Secunia Security Advisory - A vulnerability has been reported in Webessence CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.
f8001b162f5e48e6da53943437154deed9391e051cc744e3f6171d56fc50e9ca
Avast! version 4.7 aavmker4.sys local privilege escalation vulnerability.
d3bb28a2b24343c621152dc7cfb21ff4932d6710b667865b875da8570485ee90
IDEAL Migration 2009 version 4.5.1 local buffer overflow exploit.
3ad16b9660a81f545aa5212271ce5fafa81cf35afd9115c760c9d37598259ab4
IDEAL Administration 2010 version 10.2 local buffer overflow exploit.
c7613355ca5b9ab05ba984dd8f0f7e2ca0f6b6b8242c04dcf00805175b4c0521
This Metasploit module exploits a stack overflow in WM Downloader version 3.0.0.9. By creating a specially crafted .pls file, an attacker may be able to execute arbitrary code.
9f415cdadbdf13029705c9166217c23da9ee0653c650f508c222a0d96d6b1a24
Advanced Poll Script suffers from cross site scripting and SQL injection vulnerabilities.
808e735e5b531a893c07e8dda2585ff7e7483469190950ea0296d84a52aa2221
Ubuntu Security Notice 931-2 - USN-931-1 fixed vulnerabilities in FFmpeg. The update introduced a regression when trying to play certain multimedia files. This update fixes the problem. We apologize for the inconvenience. Original advisory details: It was discovered that FFmpeg contained multiple security issues when handling certain multimedia files. If a user were tricked into opening a crafted multimedia file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program.
6c53261d194cab50bfc61474fe6ec3e8d7c5c6907c74c96eef1f597545d13d72
OpenCominterne version 1.01 suffers from a local file inclusion vulnerability.
cf34389d0eebc836533cd1493b7245295566e945ace97f1db129c978f1add452
NovaStor NovaNet versions 13.0 and below remote denial of service exploit.
7893cecf9f9f422b6ff29c8febd5bed8f934d4c3890d8a3f1ee2905c61586613
NovaStor NovaNet versions 12.0 and below remote SYSTEM exploit.
7f2cde746640268875a0f07357a067569d4d57330f86a93e904a5e5a2c8d79de
NovaStor NovaNet versions 12.0 and below remote denial of service and arbitrary memory read exploit.
7a1440865c5099e247bc0e1d35592ff82f1c471319927bd92657277009d08e7f
NovaStor NovaNet versions 12.0 and below remote root exploit for Linux.
03f6be2bcf70100b0bd018be0989012a363e1d4a99a23eedab9a572a30d091dd
Opencourrier version 2.3 Beta suffers from local file inclusion and remote file inclusion vulnerabilities.
53fceb38605c3576f78aa7d90a0349d9f3436b1130aaf4d8e9a23aa31d52437b
Uiga Personal Portal suffers from a remote SQL injection vulnerability.
7ebc244174364caccae6dbf79d8d31dd6e29946ffedb3d41fb986eaa886e0d32
WebEssence version 1.0.2 suffers from cross site scripting, shell upload and remote SQL injection vulnerabilities.
f8fabdac53fe57a3fb5d1b9e4e88832d8f3fba0ccfc38d928cc0a50994b61a79
T2'10 Call For Papers - This conference will take place from October 28th through the 29th, 2010 in Helsinki, Finland.
4a92e99cc23d0f5318d86db91beac765cded87a8fb159a740234a07d0e1b06a3
Phpegasus suffers from an arbitrary file upload vulnerability.
fd0dac5eb928f444f3ea9c6a3f567b62ef527eb46838918085b75de37dbbc54a
Clipak suffers from a remote shell upload vulnerability.
a702f035508f97b19d6fe4bd81128351430a162debcf6244548ba69763921bdb
aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).
b136b549b7d2a2751c21793100075ea43b28de9af4c1969508bb95bcc92224ad
Easyzip 2000 version 3.5 stack buffer overflow exploit that creates a malicious .zip file.
f827dd8a007d460a0ad5d41354ebc9e4869fb479b3b111388f31bb20e701c800
AskMe Pro version 2.1 suffers from a remote SQL injection vulnerability.
f04e648edb0e82f5f9847e1fbf857d05593598861684f5e3286026ed250bcc28
Kasseler CMS 2.0.5 suffers from backup disclosure vulnerabilities.
a4d251c29a78c6deab47eecad27d7fcf8301b21e4f5642cc0f24f2b15341b183
WebKit versions 532.5 and below stack exhaustion exploit.
ffadf4abc3f22ec70a5ddbf3c92a3b7c2762f5893d48c0e94830a23640193323
Rumba FTP Client version 4.2 PASV buffer overflow exploit.
ef99f45759b0dbf236f569178c372ca29338d9b16557909fdab8401928066c7b
SmodCMS version 4.07 remote arbitrary file upload exploit.
0114621243a0b38f2f3274944bef3ba3b3063864412cd3731b6b4678dd73d8c6