libsndfile versions 1.0.25 and below suffer from a heap overflow vulnerability.
6d5a1dca8cb4114df92588327dc9da7e559d30f760ea8e555b84e05ce5fbcbb2
WordPress Pie Register plugin version 2.0.18 suffers from multiple remote blind SQL injection vulnerabilities.
d7fec7c39380b4a2ab59c117e7c49906a8f6757f6bdc391c0b0ce08670bfad2d
WordPress Font plugin version 7.5 suffers from a path traversal vulnerability.
7274f29eefca01cc0968f056771db3922aac58514ebe23be24044e14b0738142
WordPress Pie Register plugin version 2.0.18 suffers from a cross site scripting vulnerability.
ef061d8a63c49d1c9c92a2b3e63ae35351ce03271bba75bd55dfec9ea6f02101
ZHONE ZNID GPON 2426A versions prior to S3.0.501 suffer from buffer overflow vulnerabilities.
10301f6626615bcc617e869331d7fe2b2a9b590847d3e0f5ad0463b329dcf46a
GetSimple CMS version 3.3.7 suffers from a cross site scripting vulnerability.
2caeb87cb8415d138e3a7ff502dce6335f1dacbac516fa15bd4e017df6f1aa44
Password Safe and Repository Enterprise version 7.4.4 Build 2247 suffers from remote SQL injection and authentication bypass vulnerabilities.
912329f72ad8b3fa3e4c5025c1548e060893d43692df38044806d8bed8cc8a2b
Password Safe and Repository Enterprise version 7.4.4 Build 2247 suffers from insufficiently protecting credentials by using an unsalted MD5 hash for protection.
aa3f253285227ed11f229a3e22241cb871c5accd91980275c406e839bee0740f
If AdobeWorkgroupHelper.exe is called with an overly long command line argument it is vulnerable to a stack based buffer overflow exploit. Version 2.8.3.3 is affected.
ef450a73a8d6362812ddab4a5aa611d7e0c3cdb0cf7886a183004492328ce245
Red Hat Security Advisory 2015-1890-01 - The Simple Protocol for Independent Computing Environments is a remote display protocol for virtual environments. SPICE users can access a virtualized desktop or server from the local system or any system with network access to the server. SPICE is used in Red Hat Enterprise Linux for viewing virtualized guests running on the Kernel-based Virtual Machine hypervisor or on Red Hat Enterprise Virtualization Hypervisors. A heap-based buffer overflow flaw was found in the way SPICE handled certain guest QXL commands related to surface creation. A user in a guest could use this flaw to read and write arbitrary memory locations on the host.
2419a1f8bb197d011605571f9eff7d3803265fff612609c2b582203ccbbe7645
Red Hat Security Advisory 2015-1889-01 - The Simple Protocol for Independent Computing Environments is a remote display protocol for virtual environments. SPICE users can access a virtualized desktop or server from the local system or any system with network access to the server. SPICE is used in Red Hat Enterprise Linux for viewing virtualized guests running on the Kernel-based Virtual Machine hypervisor or on Red Hat Enterprise Virtualization Hypervisors. A heap-based buffer overflow flaw was found in the way SPICE handled certain guest QXL commands related to surface creation. A user in a guest could use this flaw to read and write arbitrary memory locations on the host.
4e0726057f796adcd2fcb126eb4b00d2f42baf185d0c4b84693cbae4e4b50be8
Red Hat Security Advisory 2015-1888-01 - Red Hat JBoss SOA Platform is the next-generation ESB and business process automation infrastructure. Red Hat JBoss SOA Platform allows IT to leverage existing, modern, and future integration methodologies to dramatically improve business process execution speed and quality. It was found that the code which checked that the server hostname matches the domain name in a subject's Common Name field in X.509 certificates was flawed. A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X.509 certificate.
137300cf20be6442c17106059dabf78383537b44c8fef262d899c482c94adf70
F5 BigIP version 10.2.4 Build 595.0 Hotfix HF3 suffers from a path traversal vulnerability.
ab0a3042d4334bb2c87d36fda9fec448e92ffbf6fe5472e790e037e320a7c8a7
EMC SourceOne Email Supervisor Reviewer is vulnerable to brute-force password guessing, cross site scripting, session hijacking, and use of hard-coded encryption key vulnerabilities.
675f02b326ac4c5d1fc4af34a8234c03706c420d281bc530a50212a23366245f
Zhone ZNID GPON 2426A suffers from insecure direct object reference, password disclosure, command injection, cross site scripting, and privilege escalation vulnerabilities. Versions prior to S3.0.501 are affected.
9771ec7426f0a535756a36d56d77084397753e077e3c524477ca5ee2635f27dd
WebSploit is an advanced man-in-the-middle framework.
ca066d95bf2ed138095c5332c7ee439d901f194246020b3239d98f0a6ec64c5f