Joomla JE Directory Ads 1.7 SQL Injection
Joomla JE Directory Ads component version 1.7 suffers from a remote SQL injection vulnerability.
View ArticleJoomla JE Property Finder 1.6.3 SQL Injection
Joomla JE Property Finder component version 1.6.3 suffers from a remote SQL injection vulnerability.
View ArticleJoomla JE Quiz 2.3 SQL Injection
Joomla JE Quiz component version 2.3 suffers from a remote SQL injection vulnerability.
View ArticleJoomla Hbooking 1.9.9 SQL Injection
Joomla Hbooking component version 1.9.9 suffers from a remote SQL injection vulnerability.
View ArticlePHP Marketplace Script SQL Injection
PHP Marketplace Script suffers from a remote SQL injection vulnerability.
View ArticleJoomla JE Tour 2.0 SQL Injection
Joomla JE Tour component version 2.0 suffers from a remote SQL injection vulnerability.
View ArticleJoomla JE Video Rate 1.0 SQL Injection
Joomla JE Video Rate component version 1.0 suffers from a remote SQL injection vulnerability.
View ArticleJoomla JE Auction 1.6 SQL Injection
Joomla JE Auction component version 1.6 suffers from a remote SQL injection vulnerability.
View ArticleJoomla JE Auto 1.5 SQL Injection
Joomla JE Auto component version 1.5 suffers from a remote SQL injection vulnerability.
View ArticleJoomla JE Awd Song 1.8 SQL Injection
Joomla JE Awd Song component version 1.8 suffers from a remote SQL injection vulnerability.
View ArticleJoomla GeoContent 4.5 Cross Site Scripting
Joomla GeoContent component version 4.5 suffers from a cross site scripting vulnerability.
View ArticleCentOS7 Kernel Denial Of Service
CentOS7 suffers from a kernel crashing denial of service issue triggered by an rsyslog daemon vulnerability.
View ArticleJoomla Fastball 3.2.8 SQL Injection
Joomla Fastball component version 3.2.8 suffers from a remote SQL injection vulnerability.
View ArticleJoomla GameServer! 3.4 SQL Injection
Joomla GameServer! component version 3.4 suffers from a remote SQL injection vulnerability.
View ArticleJoomla Music Collection 3.0.3 SQL Injection
Joomla Music Collection component version 3.0.3 suffers from a remote SQL injection vulnerability.
View ArticleWordPress Easy Table 1.6 Cross Site Scripting
WordPress Easy Table plugin version 1.6 suffers from persistent cross site scripting vulnerabilities.
View ArticleDEF CON 25 Wall Of Sheep Call For Presentations
The Wall of Sheep would like to announce a call for presentations at DEF CON 25 at the Caesars Palace in Las Vegas, NV from Thursday, July 27th to Sunday, July 30th. This will be the 5th anniversary of...
View ArticleRiverbed RiOS Insecure Cryptographic Storage
Riverbed RiOS suffers from an insecure cryptographic storage vulnerability.
View ArticleShadeYouVPN.com Client For Windows 2.0.1.11 Privilege Escalation
ShadeYouVPN.com client for Windows version 2.0.1.11 suffers from a local privilege escalation vulnerability due to executing any file path sent through a socket without verification as the SYSTEM user.
View ArticleDebian Security Advisory 3786-1
Debian Linux Security Advisory 3786-1 - Editor spell files passed to the vim (Vi IMproved) editor may result in an integer overflow in memory allocation and a resulting buffer overflow which...
View ArticleDebian Security Advisory 3787-1
Debian Linux Security Advisory 3787-1 - It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an...
View ArticleDebian Security Advisory 3788-1
Debian Linux Security Advisory 3788-1 - It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an...
View ArticleGentoo Linux Security Advisory 201702-07
Gentoo Linux Security Advisory 201702-7 - Multiple vulnerabilities have been found in OpenSSL, the worst of which might allow attackers to access sensitive information. Versions less than 1.0.2k are...
View ArticleGentoo Linux Security Advisory 201702-08
Gentoo Linux Security Advisory 201702-8 - Multiple vulnerabilities have been found in VirtualBox, the worst of which might allow unauthorized changes to some critical or all accessible data. Versions...
View ArticlePiwik Superuser Plugin Upload
This Metasploit module will generate a plugin, pack the payload into it and upload it to a server running Piwik. Superuser Credentials are required to run this module. This Metasploit module does not...
View Article