Secunia Security Advisory - A security issue has been reported in ClientExec, which can be exploited by malicious people to gain knowledge of various system information.
e34f9f7c210030fa2a146be5aaac788f3ddaeb44c8e541a5f34e9fe987be9dc6
Secunia Security Advisory - Doubles has discovered a vulnerability in Unzoo, which potentially can be exploited by malicious people to compromise a user's system.
3cdabeba3d1dc3dffb169bbd5bd0b58c2185742b4fe785e4011e6d760822aae1
Exploitation of design vulnerabilities in various AntiVirus products could allow malicious code to evade detection.
5898f2fbe542b139be43a7c88281c41740d27dda7118eceef4fc2ac0a8b500ce
The 3COM 3crwe754g72-a has a flaw with handling DHCP requests that allows an attacker to inject code into the administration interface.
280e58d7692513ce37b35eb0eebfe4976fc07c5de3e8002b238daf76d8bcc6fa
The 3COM 3crwe754g72-a products suffers from information disclosure, clear text information text storage, and bad authentication design.
b1fb66a6be2e7d57fed5cdea33bf6148a8a23f8f7598e22ff9e1572cdf898b89
cPanel 9.4.1 allows logged in users to change permission of any file to 755.
2dbd2ffc962d08b971f885ce0649ce6e7308777ab6e9b6843abb9792970232ac
cPanel 9.4.1 allows logged in users the ability to change ownership of any file to their uid:gid.
f2a62268ae0d95df13b67e1ba2aaa36b4ea8a6260de6349f34fa4b680d8793f5
cPanel 9.4.1 is susceptible to a classic symbolic link attack.
9d09c284862856b892c22b1f28f3233bec231367ca526c5480075e9ddc323a21
Remote proof of concept exploit for the ProFTPD 1.2.x user enumeration vulnerability.
1a9f67d4e3a545bb044fe39bd1c9b16e5d474cf940899ecfd73d586444949990
CoolPHP 1.0-stable is susceptible to cross site scripting, path disclosure, and directory traversal attacks.
e2e1f48f15660fe2081380445cadfd0431fd941dc2a499a07f2c1a2fc79ee69e
Interesting write up discussion how to use Javascript to spoof what page is actually being visited.
38085161b297d18b428b1f370a3d241bfbbf219d99c67d2e0d89b2152fe97098
Powie's PSCRIPT Forum is susceptible to multiple SQL injection vulnerabilities.
4d7cb83bc15a5215fda88bb9e4017fcdae79fe47e57fa134c3ca21b47839b2e0
mod_ssl provides provides strong cryptography for the Apache 1.3 webserver via the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1). It is based on the SSL/TLS toolkit OpenSSL and supports all SSL/TLS related functionality, including RSA and DSA/DH cipher support, X.509 CRL checking, etc. Additionally it provides special Apache related facilities like DBM and shared memory based inter-process SSL session caching. per-URL SSL session renegotiations, DSO support, etc.
1717eb96e9de60a24d73e9616fb7e6bcc9d47891c6e77cb26d4bf529c4382260
Yak! versions 2.1.2 and below suffer from remote directory traversal and arbitrary file upload vulnerabilities.
e9eca6add7ddbd7ddf31c47cc1614f574b9a113f384abf9d9a64091993ae4fca
MMDF deliver local root exploit for SCO OpenServer 5.0.7 x86.
5a32e0e43ec0a91696cd2732619706797117d91a12166e0b705430b2a2d691a5
mod_ssl provides provides strong cryptography for the Apache 1.3 webserver via the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1). It is based on the SSL/TLS toolkit OpenSSL and supports all SSL/TLS related functionality, including RSA and DSA/DH cipher support, X.509 CRL checking, etc. Additionally it provides special Apache related facilities like DBM and shared memory based inter-process SSL session caching. per-URL SSL session renegotiations, DSO support, etc.
4f307413360dcdc90283082e77179b8aa65256afaf718a5a7bc9668e25c6a72d
Further information about flaws in 3COM's 3cradsl72 wireless router that suffers from information disclosure and authentication issues.
fda580d8674de81d42d6cd8245bcceed32d1ec127b6d704551f4b5de50711eb1
Debian Security Advisory 567-1 - Several problems have been discovered in libtiff, the Tag Image File Format library for processing TIFF graphics files. An attacker could prepare a specially crafted TIFF graphic that would cause the client to execute arbitrary code or crash.
2cafaf13ebb7074ae7a42bf0b32fe9c8377dab4268ad778771b627fc90977295
ProFTPD 1.2.x suffers from a vulnerability that allow for remote user enumeration. It is possible to determine which user names are valid, which are special, and which ones do not exist on the remote system. This can be accomplished by code execution path timing analysis attack at the ProFTPD login procedure.
2f9b4a192cb97ddf88d2f6a8b9f9136a5959de40a1d46bb06e05a1ac3cfe8582
Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in AliveSites Forum, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
374be109ca87132366e44cffcfad2b0aad5368a3ba7c6d86055ce9351f2b7124
Secunia Security Advisory - Positive Technologies has reported a vulnerability in CyberStrong eShop ASP Shopping Card, which can be exploited by malicious people to conduct cross-site scripting attacks.
f5a979d861214a19573dc471f793c81f5c37b45fa30a942f3ac15b840a5f48ac
Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in Dmxready Site Chassis Manager, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
d5757e1e4508ed5c859032585c74edad380d9be9046a321d2b7d69b9c5a60b18
Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in WowBB Forum, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
e62c985df96bd890c91e339391f7a3ca6237b054a533590d55143fbad3311d95
Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in DevoyBB, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
0077b7667403456a9effc10bda118443e9aa1d9ce9f2283fffc6b9fbd8357051
Secunia Security Advisory - Karb0nOxyde has reported a security issue in 3Com OfficeConnect ADSL Wireless 11g Firewall Router, which can be exploited by malicious people to gain knowledge of sensitive information.
47c9ad97041ed6ea731c0e17894f3bedb373b021b2b8a8d4ca3c7d37224264c5