Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.
3e44a05f0eedbc975caae05e97abba4180b1ee68cd57e805f9a6f4b5ee24874d
Revive Adserver versions 3.2.1 and below suffer from improper access controls, cross site request forgery, cross site scripting, local file inclusion, and various other vulnerabilities.
f3c53ca4f0d760cffde26a8a7bbe06712810d8fb32dabf303255604dc56e2372
TestLink version 1.9.13 suffers from multiple cross site scripting vulnerabilities.
5230eccf702e10b722d8c391655f290d789494d743b802c5506670a312281917
TestLink version 1.9.13 suffers from a remote SQL injection vulnerability.
e9e6f1842a313a62999a5d4e95558ee5a223b9fd6e37b8be04d0e64fc4439978
Zope Management Interface version 4.3.7 suffers from a cross site request forgery vulnerability.
4a44c59001f1f7565864d480e019a3a4fd024ae8fa91414db943f1b82c6bccf1
Netgear N300 routers suffer from an authentication bypass vulnerability that allows for complete compromise.
ece995f2dfd26eb5923f193ab70874685004103c78f83bdc3caae1d7ee385353
Huawei 3G routers suffer from authentication bypass, cross site request forgery, denial of service, and various other vulnerabilities.
5d2367658e0c166fbe6a18500efffe9f8332dd64802030160bd60d6778785f68
WordPress Support Ticket System plugin version 1.2 suffers from a remote SQL injection vulnerability.
742788a8f3a0e52308117eb480ab95c9b4372f82a4f24228c65749f4c9e73758
LanWhoIs.exe version 1.0.1.120 suffers from a buffer overflow vulnerability.
7574eb8ce3b4e579f9b7bdfda42d4551f13c05418bf0b8426310d33e3bde8949
Ubuntu Security Notice 2766-1 - Frediano Ziglio discovered multiple buffer overflows, undefined behavior signed integer operations, race conditions, memory leaks, and denial of service issues in Spice. A malicious guest operating system could potentially exploit these issues to escape virtualization.
06330da6f524f8e255016d7efcef7001c938f28a2426dbd3cfe9ce05bf56cbae
Debian Linux Security Advisory 3369-1 - Multiple vulnerabilities were discovered in Zend Framework, a PHP framework.
40f9b0d5dddc2dd8ca97dce8b4d9616f68b9f89a8474da4f00bfdf780e1a6ba4
Debian Linux Security Advisory 3370-1 - It was discovered that FreeType did not properly handle some malformed inputs. This could allow remote attackers to cause a denial of service (crash) via crafted font files.
6ad67a24ad5ab93afd778c79b6d582b1bd5d6b66f1a5eeba0908985aef815709
ZTE ZXHN H108N suffers from an unauthenticated configuration download vulnerability.
9492b3a69ae4e315aa3846b3d5e95780dc24f6ca97111b000a275c42a4a7dbe0
RedHat Enterprise Linux version 7.1 suffers from a kernel crash vulnerability on invalid USB device descriptors.
a6c1498865a19e4b8fb98829baeba3cc2c1cf40f95da53b3d912face5dffbc85
Last PassBroker version 3.2.16 suffers from a local buffer overflow vulnerability.
d797c6a4c7897055c84bd5d87160180b3c0f4992d78149cf0ddb6801c15e1eb9
In three browser families researched (Edge, Internet Explorer and Firefox - all on Windows 7 or above), it is possible to extract the frequency of the Windows performance counter, using standard HTML and Javascript. With the Windows performance counter frequency, it is possible to remotely detect some virtual machines and to coarse-grain fingerprint physical machines.
4f09956b0c7e913f4113cbe7b3f586ad32231df3ccaeb159c817f171faf1bba0
GLPI version 0.85.5 suffers from a file upload filter bypass vulnerability that allows for remote code execution.
7debb38db365cb1f5b803b167db247052b9e37082b8722cd6b023196e2a41bf8