Online Book Store 1.0 Arbitrary File Upload
Online Book Store version 1.0 suffers from an arbitrary file upload vulnerability.
View ArticleTautulli 2.1.9 Denial Of Service
This Metasploit module exploits a denial of service vulnerability in Tautulli version 2.1.9.
View ArticleCurveBall Microsoft Windows CryptoAPI Spoofing Proof Of Concept
This is a proof of concept exploit that demonstrates the Microsoft Windows CryptoAPI spoofing vulnerability as described in CVE-2020-0601 and disclosed by the NSA.
View ArticleCurveBall Microsoft Windows CryptoAPI Spoofing Proof Of Concept
Proof of concept exploit for the Microsoft Windows CurveBall vulnerability where the signature of certificates using elliptic curve cryptography (ECC) is not correctly verified. ECC relies on different...
View ArticleRed Hat Security Advisory 2020-0123-01
Red Hat Security Advisory 2020-0123-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 68.4.1. Issues addressed include a bypass vulnerability.
View ArticleJenkins Gitlab Hook 1.4.2 Cross Site Scripting
Jenkins Gitlab Hook plugin version 1.4.2 suffers from a cross site scripting vulnerability.
View ArticleRed Hat Security Advisory 2020-0120-01
Red Hat Security Advisory 2020-0120-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 68.4.1. Issues addressed include a bypass vulnerability.
View ArticleRed Hat Security Advisory 2020-0127-01
Red Hat Security Advisory 2020-0127-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 68.4.1. Issues addressed include a bypass vulnerability.
View ArticleRed Hat Security Advisory 2020-0128-01
Red Hat Security Advisory 2020-0128-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include a...
View ArticleCitrix ADC / Gateway Path Traversal
This is an nmap nse script to test for the path traversal vulnerability in Citrix Application Delivery Controller (ADC) and Gateway.
View ArticleRed Hat Security Advisory 2020-0122-01
Red Hat Security Advisory 2020-0122-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include a...
View ArticleRed Hat Security Advisory 2020-0124-01
Red Hat Security Advisory 2020-0124-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model,...
View ArticleRed Hat Security Advisory 2020-0130-01
Red Hat Security Advisory 2020-0130-01 - .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New...
View ArticleRed Hat Security Advisory 2020-0133-01
Red Hat Security Advisory 2020-0133-01 - Red Hat Decision Manager is an open source decision management platform that combines business rules management, complex event processing, Decision Model &...
View ArticleRed Hat Security Advisory 2020-0132-01
Red Hat Security Advisory 2020-0132-01 - Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and...
View ArticleWordPress Resim ara 1.0 Cross Site Scripting
WordPress Resim ara plugin version 1.0 suffers from a cross site scripting vulnerability.
View ArticleRed Hat Security Advisory 2020-0134-01
Red Hat Security Advisory 2020-0134-01 - .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New...
View ArticleWireshark Analyzer 3.2.1
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for...
View Article
More Pages to Explore .....