Debian Security Advisory 3325-1
Debian Linux Security Advisory 3325-1 - Several vulnerabilities have been found in the Apache HTTPD server.
View ArticleDebian Security Advisory 3326-1
Debian Linux Security Advisory 3326-1 - William Robinet and Stefan Cornelius discovered an integer overflow in Ghostscript, the GPL PostScript/PDF interpreter, which may result in denial of service or...
View ArticleRed Hat Security Advisory 2015-1538-01
Red Hat Security Advisory 2015-1538-01 - Red Hat JBoss BRMS is a business rules management system for the management, storage, creation, modification, and deployment of JBoss Rules. This release of Red...
View ArticleRed Hat Security Advisory 2015-1539-01
Red Hat Security Advisory 2015-1539-01 - Red Hat JBoss BPM Suite is a business rules and processes management system for the management, storage, creation, modification, and deployment of JBoss rules...
View ArticleDistro Checker 1.0.0
Distro Checker is a tool written for doing cross distribution exploit testing.
View ArticlePacket Storm New Exploits For July, 2015
This archive contains 162 exploits that were added to Packet Storm in July, 2015.
View ArticleBlueDragon 6.2.1 / 7.0 / 7.1 Cross Site Scripting
BlueDragon versions 6.2.1, 7.0, and 7.1 suffer from multiple cross site scripting vulnerabilities. These are in addition to priorly discovered similar issues in these versions.
View ArticleBotan C++ Crypto Algorithms Library 1.10.10
Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate...
View ArticleHeroes Of Might And Magic III .h3m Map File Buffer Overflow
This Metasploit module embeds an exploit into an uncompressed map file (.h3m) for Heroes of Might and Magic III. Once the map is started in-game, a buffer overflow occurring when loading object sprite...
View ArticleOATH Toolkit 2.6.1
OATH Toolkit attempts to collect several tools that are useful when deploying technologies related to OATH, such as HOTP one-time passwords. It is a fork of the earlier HOTP Toolkit.
View ArticleI2P 0.9.21
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is...
View ArticleOS X Keychain EXC_BAD_ACCESS Denial Of Service
Mac OS X 10.10.4 (Yosemite) suffers from a keychain-related denial of service vulnerability.
View ArticleShellcode Helper
Shellcode Helper is a python script designed to act as an x86 little endian stack converter.
View ArticleHP ArcSight Logger Invalid Search Results
There are several flaws in the HP ArcSight Logger search capabilities that cause it to provide invalid search results for any query that uses boolean expressions. This means that any query to search...
View ArticleCODE BLUE 2015 Call For Papers
CODE BLUE has announced its Call For Papers. It is an international conference held at Shinjuku, Tokyo, Japan that will be held from October 28th through the 29th, 2015.
View ArticleDebian Security Advisory 3327-1
Debian Linux Security Advisory 3327-1 - Alex Rousskov of The Measurement Factory discovered that Squid3, a fully featured web proxy cache, does not correctly handle CONNECT method peer responses when...
View ArticleDebian Security Advisory 3328-1
Debian Linux Security Advisory 3328-1 - Several vulnerabilities have been found in Wordpress, the popular blogging engine.
View ArticleDebian Security Advisory 3328-2
Debian Linux Security Advisory 3328-2 - The security update for wordpress in DSA 3328 contained a regression. The patch for issue CVE-2015-5622 was faulty. A new package version has been released that...
View ArticleUbuntu Security Notice USN-2677-1
Ubuntu Security Notice 2677-1 - An uninitialized value issue was discovered in ICU. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause...
View ArticleRed Hat Security Advisory 2015-1543-01
Red Hat Security Advisory 2015-1543-01 - Red Hat JBoss Portal is the open source implementation of the Java EE suite of services and Portal services running atop Red Hat JBoss Enterprise Application...
View Article
More Pages to Explore .....