Riverdark RSS Syndicator version 2.17 is susceptible to cross site scripting attacks.
6088a27b40b8d5a5418660901ae75e2e548a229ca66a4042b59480a19e67bc68
Small write up entitled "Hijacking Bluetooth Headsets for Fun and Profit".
77323c05bbb2580095063a300d007938e1bc5d61ac068734b800ab7a87e42caf
Ubuntu Security Notice USN-186-1 - Peter Zelezny discovered that URLs which are passed to Firefox or Mozilla on the command line are not correctly protected against interpretation by the shell. If Firefox or Mozilla is configured as the default handler for URLs (which is the default in Ubuntu), this could be exploited to execute arbitrary code with user privileges by tricking the user into clicking on a specially crafted URL (for example, in an email or chat client).
a55ca2e35e593d050ddf54300ab88ea5d9ec5a91596f7da1133b8128d74794d2
Secunia Research has discovered a vulnerability in PowerArchiver, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error when reading the filename of a compressed file from an ACE/ARJ archive. This can be exploited to cause a stack-based buffer overflow when a malicious archive containing a file with an overly long filename is opened. Successful exploitation allows arbitrary code execution. Versions affected: PowerArchiver 2006 version 9.5 Beta 4/Beta 5, PowerArchiver 2004 version 9.25, PowerArchiver 2003 version 8.60, PowerArchiver 2002 version 8.10.
d91f317dc4dfa469154642413a7d8614b4d771da4b5bc132088b13598dfad62d
jPortal versions 2.2.1 through 2.3.1 suffer from a SQL injection vulnerability. Exploitation details provided.
0ba299252a5279ea725d0580269305521c10ef80d327e966584571381b79bb1f
Debian Security Advisory DSA 819-1 - An integer overflow with a subsequent buffer overflow has been detected in PCRE, the Perl Compatible Regular Expressions library, which allows an attacker to execute arbitrary code, and is also present in Python. Exploiting this vulnerability requires an attacker to specify the used regular expression.
81da3abd2ec36bf75527851c662acd3db1a2bf4da02cf816f39b873cca9be400
Secunia Research has discovered a vulnerability in 7-Zip, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error when handling an ARJ block that is larger than 2600 bytes. This can be exploited to cause a stack-based buffer overflow when a specially crafted ARJ file is opened. Successful exploitation allows arbitrary code execution. Affected versions are: 7-Zip Version 3.13, 4.23, and 4.26 BETA.
21f735293b5f28bb27d6b63dd540c87041eb152dc9e1fbffb657bd18d8139676
Secunia Security Advisory - rgod has discovered a vulnerability in My Little Forum, which can be exploited by malicious people to conduct SQL injection attacks.
3bad1aa628298941fd8dce61478171d94c00ae7a0db1292b310148826c0ed534