TopperMod version 1.0 suffers from a local file inclusion vulnerability.
50ab34e0f966f18f0de8b6f2d16575fef86497338f08ee989e311fd337861c14
TopperMod version 2.0 suffers from a remote SQL injection vulnerability.
4447ba6f9fa6b1701f4efb29ee316315e83b39a003061d622de00e5aeeedbf8b
PacketTrap Networks pt360 version 2.0.39 TFTPD remote denial of service exploit.
1d5e31bb3ab9232256d0c7e623888840055c80f3d02ab0d300875e0a291d9905
Aztech ADSL2/2+ version 3.7.0 suffers from a remote code execution vulnerability.
b24c6b45550cda14d9b4142983253526203f757ab6d00bbb115623dbaa9c31dc
Secunia Security Advisory - Secunia Research has discovered a vulnerability in Orb, which can be exploited by malicious people to compromise a user's system.
31cc9747948c76de3a43b53265c45eea8e5c9bcb938877d4c17edcfa64af6509
Secunia Security Advisory - Pranav Joshi has reported a security issue in ZyXEL ZyWALL 1050, which can be exploited by malicious people to bypass certain security restrictions.
0277bf29174ca3e0015e8bbffb4e2a274e1d2b849aaa2a16a2083574cb4232e9
Secunia Security Advisory - Ubuntu has issued an update for libicu. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.
3a4d59e374bddfdeb1d3be88f0fb718fa87339d5ca7353b74501ce3aef9eeb3e
Secunia Security Advisory - Mandriva has issued an update for bzip2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
ed16715e95323ac01fb889578f6d76bafd3b42ebd8ef4e2837acdddf0cd5cfad
Secunia Security Advisory - c0ndemned has reported a vulnerability in XLPortal, which can be exploited by malicious people to conduct SQL injection attacks.
d9a04e7858615d46e05c99c474b5c2d3a035bc87f9bec615fd7d889265b01848
Secunia Security Advisory - Russ McRee has reported a vulnerability in Photo Cart, which can be exploited by malicious people to conduct cross-site scripting attacks.
8ad8d421483b8561ab9e8200cb971514a4dd70cfe396c937558fb0a7117667b1
Secunia Security Advisory - Jerome Athias has discovered a vulnerability in the my_gallery plugin for e107, which can be exploited by malicious people to disclose sensitive information.
7af64c9a35da86dd67b2ca3d3708ec2465563126c05fad2b3cc3645da01c62a4
Secunia Security Advisory - Debian has issued an update for serendipity. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and script-insertion attacks or to bypass certain security restrictions.
cfc7b7c423a33f1af3a62dcc4db1f85d42ab0e30f5aec5c0ce46a5e9d2eaf285
Secunia Security Advisory - Ubuntu has issued an update for bzip2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
b13bc8ceb2566e29739240c286a4fe1a77b475e5be116a7f38539387a3f64cbd
Secunia Security Advisory - Gentoo has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).
90594d06389309924653b5e7d68c41483677cbd0fd1dc87829fd17e6d715c31e
Secunia Security Advisory - S@BUN has reported a vulnerability in the RunCMS Photo module, which can be exploited by malicious people to conduct SQL injection attacks.
13b5c27e7d1f08aac51b0ea92187c41f8a5a494b6819064579c69308a268b112
Secunia Security Advisory - Gentoo has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), or potentially compromise a vulnerable system.
72ea2d79f992b380845c6155e72dfbff3f943dda32790c69060e8c1a20fb0493
Secunia Security Advisory - A vulnerability with an unknown impact has been reported in IBM AIX.
e0653f263f863c56d0901919d4706185a53ffa0cbcfca94da633091587216025
Secunia Security Advisory - Yogesh Kulkarni has reported a vulnerability in ManageEngine EventLog Analyzer, which can be exploited by malicious people to conduct cross-site scripting attacks.
a63ef3efed57b43be19acedb3eee2cdf4c0e0ce989c0169ab78b862bc7b0b453
Secunia Security Advisory - Digital Security Research Group have discovered some vulnerabilities in BolinOS, which can be exploited by malicious people to conduct cross-site scripting attacks and to disclose sensitive information.
9a11635b5003c06aa1f5cdbe1498b70323c0acab9edd7263aec20102569a8b50
The GNU Privacy Guard (GnuPG) is GNU's tool for secure communication and data storage. It is a complete and free replacement of PGP and can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440.
0459649c1736afa45d4d3c92228ce6e450f9a7bd89e194b29cd902b7d7ea17ff
Secunia Security Advisory - A vulnerability has been reported in Red Hat Directory Server, which can be exploited by malicious, local users to gain escalated privileges.
5a0cca6b379791a65f96e66aaa834e031f5d4c435e97ece1e0c4eb90bac0c419
The phpBB module PJIRC suffers from a local file inclusion vulnerability.
1c43c5c54c976091085da8e4d428abdd0ee77e14f03b67c9451042fc8fc64ef5
Core Security Technologies Advisory - Secure Internet Life Conferencing (SILC) server versions 1.1.1 and below and client versions 1.1.3 and below suffer from a pkcs_decode related buffer overflow vulnerability.
13d7d0d17addaf321c63a9614a85b341247fb82af78b25ce1baeaf99a82b0164
NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.
b337955d1326142f90f54224ca73538e71f5c32541e09de22ef205a9008c7795
BolinOS version 4.6.1 suffers from local file inclusion, cross site scripting, and information disclosure vulnerabilities.
fe2e3c122dc4548fbd36d67e1716906a79ec410b7e3d1a6d1ccf55733557fda5