It appears that howtoforge.com is susceptible to a cross site scripting vulnerability.
9ddf5af37bb80d75acbd0361e09312bc9b65e5137f520838a39f21daec02d882
Secunia Security Advisory - SUSE has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.
f3f901f4e94ea7db4706ad1ac4960fdd75b7a82ea7f154cc1ea23eafa3c3b8af
Secunia Security Advisory - IBM has acknowledged a vulnerability in WebSphere Application Server Community Edition, which can be exploited by malicious users to disclose potentially sensitive information.
73a4d2430da93004060d2fa089ffa7b2f283dec279dd85e3c62000dba75499c7
Secunia Security Advisory - A vulnerability has been reported in the Blue Coat ProxySG SGOS, which can be exploited by malicious people to conduct cross-site scripting attacks.
6be694b7bbdc1b85f33a400e698306ad4f8e0cf419fccf6db3010c4546518497
Secunia Security Advisory - rPath has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
65e04a03fca40c113d149b94ef2a4dde8e47f64c0a9e008e3ea9a6c312955c06
Secunia Security Advisory - Some vulnerabilities have been reported in Macrovision products, which can be exploited by malicious people to compromise a user's system.
b9824ed01230ea5076b9622f6b9a42dd36be8a31bfed5432d082217363a935a4
Secunia Security Advisory - A weakness has been discovered in iSCSI Enterprise Target, which can be exploited by malicious, local users to disclose sensitive information.
844858bcdc1e318f66e57551165ac67dde90ebc75ddc4820f69b878ffa97e840
SonicWall SSL-VPN NeLaunchCtrl ActiveX control exploit that launches calc.exe.
134dbe6df8ec3651cfcdeb9e2549cfbcae4ae1075078885735f49dd112b8e38d
sBlog version 0.7.3 Beta suffers from a cross site request forgery vulnerability.
220be2de2bc5ac4ffb31d354721707b73cb066cc3c76a1539f79db3569de4bb3
RFDump is a tool to detect RFID-Tags and show their meta information: Tag ID, Tag Type, manufacturer etc. The user data memory of a tag can be displayed and modified using either a Hex or an ASCII editor. Tag contents can be stored and loaded using a specific XML format. This effectively allows the copy of data from one tag to another. In addition, the integrated cookie feature demonstrates how easy it is for a company to abuse RFID technology to spy on their customers. RFDump works with the ACG Multi-Tag Reader or similar card reader hardware. The tags that are supported for reading, writing, and editing are ISO 15693, ISO 14443 A, ISO 14443 B, SR176(1,2), Tag-it®, and I-Code®.
6c1dd729b37b1d6df8067e4fff454dc1b206f04404c2f07dc1fb299e1223a3d6
Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.
80ff50e96d60cef1bd46cfcaad7e4afc7f0b520e53f52cacdbb339c79f9232b3
DM Guestbook versions 0.4.1 and below suffer from multiple local file inclusion vulnerabilities.
88fb48970ff8d32f2deaf64cbcd7382f9e466eeec5012b1220c5ec8a74130378
Scribe versions 0.2 and below suffer from a remote PHP code execution vulnerability.
6db8cab45ce12d872d11e341abc0bc2537842646fb795a8076a4ae3404fd4dd8
WordPress plugin BackUpWordPress versions 0.4.2b and below suffer from a remote file inclusion vulnerability.
f6eddfbdb01165eceb64db2aa2b377649101fb3dd3c44570159cb17f53427e0e
EDraw Flowchart ActiveX control HttpDownloadFile() insecure method exploit that makes use of EDImage.ocx version 2.0.2005.1104.
4da48453b297c469222362d0de55aae6e5a0b8eef77404c4e7c2de85dc461c6d