O2 Connection Manager's service suffers from an unquoted search path issue impacting the Import WiFi 'TGCM_ImportWiFiSvc' service for Windows. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.
458cb76ca91d0d44238a91041eb864f394ddc934e2e995011da173b076eb06d6
O2 Connection Manager suffers from an elevation of privileges vulnerability which can be used by a simple user that can change the executable files with a binary of choice. The vulnerability exist due to the improper permissions, with the 'F' flag (Full) for 'Everyone' group, making the entire directory 'O2 Connection Manager' and its files and sub-dirs world-writable.
e9c28a735205be29d450539b6146be5242fda2f9bc8152a523e378039ac961fb
WordPress Google Calendar Events plugin version 2.0.1 suffers from a cross site scripting vulnerability.
f8971007569cc898ee0668aafd9036f518dd976b21241106519016bdedb195da
WordPress Contact Form DB plugin version 2.8.13 suffers from a cross site scripting vulnerability.
2809c1394f571c0aec87ead9477ede6000379860bb686cbf325c44742e4fd800
This bulletin summary lists nine released Microsoft security bulletins for October, 2014.
8230af5b89d8d5138616faff3db22ca0dbe2ce343c4ba189567f7bbd9228d3c8
The debugenableplugins request parameter in Twiki versions 4.x, 5.x, and 6.0.0 allows arbitrary Perl code execution.
7e6bafc3f4e27a15de8ac1ae847247abec86cca045f3b86848aeae7d24f79d02
Twiki versions 4.x, 5.x, and 6.0.0 suffer from a file upload bypass vulnerability.
e814ba5eee65de4bc58fee28adad2d2fa3cac065ea836323e7b984104a372fa8