Secunia Security Advisory - Red Hat has issued an update for thunderbird. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system.
2a1c6c7181b3f17e7fb046b8982efa3ff60dbe18fdddb782e5457a70c7e1895b
Secunia Security Advisory - A weakness has been reported in WebSphere DataPower SOA Appliances, which can be exploited by malicious people to disclose potentially sensitive information and hijack a user's session.
db66bededf664c60f8f072d807940f1ac7f1cb778b83dbf502a25c19ecce1ae2
Secunia Security Advisory - A weakness has been reported in the Organic Groups Vocabulary module for Drupal, which can be exploited by malicious users to bypass certain security restrictions.
de7c1fc1271becf15422c29d78a6e0e402f53cce9269e3d750042aa10f9d72bd
Secunia Security Advisory - Sony has discovered a vulnerability in Jenkins, which can be exploited by malicious users to conduct script insertion attacks.
d55ac04d738acf1b84ea2b64e744a63633f84d2a03e97d231717f01de4fd3e67
Secunia Security Advisory - SUSE has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
2ab47a0bdd10bd0b0fee8472197b3948fa22f748eff86cd92587d9800f8e03d6
Secunia Security Advisory - Hitachi has acknowledged multiple vulnerabilities in Hitachi Cosminexus products, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
ab20392a269d3991a0432f91e01f905cc6de48bfff54fb424e8fc1af7b7f84f6
Secunia Security Advisory - Red Hat has issued an update for firefox and seamonkey. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system.
64c9b1003673bac96170bf04459d3222f9c459c6c43d6aaa759423da1737d276
Secunia Security Advisory - Red Hat has issued an update for xulrunner. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system.
10c7585b2d98ddc014a40a1e6c21fbb1e79c12a3c30d50972473a1ee2f21a8ba
Secunia Security Advisory - Two vulnerabilities have been reported in swDesk, which can be exploited by malicious people to compromise a vulnerable system.
b9a9624b38f1f69785758ca0381fd79a1cb0a4a279a7918cf803c22e2f55f007
Secunia Security Advisory - Mozilla has acknowledged a vulnerability in Firefox, Thunderbird, and Seamonkey, which can be exploited by malicious people to potentially compromise a user's system.
155881665caf00a7da7cdd9227618a633aa53172882de520d7a26061a54b54f5
Secunia Security Advisory - SUSE has issued an update for flash-player. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.
05d374a62c8c08dcae1e720a8075bc4528ecb5a2fe8cabd0048486d3365b6857
Secunia Security Advisory - Red Hat has issued an update for flash-plugin. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.
e54a3435d5b8c086fe05cdf6eb4245e17d216b291f2a1554f82b218bfed5247d
Secunia Security Advisory - Gjoko Krstic has discovered multiple vulnerabilities in SQL Buddy, which can be exploited by malicious people to conduct cross-site scripting attacks.
fb3f5dafd319674ff1336d0fc3d74d58b84fbb67ecab5f277d2835c4e25ffb03
Secunia Security Advisory - A vulnerability has been reported in swDesk, which can be exploited by malicious users to compromise a vulnerable system.
c2e79e95c3e58e62d7118576d34273047a4e43ad4ce48f52a8ad48f3b070115f
Secunia Security Advisory - Multiple vulnerabilities have been reported in Piwik, which can be exploited by malicious people to conduct cross-site scripting and forgery attacks.
45f68dd32c4f2bc3e938ff959153221b955bd7350351e2910523649cac4f7319
Secunia Security Advisory - Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to compromise a user's system.
07ed9af2188f6420bd9760a8c225a8bcae022fe9d86453f1091eec9a89a93c7e
R2 versions 1.65 and below suffer from stack overflow, PIN brute forcing, and directory traversal vulnerabilities.
ba8d5c2101fecdc6134ad9ee1e54309816085a9c6d2e7183056b526de4495867
Novell GroupWise Messenger versions 2.1.0 and below suffer from an arbitrary memory write vulnerability. Proof of concept code included.
2a860e7fc425db009ce68367eb366a207037f08cbda2c027cf4fa5a25d8f9723
Novell GroupWise Messenger versions 2.1.0 and below suffer from a memory corruption vulnerability. Proof of concept code included.
7bf5d40c43687f0dd580d97a27bf832ee281150557d29f08aaeefdac37a8bcc1
Novell GroupWise Messenger Client versions 2.1.0 and below suffer from a unicode stack overflow vulnerability. Proof of concept code included.
0e268a424cde5fd0ea8d5a4d615a84eb7ca0ba1673fe16ea7a7415099931f463
XnView versions 1.98.5 and below suffer from an integer overflow and multiple heap overflows. Proof of concept code included.
a53978ad4291c2f8cc05cd080d4450326c680151562d6fb3c02dc79785c948d4
R4 versions 1.25 and below suffer from stack overflows, a heap overflow, and a directory traversal vulnerability.
a919dc7d26e3287c253dbb8f2c37dabb814060049330f4baed7bb506726bcdee
This Metasploit module exploits a flaw within the handling of MixerSequencer objects in Java 6u18 and before. Exploitation id done by supplying a specially crafted MIDI file within an RMF File. When the MixerSequencer objects is used to play the file, the GM_Song structure is populated with a function pointer provided by a SONG block in the RMF. A Midi block that contains a MIDI with a specially crafted controller event is used to trigger the vulnerability. When triggering the vulnerability "ebx" points to a fake event in the MIDI file which stores the shellcode. A "jmp ebx" from msvcr71.dll is used to make the exploit reliable over java updates.
4bfc86d5bc0fc319751b4a58608edff9318f0cb3cc5c83f4040fa6a97b6f8907
This Metasploit module exploits an arbitrary PHP code execution vulnerability introduced as a backdoor into Horde 3.3.12 and Horde Groupware 1.2.10.
5817e62d4533bab2dbd047fa5bee1b0835f288d738632129acd4ba22eaf51ee4
Skype version 5.6.59.x suffers from a memory corruption vulnerability.
f4417e15a0cf84e00fc1f172c6a7c50d4c3fdc1df7fc4e845f60805468c7512a