Google Chrome versions prior to 125.0.6422.112 V8 type confusion proof of concept exploit.
788ea39c0477eb3c46d9338780f690985742a96415f3fd4f64358b8315057dfa
Cacti versions prior to 1.2.27 suffer from an arbitrary file write vulnerability that allows for remote code execution.
80820ebe13be856fb0d05567e282846937b66d01888688fa767e21ec96a41b52
GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.
3263e6bd50751dadccfae19ff8c3d5cd91022890218bd95f0dd6aae993ea8926
Debian Linux Security Advisory 5761-1 - Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure.
b688330f4468b4808fd77edb3135ca2d428c6005bd049af00064e8aeef66f188
Debian Linux Security Advisory 5760-1 - Multiple security issues were discovered in Ghostscript, the GPL PostScript/PDF interpreter, which could result in denial of service and potentially the execution of arbitrary code if malformed document files are processed.
dd9d422dae718c0b789d54196b65433ebecfb376f5e7c28d295903bcf097a6ff
Water Billing Management System version 1.0 suffers from a cross site request forgery that enables an arbitrary file upload.
b2b6b9ccd306227cb678af1bbff8e4fca60932e849a1f798914a7c8e6a43a1de
Red Hat Security Advisory 2024-6054-03 - Updated images are now available for Red Hat Advanced Cluster Security. The updated image includes security and bug fixes. Issues addressed include deserialization and memory exhaustion vulnerabilities.
f260f41722b9252174fb9e0e3db069e7bd52f2cfe783948bba934157544c9d65
Webpay E-Commerce version 1.0 suffers from a directory traversal vulnerability.
95d09ce8c5598b697d3b00aaac726a002f69525139a53abe89bf0d0c71fcfd96
Red Hat Security Advisory 2024-6044-03 - Red Hat Advanced Cluster Management for Kubernetes 2.11.2 General Availability release images, which fix bugs and update container images. Issues addressed include a denial of service vulnerability.
71e8d9d2404770982066ef6b149539318f218b5e1a8838dfd1904fbc4ab0e065
SPIP version 4.2.6 suffers from a code execution vulnerability.
b55ee69cff2b52a3928d68025095257d9298d4424c268e0674f9dc31d0398866
WordPress GetYourGuide Ticketing plugin version 1.0.6 suffers from a cross site scripting vulnerability.
dcd22c45ffe7169dcb5e713498bc6fad3ab5097f2e800f6255a9b1b944a8c7ac
WordPress SeatReg plugin version 1.54.0 suffers from an open redirection vulnerability.
d3f2de26873d9182b6ab45239143b8dc520934d272e05f0be3d919904dab860a
WordPress WP Event Manager plugin version 3.1.44 suffers from a cross site scripting vulnerability.
84a90a0eb3f40dda41212275dcb4ece9cd5dfc794dab04f6cf1e99ecbb9d523d
pgAdmin versions 8.4 and below are affected by a remote code execution vulnerability through the validate binary path API. This vulnerability allows attackers to execute arbitrary code on the server hosting PGAdmin, posing a severe risk to the database management system's integrity and the security of the underlying data.
63ed0fcb6853adbac916564a39cabd9a37b97dc0119ebfdac97ec042356d36e4
The GiveWP Donation plugin and Fundraising Platform plugin for WordPress in all versions up to and including 3.14.1 is vulnerable to a PHP object injection (POI) flaw granting an unauthenticated attacker arbitrary code execution.
e3b0f075dd3c67bb401766241b1a40088cf8f52a33b79fe6c2ea5b667c1296f2
vTiger CRM version 7.4.0 suffers from multiple reflective cross site scripting vulnerabilities.
d9025e02ef6a363801fc7c5e851c41ef9b220bc58ddf23135770c3a709cde894
An open redirection vulnerability in the page parameter of vTiger CRM version 7.4.0 allows attackers to redirect users to a malicious site via a crafted URL.
1ad0cb6785fe9f19ed8c5597cdd0806bba847585167c6c70c31e675249f0513e
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.
ead5cdcc08529a2e7ce291e01defc3b0f8831ba24c938db0762b1ebc59c71269
Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.
b7c200cda1471eef944b3d0fbe277b9ef6fc68f020c51665a6df168efbced035
Microsoft Windows IPv6 vulnerability checking proof of concept python script that causes a denial of service. Windows 10 and 11 versions under 10.0.26100.1457 and Server 2016-2019-2022 versions under 10.0.17763.6189 are affected.
04c38d06a082513de8abf2875e18f1ebec41c245eac05cf7f60cc0cff919185a
Gitea version 1.22.0 suffers from a cross site scripting vulnerability.
679d63e8928338a2795080c2e8acf6c63870fd815e5470dd05c9c71ca4c12184
Notemark versions 0.13.0 and below suffer from a cross site scripting vulnerability.
5412263751c127d8cb7add8025ce80555d79296e588f9ff7d5b2a2c6c1a17c8a
Ubuntu Security Notice 6972-4 - Yuxuan Hu discovered that the Bluetooth RFCOMM protocol driver in the Linux Kernel contained a race condition, leading to a NULL pointer dereference. An attacker could possibly use this to cause a denial of service. It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel, leading to a null pointer dereference vulnerability. A privileged local attacker could use this to possibly cause a denial of service.
d6b50c131f18f6b9b7c0f2300ad92a70f2206c0991d489417cdd16254ef44e85
Online Graduate Tracer System version 1.0.0 suffers from an insecure direct object reference vulnerability.
0abd7e5d887d9e2204c565886d418ad0656b2616bb80e508761e6e23aa8bf66f
SPIP version 4.2.5 suffers from a code execution vulnerability.
77218719c0c92a7eedc2d716ea5ddbdf673525e68dd101d544452cbe514d03dc