Secunia Security Advisory - Blue Coat has acknowledged a security issue and multiple vulnerabilities in Blue Coat PolicyCenter, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to disclose system and potentially sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).
8e1bd3a951aa8e21308f695852f127ecbea84dd95fbe8aa73f91dab1c762c015
Secunia Security Advisory - F5 has acknowledged a vulnerability in F5 TMOS, which can be exploited by malicious people to cause a DoS (Denial of Service).
f6a31286896fc007afc4e472a816a5eafc7fb8857b8f0e149826db804c9b3212
Secunia Security Advisory - Two vulnerabilities have been reported in OPC DataHub and Cascade DataHub, which can be exploited by malicious people to conduct cross-site scripting attacks and HTTP response splitting attacks.
3052a5d814a37992a60fb623fa36eeb1422307ca1bc690b4f49d4e4690aedc6f
Secunia Security Advisory - Luigi Auriemma has discovered two vulnerabilities in ExpressView Browser Plug-In, which can be exploited by malicious people to compromise a user's system.
04c842ca5a3267fa5ae4afaa58c67ce1aadb56e1dabcc687f42b7d16134b8108
Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in KnowledgeTree, which can be exploited by malicious people to conduct cross-site scripting attacks.
22a413c7e3fc668237853ddb5d453533054e3c6b654dc437f343f558ed986968
Secunia Security Advisory - Two vulnerabilities have been reported in Cogent DataHub, which can be exploited by malicious people to conduct cross-site scripting attacks and HTTP response splitting attacks.
b2e2feba3178001ecacfd9d2403c86e53cada4b437bb8a7af6b0a7883a76da37
Secunia Security Advisory - Ubuntu has issued an update for linux-ec2. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
1d5b8efbcfd80d951c9dfba0002cdf7b6168c4ca8fb51bc2ffbbaa50d1234755
adsuck is a small DNS server that spoofs blacklisted addresses and forwards all other queries. The idea is to be able to prevent connections to undesirable sites such as ad servers, crawlers, etc. It can be used locally, for the road warrior, or on the network perimeter in order to protect local machines from malicious sites.
494f4e31c23b6682f4df4b2146cd8a5076c09846f4b6e8d2192681d2bcac7ce9
razorCMS version 1.2 suffers from a path traversal vulnerability.
fbdb12c80c98de27931f125ae507349c1cf96ff75958e03c5bd73d20de3149d2
TFTP Server version 1.4 read request packet buffer overflow exploit that spawns a reverse shell to port 9988.
a201aaa089a6bcd7806a570bb387706be9f0b4e2056e93422d3b8acf44b2a9c1
Novell Netware XNFS caller_name xdrDecodeString remote code execution exploit. Version 6.5 SP8 is affected.
f31dcb88656209bf03e01102c043b25490b0a9d539a7b3674a816b9bdd0db342
Pragyan CMS version 3.0 suffers from a remote file disclosure vulnerability.
9ad90ad2782431ae5aba40266e0f50ca65df93fee0f2563df379ed06567acfda
This Metasploit module exploits an arbitrary root command execution vulnerability in the OP5 Monitor license.php. Ekelow has confirmed that OP5 Monitor versions 5.3.5, 5.4.0, 5.4.2, 5.5.0, 5.5.1 are vulnerable.
d2105e1f89c2f28bca22b1adedc6a39012c035a0e29a2b290c1600b2eb85c472
This Metasploit module exploits an arbitrary root command execution vulnerability in OP5 Monitor welcome. Ekelow AB has confirmed that OP5 Monitor versions 5.3.5, 5.4.0, 5.4.2, 5.5.0, 5.5.1 are vulnerable.
c351feb8d2465ec452647ebc76a51ac184772093b2251154fbd643ab54b4fa12
This Metasploit module exploits a buffer overflow in the encryption option handler of the FreeBSD telnet service.
26a4211c976648be259b01d70ead3c15515210a76cfa2f2e831ab504568547e8