Mandriva Linux Security Advisory - A few vulnerabilities and security-related issues have been fixed in phpMyAdmin since the 2.11.7 release. This update provides version 2.11.9.2 which is the latest stable release of phpMyAdmin and fixes CVE-2008-3197, CVE-2008-3456, CVE-2008-3457, and CVE-2008-4096. No configuration changes should be required since the previous update (version 2.11.7). If upgrading from older versions, it may be necessary to reconfigure phpMyAdmin. The configuration file is located in /etc/phpMyAdmin/. In most cases, it should be sufficient so simply replace config.default.php with config.default.php.rpmnew and make whatever modifications are necessary.
e6892e9e8e9f5737f90c6d02ff75b061021fd7c55a83ea1143c1f922d4824bcd
Gentoo Linux Security Advisory GLSA 200809-15 - A buffer overflow vulnerability in ed may allow for the remote execution of arbitrary code. Alfredo Ortega from Core Security Technologies reported a heap-based buffer overflow in the strip_escapes() function when processing overly long filenames. Versions less than 1.0 are affected.
f6a5e1e2246ef38a36e01eb57598f52f6671c42e718aa7b1a7bf7f17ea90cd42
Chilkat XML Active-X remote arbitrary file creation / execution exploit that affects ChilkatUtil.dll versions 3.0.3.0 and below.
bc2cabce859e1bf95a59a3293c411fe72f2767fbbfb025399b3b25b89a870328
Intertech Co. WCMS suffers from a remote SQL injection vulnerability in etemplate.php.
94e27e4b4508d6fff7768e2f949f0d523c46b935553c84efec171ea1ef56d52d
Secunia Security Advisory - bruiser has reported a vulnerability in CDBurnerXP, which can be exploited by malicious people to potentially compromise a user's system.
cba8157f99420b1a705d8e50619b0374cfab2955a40e8b3848178c498860e85c
Secunia Security Advisory - shinnai has discovered some vulnerabilities in Chilkat XML ActiveX Component, which can be exploited by malicious people to compromise a user's system.
957e631463ff138f9f37c23a5f8aefce721a8b133f0d04d9932cd66006801dc6
Secunia Security Advisory - r45c4l has discovered a vulnerability in Plaincart, which can be exploited by malicious people to conduct SQL injection attacks.
d629824f579d2ec23aaff234c38eb7f8d1439cfc58b394ab6241faa0e7e69951
Datalife CMS Engine version 7.2 suffers from a cross site scripting vulnerability.
05381d7dace49e26eabfb68825ab52ae3ca2cf67a15b88eb3737bd033ecd3487
Aruba Mobility Controllers use X.509 certificates to protect access to the web management interface and to provide secure wireless authentication, such as TLS, TTLS, PEAP, and Aruba-specific Captive Portal. By default, the controller uses a built-in certificate that is shared by all deployed units across all customers. This is broken for the obvious reasons.
261d3b68c595e71f7f735f8311f9fdecf9422bc0b3a44e597a6e76f1396bde07
Softbiz FAQ Script suffers from multiple SQL injection vulnerabilities.
a0d3cb3f91b8d3dc4694767f992e8c5380bbe886e5553f68dd10a09daddc5818
CJ Ultra Plus versions 1.0.4 and below remote SQL injection exploit that uses the cookie.
c28896d7c39fc7f5358afffce11939d6b330edbce0b73c5257fbfb375bcfa3b8
Secunia Security Advisory - Jeremy Brown has reported a vulnerability in the Peachtree Accouting, which can be exploited by malicious people to compromise a user's system.
de9dd44ef84605c95f9219f6e4f5b7a83817f356ba7ab163618ee2ab627bec26
Secunia Security Advisory - Luigi Auriemma has reported a vulnerability in Unreal Tournament 3 WebAdmin, which can be exploited by malicious people to disclose sensitive information.
51f566e2933edbc26dfb5f4b1e98f1b5a42fc52117f4701fbe910179bf3e0b3a
Secunia Security Advisory - Debian has issued an update for python-django. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site request forgery attacks or to potentially cause a DoS (Denial of Service).
7044be6bd5db986eadfa242db2f3c8211a62dd174ca612d453b6851ec2237c60
Secunia Security Advisory - James Bercegay has discovered some vulnerabilities in Advanced Electron Forum (AEF), which can be exploited by malicious people to compromise a vulnerable system.
1c2b023d462c7447eb743241008a07bd85310d3fbd3c819b309ccbe9cda4cdb1