The Takebishi Electric DeviceXplorer SYSMAC OPC server has security vulnerabilities, allowing an attacker with access to the OPC interface to arbitrarily read and write the process memory, potentially leading to the execution of attacker-provided code.
51dbc8b41d20e28402e3f86a60d2bb549b073e580e6fbcfd89790242dce2a2ca
The Takebishi Electric DeviceXplorer MODBUS OPC server has security vulnerabilities, allowing an attacker with access to the OPC interface to arbitrarily read and write the process memory, potentially leading to the execution of attacker-provided code.
8cb33ba0ad4a128adf09db399a145e6e72c12a1b7920968c282f9e760c06697d
The Takebishi Electric DeviceXplorer FA-M3 OPC server has security vulnerabilities, allowing an attacker with access to the OPC interface to arbitrarily read and write the process memory, potentially leading to the execution of attacker-provided code.
52af4b4375b268850339d5b6df527f40e730e7722cacafcf9729cd0917d237b3
The Takebishi Electric DeviceXplorer MELSEC OPC server has security vulnerabilities, allowing an attacker with access to the OPC interface to arbitrarily read and write the process memory, potentially leading to the execution of attacker-provided code.
7af1ceb7670494e47ccb84c3bcb86b5dbed005eb143f1fd8bfb4d891ea6ba6d1
The Takebishi Electric DeviceXplorer HIDIC OPC server has security vulnerabilities, allowing an attacker with access to the OPC interface to arbitrarily read and write the process memory, potentially leading to the execution of attacker-provided code.
2daa115b0cc754c5e67f369025f7c8c0005d004b429f3a2174e65293cf1605e5
The NetxEIB OPC server has security vulnerabilities, allowing an attacker with access to the OPC interface to arbitrarily read and write the process memory, potentially leading to the execution of attacker-provided code.
cc5e3497ad3b9ec1cd94870fa3bd4f9ddecf05dc27580164d21b98968bfffa6d
Mandriva Linux Security Advisory - Format string vulnerability in Inkscape before 0.45.1 allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a URI, which is not properly handled by certain dialogs.
4f62b3eb1cb4026205e69534e90bbacb7ac28fc6d2861ee53df14c830e1f91a7
Mandriva Linux Security Advisory - Due to an internal error Squid-2.6 is vulnerable to a denial of service attack when processing the TRACE request method. This problem allows any client trusted to use the service to perform a denial of service attack on the Squid service.
462ae1a336df1deaf247df7072ada040b0c6d14b56480b78c4739e9e3625a08a
Mandriva Linux Security Advisory - Jean-Sebastien Guay-Leroux discovered an integer underflow in the file_printf() function in file prior to 4.20 that allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.
73404ee6b9cfa61253385a98da5075f54bc1d529bf4bec08ee9a5925329ba5c3
Ubuntu Security Notice 440-1 - Stefan Streichbier and B. Mueller of SEC Consult discovered that MySQL subselect queries using "ORDER BY" could be made to crash the MySQL server. An attacker with access to a MySQL instance could cause an intermittent denial of service.
33e5f204a3d9b0571211cfe65ed8b364116c5c7461b05b0ff2f21ab78ba1842e
Ubuntu Security Notice 439-1 - Jean-Sebastien Guay-Leroux discovered that "file" did not correctly check the size of allocated heap memory. If a user were tricked into examining a specially crafted file with the "file" utility, a remote attacker could execute arbitrary code with user privileges.
4d1da7553bbccf35ace2f6eff54746863923585f6832730a046e7187e47d88b2
Secunia Security Advisory - laurent gaffi
401cbc63ea58d46c614168180e8f3f057dd20e985cb301f98b0a5729e3d19b91
Secunia Security Advisory - Red Hat has issued an update for file. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.
c386890ffe2a55743b76dbd8d43f5ae981043276f96f61ecc9b5822de58fd18a
Secunia Security Advisory - xoron has discovered a vulnerability in PortailPHP, which can be exploited by malicious people to conduct SQL injection attacks.
5d990fbd9f8ccae22caf514fe8ae8404bd8eb9a852e5581dfd3e123e9c08e933
Secunia Security Advisory - Kacper has discovered two vulnerabilities in LAN Management System, which can be exploited by malicious people to compromise vulnerable systems.
eb4d0efda9f84f7bff55d28c4d0fdd1019938c867c8850ac2ba9f66071f44231
Secunia Security Advisory - parad0x has reported a vulnerability in aspWebCalendar FREE, which can be exploited by malicious people to conduct SQL injection attacks.
1841e2a32d0f53188d0d52575b880322a9621d9fa08044ed7116cde3ed14313b
Secunia Security Advisory - CyberGhost has reported a vulnerability in Active Auction Pro, which can be exploited by malicious people to conduct SQL injection attacks.
27edc1be01826840928a28c768d71b176a0d7e18cee3f0a0e6ef9c84ae0407c5
Secunia Security Advisory - Stefan Esser has reported a vulnerability in PHP, which can be exploited by malicious people to disclose potentially sensitive information.
ad3f2a4ce7c2bd9b9cca035a7e14785c774a097ecf66d307f502c7acbade8818
Secunia Security Advisory - CyberGhost has reported a vulnerability in Active Trade, which can be exploited by malicious people to conduct SQL injection attacks.
a0b507645addbf648ce6bc4cbf008e53a73421ed77f9bc0cac560eafd2f4ba91
Secunia Security Advisory - Some vulnerabilities have been reported in Zope, which can be exploited by malicious people to conduct cross-site request forgery attacks
bf6f0520beea0f9626d0bc42ee8e732caab6d0c0e42258349b948438d73b4448
Secunia Security Advisory - Red Hat has issued an update for openoffice.org. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise a user's system.
053f0cfd56b9fc0d5a114a7877393182a27efc1abdf0fb68a0596fa9d499abdf
Secunia Security Advisory - CyberGhost has reported a vulnerability in Active Photo Gallery, which can be exploited by malicious people to conduct SQL injection attacks.
6e4c0866700bdaa5bddefaf7351e238725eb775c74778b9d56ec392f47dae25f
Secunia Security Advisory - CyberGhost has reported a vulnerability in Active Link Engine, which can be exploited by malicious people to conduct SQL injection attacks.
e6f928ffd634b1c8c141884663f6223e8ac3bbe0099aedf1b49f7c7769dca100
Secunia Security Advisory - qwerty1979 has reported a vulnerability in Asterisk, which can be exploited by malicious people to cause a DoS (Denial of Service).
6cd997d561f363ba60283eafd187eca9b17fab3e8d17d8427d846bcbc067c2ab
Secunia Security Advisory - rPath has issued an update for file. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.
c9bd124a5d1a24d4595b4700b7373ab2cfc753187b09e8bbe5146799040347b4