The Linksys WRT110 consumer router is vulnerable to a command injection exploit in the ping field of the web interface.
44b428488518ed2abeee03160462e56c8203577c382cafa8ace86476e15928be
VidiScript version 1.0.3a suffers from persistent cross site scripting vulnerabilities.
988e1093ddc98eb75faec5b41508cc2eb5edfea5a9d04fc7de0b1b5826e1a6d8
davfs2 versions 1.4.6 and 1.4.7 local privilege escalation exploit.
12792272e2f14c05cd5916d2f5ecf86ed1ff086e3ba5bf6686de4edea747c9fe
This bulletin summary lists 8 released Microsoft security bulletins for October, 2013.
d0d54cdceb56314ad3743e50ffe14f28cb7fdb815bbb8a279409089ba1b94048
Red Hat Security Advisory 2013-1411-01 - The glibc packages provide the standard C libraries, POSIX thread libraries, standard math libraries, and the Name Server Caching Daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in glibc's memory allocator functions. If an application used such a function, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.
9c1b6ecde67c864702835dfa3c866327c6d8572763bc1bdbc5ddd0e3ce9ab320
Debian Linux Security Advisory 2769-1 - Several vulnerabilities have been discovered in the FreeBSD kernel that may lead to a denial of service or privilege escalation.
f28d7bebc27c12dd5bebb230f071a816d319c8f0c43da006404a93fa32c755eb
ONO Hitron CDE-30364 router suffers from a denial of service vulnerability when presented with an overly large GET request.
c44741f5b0e596bccd8241e6a0e550ae32cde4688b4fdce18621e6f0940bb190
ISME is a small framework to test IP phones from several editors. It can gather information from IP phone infrastructures, test their web servers for default login/password combinations, and also implement attacks against the systems. ISME has been written in perl with a perl/Tk interface to provide a portable and easy to use tool. Full documentation is also provided.
ecb0015dcaf2c33676782b33e8df8f700c71993eb29d2d41c8dc2453fdec7dc0
JBrute is a password cracking tool written in Java that uses both brute force and dictionary attack methodologies with a built-in rule pre-processor similar to John the Ripper. It supports several standard algorithms and several algorithms from proprietary applications (like Microsoft SQL Server, Oracle, SYBASE, and so on).
194b487b994980460a0572ffbf79c63a2032608cb60242ec4061d6b8b8c6b720
WordPress Quick Contact Form plugin version 6.0 suffers from a persistent cross site scripting vulnerability.
b056c7178db8199e0e99ca13e50f19d91b3b427da8a2f9898a12109f787bc235
WHMCS version 5.2.7 suffers from a remote SQL injection vulnerability.
f16c616cd23ad43b421acd50b490c66cf0bdacacb824be43d2cab94fa1c72954