Secunia Security Advisory - Fedora has issued an update for php. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.
8ac44334c8249722df920fb4436bd7dc92d5be2a0f5c5e3b08733761b8b8a8eb
Secunia Security Advisory - Fedora has issued an update for freeradius. This fixes some vulnerabilities, which potentially can be exploited by malicious users to conduct SQL injection attacks or to cause a DoS (Denial of Service).
6b1645bec707b0c4a6f8990388d4aa48265ffa11a264673708d10a7178b4f8b9
Secunia Security Advisory - Fedora has issued an update for openmotif. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.
8637f226973badb18b10b2ffbf26ec39a793aa159c47b489d829cba4b08c67c2
Secunia Security Advisory - Gentoo has issued an update for phpwiki. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.
5b8940bdcb0ad61127ab26243e63089780e6005c066643bdb3acadf2af158892
Secunia Security Advisory - Cedric Cochin has reported a vulnerability in Gallery, which can be exploited by malicious people to conduct script insertion attacks.
e4e45fb2d74ccc6986cdff5c86ff3df00c5fa7014a095131a037b3ea3f141cac
Secunia Security Advisory - Cedric Cochin has reported a vulnerability in phpGraphy, which can be exploited by malicious people to conduct script insertion attacks.
79fbb46832924dd57654d16279a6893c5fd250f1899d1865eff0384c17e68dc2
Secunia Security Advisory - Cedric Cochin has discovered a vulnerability in YaPig, which can be exploited by malicious people to conduct script insertion attacks.
facfd31aee4b09fd002f3a3bbccaa40f932632e1f58fa4f0686706942db9abbc
Secunia Security Advisory - Cedric Cochin has reported a vulnerability in PhotoPost PHP Pro, which can be exploited by malicious people to conduct script insertion attacks.
2c03637fa3cf006766b93badff9de2357171d725b0b7cd5b73886b2bdb8147bf
Secunia Security Advisory - ReZEN and 0xception have discovered a vulnerability in Simple PHP Blog, which can be exploited by malicious users to compromise a vulnerable system.
3588e1bec822c8f45208bd8f3e14b3dc03a2fd5fe7e039528b84b78156d6f1f8