![]() 6 new exploits Debian and Derivatives OpenSSL 0.9.8c-1 < 0.9.8g-9 - Predictable PRNG Brute Force SSH Exploit (Perl) Debian and Derivatives OpenSSL 0.9.8c-1 < 0.9.8g-9 - Predictable PRNG Brute Force SSH Exploit (Ruby) OpenSSL 0.9.8c-1 < 0.9.8g-9 (Debian and Derivatives) - (Predictable PRNG) Brute Force SSH (Perl) OpenSSL 0.9.8c-1 < 0.9.8g-9 (Debian and Derivatives) - (Predictable PRNG) Brute Force SSH (Ruby) Debian and Derivatives OpenSSL 0.9.8c-1 < 0.9.8g-9 - Predictable PRNG Brute Force SSH Exploit (Python) OpenSSL 0.9.8c-1 < 0.9.8g-9 (Debian and Derivatives) - (Predictable PRNG) Brute Force SSH (Python) Boa WebServer 0.94.x - Terminal Escape Sequence in Logs Command Injection Boa Web Server 0.94.x - Terminal Escape Sequence in Logs Command Injection eVestigator Forensic PenTester - MITM Remote Code Execution BestSafe Browser - MITM Remote Code Execution Personify360 7.5.2/7.6.1 - Improper Access Restrictions Personify360 7.5.2/7.6.1 - Improper Database Schema Access Restrictions Sophos Cyberoam - Cross-site scripting BOA Web Server 0.94.14rc21 - Arbitrary File Access |
||
---|---|---|
.. | ||
dos | ||
local | ||
remote | ||
shellcode | ||
webapps |