Vibro-CMS suffers from multiple remote SQL injection vulnerabilities.
4d252d15f8df363ccf21c6957a4fc3d583b91ded3c5f72600ac7f2a93274de84
The Joomla Ongumatimesheet20 component version 4 Beta suffers from a remote file inclusion vulnerability.
d8eecbccd17a7ac7ed43f91cb69798a2e1ad9d862e7c073fbb0e84de33777736
The Joomla VirtueMart Google Base component version 1.1 suffers from a remote file inclusion vulnerability.
a52784c7ac97027bde277b05bf45afc9e05e145045dbd58544891fd73cdc7e67
Post Card versions 1.02 and below suffer from a remote SQL injection vulnerability.
89001fd3d2f7dc1df121d870aa8d38871d866fdaa031200b26c796cba036f531
Multi Languages WebShop Online suffers from cross site scripting and remote SQL injection vulnerabilities.
af0a843a330221c4d4380634b88d1f071aef4ed41aba48d0127332366f9ace0c
Core Security Technologies Advisory - Adobe Reader suffers from a stack buffer overflow when parsing specially crafted (invalid) PDF files. The vulnerability is caused due to a boundary error when parsing format strings containing a floating point specifier in the "util.printf()" JavaScript function. Successful exploitation of the vulnerability requires that users open a maliciously crafted PDF file thereby allowing attackers to gain access to vulnerable systems and assume the privileges of a user running Acrobat Reader.
f3487403595695f004405008c40dd41198962fcb84af7a372383ffd0cbe9a177
HP Security Bulletin - A potential security vulnerability has been identified with HP System Management
d3e2d0736b79bb6bf06fc7613185ea70c3f2e39c77c57548bbd3219f0a000e64
Secunia Research has discovered a vulnerability in Adobe Acrobat/Reader, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error when parsing format strings containing a floating point specifier in the "util.printf()" Javascript function and can be exploited to cause a stack-based buffer overflow via a specially crafted PDF. Successful exploitation may allow execution of arbitrary code when viewing a malicious PDF file. Adobe Acrobat / Reader version 8.1.2 is affected.
752ca6b79c83ae98d9fc8b1f8a86737dee9475f446bee614248a21427062b976
Secunia Security Advisory - Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
e7b2f7c39104184884bd8f7368423e29fe89b9aee4b90751bd79f6148da7571d
Secunia Security Advisory - shinnai has discovered a vulnerability in Chilkat Crypt ActiveX Component, which can be exploited by malicious people to compromise a user's system.
0a73a6369c728038f3e4cbd29892f6278ac4215c30c5b75217f5a8c18b280552
Ubuntu Security Notice 660-1 - Ulf Harnhammar discovered multiple stack overflows in enscript's handling of special escape arguments. If a user or automated system were tricked into processing a malicious file with the "-e" option enabled, a remote attacker could execute arbitrary code or cause enscript to crash, possibly leading to a denial of service.
84459423b404f0b444e3aeb8cf1ecd2112972ac04d2ded5ee49b2d4d5fe9c5c0
TBmnetCMS version 1.0 suffers from a local file inclusion vulnerability.
5cb1890e0de24f03283eccb6ea681b0d4b0691322b3b0453862b2fe928b72ad8
iDefense Security Advisory 11.03.08 - Remote exploitation of a heap-based buffer overflow vulnerability in CUPS, as included in various vendors' operating system distributions, could allow an attacker to execute arbitrary code with the privileges of the affected service. iDefense has confirmed the existence of this vulnerability in CUPS version 1.3.7. Previous versions may also be affected.
74289ce1b549d1e7c2ecee94571823651dab5be08dae877ee06a68aafd81cb3f
iDefense Security Advisory 11.03.08 - Remote exploitation of an integer overflow vulnerability in CUPS, as included in various vendors operating system distributions, could allow an attacker to execute arbitrary code with the privileges of the affected service. The vulnerability exists within the WriteProlog() function in the "texttops" application. When calculating the page size used for storing PostScript data, multiple values that are derived from attacker-controlled content are used in a multiplication operation. This calculation can overflow, resulting in an incorrect result for the total page size. This value is then used to allocate a heap buffer that is later filled with attacker controlled content, resulting in a heap buffer overflow. iDefense has confirmed the existence of this vulnerability in CUPS version 1.3.7. Previous versions may also be affected.
4b48360e997204c4042d31ac8dfb6672aba83c8ea1c7480c62bc5c82e1b3afce
Jet CMS suffers from a database disclosure vulnerability.
f45d30972c6dfdc0e0d8cf15989569bc92ffa1fdf4e10ba70c437cd8c3d5da56
The sniffy project can trace/log the data of any pseudo terminal in the system. Due to the way the terminal works, such a terminal trace provides complete information of what happened on the terminal screen, and sniffy is able to display/replay this information. It consists of a kernel module able to connect/hook on the pseudo terminal, a program to display the contents of any pseudo terminal on the fly, a daemon process tracing the pseudo terminal content into the file, and a replay program to replay any stored pseudo terminal session.
690392cbd14e5cf80472524f7dd7b417a2655b94209dbf746d054c0351cb5892
Whitepaper entitled Internet Banking Flaws In India.
5403ce64147576e2b9225daa755cef18daa6b1ff8d992b74520e6ce3ce3df920
Agavi versions 1.0.0 Beta 5 and below suffer from a directory traversal vulnerability.
f94a970b9bbb5bdc2b10262340f879ac6a00f4778368f91d7ce16b462876a61f
MatPo Link version 1.2b suffers from blind SQL injection and cross site scripting vulnerabilities.
311f9b2e22b894ab5f76ae045fd5531e513935a53c914ca5d5e442bbada005d8
Acc PHP eMail version 1.1 suffers from an insecure cooking handling vulnerability.
1df3bc475bf61d7fd7564f750cf61bba0ae5b846e691839fa5244bdc7d74a376
Acc Statistics version 1.1 suffers from an insecure cookie handling vulnerability.
2c0aac7af3c716833382997955d7b1540259c1700beaf8d387c9c8137a298312
Acc Real Estate version 4.0 suffers from an insecure cookie handling vulnerability.
835c8460c2e39b9a59acb4d59339ecc5110b4300f40ff5ce0e556e4b1d80fba1
Acc Autos versions 4.0 suffers from an insecure cookie handling vulnerability.
b5890cbecfb929e2f921eac61d62519249305b1f70303214156c09cff818d207
Gentoo Linux Security Advisory GLSA 200811-01 - Multiple vulnerabilities have been discovered in Opera, allowing for the execution of arbitrary code. Versions below 9.62 are affected.
69366487c861219d68774e6e8acd19eb40c68413250d4eefcb89feaf391348ed
pppBlog versions 0.3.11 and below suffer from a file disclosure vulnerability in randompic.php.
f7dfbca45a7b97c69ba21e45a49a66dfb72f80779962746cec7f7f659b3d6a4d