The Joomla Oprykningspoint Mc component suffers from a cross site scripting vulnerability.
97dc6ec18ee237f5be0a2420e2cd1e15dc6ec6a6c5caeb3e7f1ad6fcc9056353
The Joomla Trabalhe Conosco component suffers from cross site scripting vulnerabilities.
e98be22875acff7f1d7fae9c315542bcf3d2f9741515840c926d81383e6f53e9
The Mambo Material Suche component version 1.0 suffers from a remote SQL injection vulnerability.
7727c93f98ee17798daec9c2c7610f489592938eb6d0bf718934c3eca9323775
Koobi Pro version 6.1 Gallery suffers from a remote SQL injection vulnerability.
8eca024bd68b164b254cb8ad9587cad1f1345cc8392ec2e37ca2f8713ec2f31c
Secunia Security Advisory - A security issue has been reported in Futility Forum, which can be exploited by malicious people to disclose sensitive information.
c26b121907471a49e0123701db9c60b014af10ea84159f6371dc1d857f5d394f
Secunia Security Advisory - Debian has issued an update for libtool. This fixes a security issue, which can be exploited by malicious, local users to potentially gain escalated privileges.
c25fcf2c49911da7f4f83bef12b0b248818b2995b1af5fe72d34aaec643a39b9
Secunia Security Advisory - Fedora has issued an update for libtool. This fixes a security issue, which can be exploited by malicious, local users to potentially gain escalated privileges.
776fe2f3ab88aa3a3fda704dc8ebbac18255fdb2eec4fd39688f3972ebc7ae0c
Secunia Security Advisory - A security issue has been reported in GNU GCC, which can be exploited by malicious, local users to potentially gain escalated privileges.
73f739420af41a2b0b5a8fdb37dbdce4f2c5a8f14a46c1e9f0af59c2844c1707
Secunia Security Advisory - F5 has acknowledged a vulnerability in BIG-IP, which can be exploited by malicious people to poison the DNS cache.
fd7b8adc4d7409c85009a25e45f815854b6cf2273c73aac7aafb297f3233fa32
Secunia Security Advisory - Reno has reported a vulnerability in VideoIsland, which can be exploited by malicious users to compromise a vulnerable system.
e08b4ec15bc552ae4e4818972163e0ec465c3ecacca5896c3c611c5726f7dd80
Secunia Security Advisory - Some vulnerabilities have been reported in phpAuction, which can be exploited by malicious people to conduct cross-site scripting attacks.
9f18c60b1ffdab93e9cf644281500fc1437900dcd5ca055c0132e0329c11b403
Secunia Security Advisory - kaMtiEz has reported a vulnerability in Helpdesk Pilot, which can be exploited by malicious people to conduct SQL injection attacks.
b95c5e5d16ca9d170ec00f9e33f34e0533fa7242328a55e53871ca2c7cc3e15a
Secunia Security Advisory - Fedora has issued an update for gcc. This fixes a security issue, which can be exploited by malicious, local users to potentially gain escalated privileges.
207af6fce747495b7fa2fd59bc6a396d16ed97f41c3c1ce171f17557a339886d
Secunia Security Advisory - A security issue has been reported in Esinti Web Design Gold Defter, which can be exploited by malicious people to disclose sensitive information.
be47f769512d82d0ffa95c82af3018dd1d6bc19432602980aad0e66d1cb23ffe
Secunia Security Advisory - A vulnerability has been reported in Kerberos, which can be exploited by malicious people to cause a DoS (Denial of Service).
1e8070b0b9a56cd7337ca485f972282200ae1237eef2ddc3d799e3856471adc1
Secunia Security Advisory - A security issue has been discovered in MySimpleFileUploader, which can be exploited by malicious people to compromise a vulnerable system.
c5c0456aa31f687191af05ba56bdd15342b3903b9d13b4f05eec0dbedaa66375
Secunia Security Advisory - Debian has issued an update for aria2. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system.
49bb030b544d11e626a0cc2d2a49c901884b9a0bae9d5242aadbb2e8153e4c26
Mandriva Linux Security Advisory 2009-343 - acpid 1.0.4 sets an unrestrictive umask, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file or cause a denial of service by overwriting this file, a different vulnerability than CVE-2009-4033. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. This update provides a solution to this vulnerability.
b1215e6ab52d75da4694d69dadceae2b64e8d4b651241fbee6e83553f80b1522
Hostmap is a free, automatic, hostnames and virtual hosts discovery tool written in Ruby and licensed under GNU General Public License version 3 (GPLv3). It's goal is to enumerate all hostnames and configured virtual hosts on an IP address. The primary users of hostmap are professionals performing vulnerability assessments and penetration tests.
7da22a6ec5e9ca28274d9a82de70b16f427237100662b9d47ac103d163196d74
phpPowerCards version 2.0 suffers from a cross site scripting vulnerability.
8bdf6007b14193697e7ead7d5ef6b3086789ed5c61892c36281d1632eb5f250c
Info Fisier version 1.0 suffers from a remote shell upload vulnerability.
e5bf194eadfe2cb501f26a9b0ef10426d64915840f391ae0be7b1d2168143c7e
WebRing suffers from a cross site scripting vulnerability.
de80bd285e42b000062334f873313ab59b1f88c616975d77fdcc928924ffb22d
paFileDB version 3.1 suffers from a cross site scripting vulnerability.
359b4db912c8c82f43e41cb1f9b673be659b9749eccb52c2b8d33fffa5651a85
Mandriva Linux Security Advisory 2009-342 - A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to the open function with insufficient arguments, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file, cause a denial of service by overwriting this file, or gain privileges by executing this file. acpid 1.0.4 sets an unrestrictive umask, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file or cause a denial of service by overwriting this file, a different vulnerability than CVE-2009-4033. This update provides a solution to these vulnerabilities.
76a6ed6900feef5a8282ae8df01876ad21e3d86a9ebc0b72841ab57027dbebd7
Mandriva Linux Security Advisory 2009-341 - Multiple untrusted search path vulnerabilities in dstat before 0.7.0 allow local users to gain privileges via a Trojan horse Python module in (1) the current working directory or (2) a certain subdirectory of the current working directory. This update provides a solution to these vulnerabilities.
c7d601c0b385dee4f628e53dbf3b2c25c6d716ab9e0c2200166d63493ea4ea8f