Secunia Security Advisory 38814
Secunia Security Advisory - Fedora has issued an update for bournal. This fixes multiple security issues, which can be exploited by malicious, local users to disclose sensitive information and to...
View ArticleSecunia Security Advisory 38863
Secunia Security Advisory - A security issue has been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
View ArticleSecunia Security Advisory 38843
Secunia Security Advisory - Fedora has issued an update for curl. This fixes a security issue, which can potentially be exploited by malicious people to cause a DoS (Denial of Service) or compromise an...
View ArticleDebian Linux Security Advisory 2009-1
Debian Linux Security Advisory 2009-1 - It was discovered that tdiary, a communication-friendly weblog system, is prone to a cross-site scripting vulnerability due to insufficient input sanitizing in...
View ArticleHydra CMS SQL Injection / Cross Site Scripting
Hydra CMS suffers from cross site scripting and remote SQL injection vulnerabilities.
View ArticleFriendly-Tech FriendlyTR69 2.8.9 SQL Injection
Friendly-Tech FriendlyTR69 CPE remote management version 2.8.9 suffers from a remote SQL injection vulnerability.
View ArticleiDEFENSE Security Advisory 2010-03-09.1
iDefense Security Advisory 03.09.10 - Remote exploitation of a type confusion vulnerability in Microsoft Corp.'s Excel could allow an attacker to execute arbitrary code with the privileges of the...
View Article60cycleCMS Cross Site Scripting
60cycleCMS suffers from a cross site scripting vulnerability.
View ArticleiDEFENSE Security Advisory 2010-03-09.2
iDefense Security Advisory 03.09.10 - Remote exploitation of an uninitialized memory vulnerability in Microsoft Corp.'s Excel could allow an attacker to execute arbitrary code with the privileges of...
View ArticleiDEFENSE Security Advisory 2010-03-09.3
iDefense Security Advisory 03.09.10 - Remote exploitation of a heap overflow vulnerability in Microsoft Corp.'s Excel could allow an attacker to execute arbitrary code with the privileges of the...
View ArticleiDEFENSE Security Advisory 2010-03-09.4
iDefense Security Advisory 03.09.10 - Remote exploitation of a heap overflow vulnerability in Microsoft Corp.'s Excel could allow an attacker to execute arbitrary code with the privileges of the...
View ArticleCampsite 3.3.5 Cross Site Request Forgery
Campsite version 3.3.5 suffers from a cross site request forgery vulnerability.
View ArticleSoftbiz Jobs And Recruitment SQL Injection
Softbiz Jobs and Recruitment script suffers from a remote SQL injection vulnerability.
View ArticleEmployee Timeclock Software Backup Information Disclosure
Secunia Research has discovered security issue in Employee Timeclock Software, which can be exploited by malicious people to disclose sensitive information. The database backup functionality stores the...
View ArticleispCP Omega 1.0.4 Remote File Inclusion
ispCP Omega versions 1.0.4 and below suffer from a remote file inclusion vulnerability.
View ArticleTar / Cpio Heap Buffer Overflow
GNU Tar and GNU Cpio suffer from a heap-based buffer overflow vulnerability. Tar versions prior to 1.23 and Cpio versions prior to 2.11 are affected.
View ArticleFirst Remote Code Execution Vulnerablity Affecting Microsoft Notepad
The MS HTML Help control activex is prone to a remote CHM help file hijack vulnerability when applications invoke help. Multiple built-in applications are vulnerable to this. The impact of the...
View ArticleEmployee Timeclock Software SQL Injection
Secunia Research has discovered some vulnerabilities in Employee Timeclock Software, which can be exploited by malicious people to conduct SQL injection attacks. Input passed to the "username" and...
View ArticleEmployee Timeclock Software mysqldump Password Disclosure
Secunia Research has discovered security issue in Employee Timeclock Software, which can be exploited by malicious, local users to disclose sensitive information. The security issue is caused due to...
View ArticleAnantasoft Gazelle CMS Cross Site Request Forgery
Anantasoft Gazelle CMS suffers from a cross site request forgery vulnerability.
View ArticleFirewall Builder With GUI 4.0.0
Firewall Builder consists of a GUI and set of policy compilers for various firewall platforms. It helps users maintain a database of objects and allows policy editing using simple drag-and-drop...
View ArticleGNU Privacy Guard 2.0.15
GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management...
View ArticleBotan C++ Crypto Algorithms Library 1.9.4
Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate...
View ArticleSamhain File Integrity Checker 2.6.3
Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server....
View Article
More Pages to Explore .....