This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.
fc0a6d2d1d063d5c66dffd952493d0cda256cad204f681de0f84ef85b2ad8428
Microsoft Office 2007 suffers from a RTF XML SmartTags use-after-free vulnerability.
9112fd06f8a9594124ac555685a4c390b42d8b36cbf029a9deca63894f80b49e
Microsoft Office 2007 suffers from a OneTableDocumentStream invalid object vulnerability.
71aae25eeff40a890630b5def4b9a4c33395e8cd48b05b1af664a30be591e023
Microsoft Office 2007 suffers from a stack-based buffer overflow vulnerability when handling a malformed document.
fc3f3a43acba1f2993d16df8be2f8af7217caf24ea88bc37b3ab71571b41e296
Page2Flip version 2.5 is missing an access control and due to this allows for information disclosure.
4d58d05abd8782f6ea8e55b951adbc39826bfb054bc42cad328a0157a2cf0cf3
Page2Flip version 2.5 suffers from a session management issue that allows deleted users to still login.
3dd3826320edfc3d9787b04d941d218aa5fcb2d184361a4c7704cfea80c20ef4
Page2Flip version 2.5 suffers from an authorization bypass vulnerability.
81eff9c8072a47333a722737d210492a75a50e881af03b9fbb7745d495b77d5c
Page2Flip version 2.5 suffers from an insecure direct object reference vulnerability.
88377ffbd2ae0e8c6494acd84244a8d80fc28f3b4cb5e706a672ceaab14433b9
Page2Flip version 2.5 suffers from a persistent cross site scripting vulnerability.
a80dbfc906c92033fe34653626d3672fe4672f10582601c6398132ae3406a17b
Page2Flip version 2.5 suffers from a cross site scripting vulnerability in the create user functionality.
8c4a6a8c8fb7c3e5d54cac7cab64b3e9ec1fd020d73d675cbf2229ba4b628693
This guide is to help others integrate their Microsoft 2013 Lync systems with AsteriskNOW for use with non-Lync compatible SIP providers.
368670bac076a99e8be719227b8a15dfab584d7e8ed20365c28899df35a6cdda
Page2Flip version 2.5 suffers from a denial of service vulnerability.
d605475e023fd099f6ae5991a6c9dc8b5175e3d6115f0f5e24bdef720b8b65c0
Dell SonicWall NetExtender version 7.5.215 suffers from a privilege escalation vulnerability.
f0b514cab106db17e65e6afa1d98fdd80dad6bd4d518110c106cfcff55f1bcd3
WordPress Google Analyticator plugin version 6.4.9.4 suffers from cross site scripting vulnerabilities.
7f7523e430b3afce63313d41c2b6e4084ef335223ee61e6f6fdb35a34d45f768
Netop Remote Control versions 11.52 and 12.11 suffer from hard-coded cryptographic key and insufficiently protected credential issues.
bd92784b38a1c301a6674b12b72e327934aa4b895b78f8ea87bbefcaaebfb4a3
Pligg CMS version 2.0.2 suffers from a cross site request forgery vulnerability.
e8df6ea13dde593af7dce761b232c1d61d5a0fb061392ea66d9fa5a7ea0f440d
ResourceSpace CMS versions 7.3.7009 and below suffer from a remote SQL injection vulnerability.
f8889e00ce3b0fba310c27b4671a53d11f1156966615698aad1a1d3558bbc703
UNIT4TETA TETA WEB version 22.62.3.4 suffers from a session fixation vulnerability.
7ea165d8dbfe2db8ab49a36cb0239ff0625d1fa350d20ed811a0272d3c0ea128
Red Hat Security Advisory 2015-1681-01 - OpenStack Object Storage provides object storage in virtual containers, which allows users to store and retrieve files. The service's distributed architecture supports horizontal scaling; redundancy as failure-proofing is provided through software-based data replication. Because Object Storage supports asynchronous eventual consistency replication, it is well suited to multiple data-center deployment. A flaw was found in openstack-swift where an authenticated user may delete the most recent version of a versioned object regardless of ownership. To exploit this flaw an attacker most know the name of the object and have listing access to the x-versions-location container.
b4620e51dac253858c6c6dd8a14325faa2787471f9702c33b9acaf4a45839e74