PLANET VDR-300NU ADSL Router Unauthenticated Remote DNS Changer
PLANET VDR-300NU ADSL Router unauthenticated remote DNS changer exploit.
View ArticleTenda ADSL2/2+ Modem 963281TAN Unauthenticated Remote DNS Changer
Tenda ADSL2/2+ modem version 963281TAN unauthenticated remote DNS changer exploit.
View ArticleCOMTREND ADSL Router CT-5367 C01_R12 Unauthenticated Remote DNS Changer
COMTREND ADSL router CT-5367 C01_R12 unauthenticated remote DNS changer exploit.
View ArticleCOMTREND ADSL Router CT-5624 C01_R03 Unauthenticated Remote DNS Changer
COMTREND ADSL router CT-5624 C01_R03 unauthenticated remote DNS changer exploit.
View ArticleCodeWarrior 0.3
CodeWarrior is a manual code and static analysis tool. It has many modules, one for each common language like PHP, ASP, Ruby, C/C++, Java and Javascript. Each module has rules in raw text with...
View ArticleWindows x86 Password Protected TCP Bind Shell
637 bytes small Microsoft Windows x86 password protect TCP bind shell shellcode.
View ArticleCherry Music 0.35.1 Arbitrary File Disclosure
Cherry Music version 0.35.1 suffers from an arbitrary file disclosure vulnerability.
View ArticlewdCalendar 2 SQL Injection
wdCalendar version 2 suffers from a remote SQL injection vulnerability.
View ArticleRed Hat Security Advisory 2016-1858-01
Red Hat Security Advisory 2016-1858-01 - Ruby on Rails is a model-view-controller framework for web application development. Action Pack implements the controller and the view components. Security Fix:...
View ArticleRed Hat Security Advisory 2016-1857-01
Red Hat Security Advisory 2016-1857-01 - Ruby on Rails is a model-view-controller framework for web application development. Action Pack implements the controller and the view components. Security Fix:...
View ArticleRed Hat Security Advisory 2016-1855-01
Red Hat Security Advisory 2016-1855-01 - Ruby on Rails is a model-view-controller framework for web application development. Action View implements the view component, and Active Record implements the...
View ArticleRed Hat Security Advisory 2016-1856-01
Red Hat Security Advisory 2016-1856-01 - Ruby on Rails is a model-view-controller framework for web application development. Action View implements the view component. Security Fix: It was discovered...
View ArticleAntisip libosip2 4.1.0 Heap Buffer Overflow / Denial Of Service
Antisip libosip2 version 4.1.0 suffers from heap buffer overflow vulnerabilities that can lead to a denial of service.
View ArticleASUS DSL-X11 ADSL Router Unauthenticated Remote DNS Changer
ASUS DSL-X11 ADSL router unauthenticated remote DNS changer exploit.
View ArticleOpen-Xchange App Suite 7.8.2 Cross Site Scripting
Open-Xchange App Suite versions 7.8.2 and below suffer from multiple cross site scripting vulnerabilities.
View ArticleOpen-Xchange Guard 2.4.2 Cross Site Scripting
Open-Xchange Guard versions 2.4.2 and below suffer from multiple cross site scripting vulnerabilities.
View ArticleBattle.Net 1.5.0.7963 Privilege Escalation
Battle.Net version 1.5.0.7963 suffers from an insecure file permissions privilege escalation vulnerability.
View ArticleAndroid getpidcon Binder Service Replacement
Android has an issue where racy getpidcon usage permits binder service replacement.
View ArticleUbuntu Security Notice USN-3078-1
Ubuntu Security Notice 3078-1 - Dawid Golunski discovered that MySQL incorrectly handled configuration files. A remote attacker could possibly use this issue to execute arbitrary code with root...
View ArticleHP Security Bulletin HPSBGN03572 1
HP Security Bulletin HPSBGN03572 1 - A potential vulnerability has been identified in HPE Performance Center. The vulnerability could cause remote user validation failure. Revision 1 of this advisory.
View ArticleHP Security Bulletin HPSBST03640 1
HP Security Bulletin HPSBST03640 1 - A potential security vulnerability has been identified in HP XP7 Command View Advance Edition Suite (CVAE) using Replication Manager (RepMgr) and Device Manager...
View ArticleApache Shiro Filter Bypass
Apache Shiro versions prior to 1.3.2, when using a non-root servlet context path, allowed specifically crafted requests can be used to bypass some security servlet filters, resulting in unauthorized...
View ArticleMicrosoft Security Bulletin Summary For September, 2016
This bulletin summary lists fourteen released Microsoft security bulletins for September, 2016.
View ArticleEMC ViPR SRM XSS / CSRF / File Upload / Brute Force
EMC ViPR SRM versions prior to 3.7.2 suffer from cross site request forgery, cross site scripting, brute force, and remote file upload vulnerabilities.
View ArticleEMC Documentum D2 Authentication Bypass
EMC Documentum D2 contains fix for authentication bypass that could potentially be exploited by malicious users to compromise the affected system. By exploiting this vulnerability, remote...
View Article
More Pages to Explore .....