WordPress Image Metadata Cruncher plugin suffers from cross site request forgery and stored cross site scripting vulnerabilities.
Monthly Archives: February 2015
D-Link DSL-2640B Unauthenticated Remote DNS Changer
Remote exploit for changing DNS settings unauthenticated on the D-Link DSL-2640B.
Ebay Magento Script Insertion
Ebay’s Magento application suffers from a malicious script insertion vulnerability.
Mozilla's Flash-Killer 'Shumway' Appears In Firefox Nightlies
Fight Back Against Illegal GCHQ Spying With Paperwork!
Suite Of Sophisticated Nation-State Attack Tools Found With Connection To Stuxnet
Windows 10 To Adopt Fido Post-Password Protection
Did GCHQ illegally spy on you? Here’s how to find out
Law enforcement agencies shouldn’t be above the law.
Find out if the UK’s GCHQ illegally spied on you…
The post Did GCHQ illegally spy on you? Here’s how to find out appeared first on We Live Security.
ES File Explorer 3.2.4.1 Path Traversal
ES File Explorer version 3.2.4.1 suffers from a path traversal vulnerability.
Samhain File Integrity Checker 3.1.4
Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.