Joomla Jomestate 1.0 SQL Injection
Joomla Jomestate component version 1.0 suffers from a remote SQL injection vulnerability.
View ArticleWordPress Gallery Master 1.0.22 Cross Site Scripting
WordPress Gallery Master plugin version 1.0.22 suffers from a persistent cross site scripting vulnerability.
View ArticleMusic Cloud 1.3 Cross Site Scripting
Music Cloud version 1.3 suffers from a cross site scripting vulnerability.
View ArticleDebian Security Advisory 3427-1
Debian Linux Security Advisory 3427-1 - It was discovered that the Mechanism plugin of Blueman, a graphical Bluetooth manager, allows local privilege escalation.
View ArticleESET NOD32 Antivirus DLL Hijacking
ESET NOD32 Antivirus suffers from a DLL hijacking vulnerability.
View ArticleDBKiss 1.16 Cross Site Scripting
DBKiss version 1.16 suffers from a cross site scripting vulnerability.
View ArticlephpMyFAQ 2.7.9 PHP Code Injection
phpMyFAQ version 2.7.9 remote PHP code injection exploit.
View ArticlePHPDolphin Social Network 1.2.8 Cross Site Scripting
PHPDolphin Social Network version 1.2.8 suffers from a cross site scripting vulnerability.
View ArticleRSA SecurID Web Agent Authentication Bypass
RSA SecurID Web Agent contains a patch that is designed to fix an authentication bypass vulnerability that may potentially be exploited by malicious users to compromise the confidentiality and...
View ArticleRed Hat Security Advisory 2015-2671-01
Red Hat Security Advisory 2015-2671-01 - The Jakarta/Apache Commons Collections library provides new interfaces, implementations, and utilities to extend the features of the Java Collections Framework....
View ArticleHP Security Bulletin HPSBGN03526 1
HP Security Bulletin HPSBGN03526 1 - A potential security vulnerability has been identified with HPE Helion Eucalyptus. The vulnerability could be exploited to bypass access permissions by a remote...
View ArticleSamhain File Integrity Checker 4.1.2
Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server....
View ArticleYSTS 10th Edition Call For Papers
The 10th edition of YSTS (You Shot The Sheriff) has announced its call for papers. It will be held in Sao Paulo, Brazil on June 13th, 2016.
View ArticleRed Hat Security Advisory 2015-2684-01
Red Hat Security Advisory 2015-2684-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the...
View ArticleGentoo Linux Security Advisory 201512-05
Gentoo Linux Security Advisory 201512-5 - Multiple buffer overflow vulnerabilities in gdk-pixbuf may allow remote attackers to execute arbitrary code or cause Denial of Service. Versions less than...
View ArticleHP Security Bulletin HPSBGN03527 1
HP Security Bulletin HPSBGN03527 1 - A potential security vulnerability has been identified with HPE Helion Eucalyptus. The vulnerability could be exploited to bypass access permissions by a remote...
View ArticleRed Hat Security Advisory 2015-2685-01
Red Hat Security Advisory 2015-2685-01 - OpenStack Bare Metal is a tool used to provision bare metal machines. It leverages common technologies such as PXE boot and IPMI to cover a wide range of...
View ArticleRed Hat Security Advisory 2015-2650-01
Red Hat Security Advisory 2015-2650-01 - Red Hat Enterprise Linux OpenStack Platform director provides the facilities for deploying and monitoring a private or public infrastructure-as-a-service cloud...
View ArticleRed Hat Security Advisory 2015-2673-01
Red Hat Security Advisory 2015-2673-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the...
View ArticleGentoo Linux Security Advisory 201512-04
Gentoo Linux Security Advisory 201512-4 - Multiple vulnerabilities have been found in OpenSSH, the worst of which could lead to arbitrary code execution, or cause a Denial of Service condition....
View Article