Xforum version 1.4 suffers from a cross site scripting vulnerability.
369d4e98157b594be870bb4bb7f224e70a6437cb6773172294d5794086389519
CentrifugeSystems suffers from a denial of service vulnerability due to a looping condition.
1e88b71b2b0692aecbdde4becb9d1fa4df966e667d4f91c1123938c731b11140
Alpha B Forum suffers from a cross site scripting vulnerability.
b488668fd320aa1dd8756109f85e50fbd9595dd7231919805cba1ebdfda79354
The Joomla Marketplace component version 1.2 suffers from a cross site scripting vulnerability.
f6db5412d22d47a85ef499dda0c2fe1b2af23603be9855c6673912b8b0ccd909
Apple iTunes 8.1.x (daap) remote buffer overflow exploit that binds a shell to port 4444.
2bb5bfe2e71d4174f29903dbbe4432af6a53097f6a819366afce1e705044cd72
HOUTcast server versions 1.9.8/Win32 and below suffer from a cross site request forgery vulnerability.
d89f1a1119498fd3a94609ebd74956456bca2c951a561511d753514dace0c13a
Ubuntu Security Notice 885-1 - It was discovered that the Transmission web interface was vulnerable to cross-site request forgery (CSRF) attacks. If a user were tricked into opening a specially crafted web page in a browser while Transmission was running, an attacker could trigger commands in Transmission. This issue affected Ubuntu 9.04. Dan Rosenberg discovered that Transmission did not properly perform input validation when processing torrent files. If a user were tricked into opening a crafted torrent file, an attacker could overwrite files via directory traversal.
69acb157bcde280488cb2e36985fb02edf668493426e074cb560fc966af289bb
9 bytes small Linux/x86 kill all processes shellcode.
8b97596213814d3d10c729f984f4ec8770dbeb7c3a2d5d920f4d62f56f31198d
ART-VOLGA Gallery version 1.0 suffers from a cross site scripting vulnerability.
74b89ea9a7ee169e94fa7d0313079bdd2b7f1db21d7eb4aa2a23a1ca3249f2df
DocuWiki version 2009-12-25 suffers from directory traversal listing and modification vulnerabilities.
7e857cd3e239a411c25ced4db1f048f7ffa5ef6a4531a1abd4608215175dc1fa
WEBurada Dernek Koy Portali 3000 X suffers from a cross site scripting vulnerability.
0c69bf3a516a8dd0da94f6b6f811770495feaa7e8339d8f58e87af4ad98f7fef
Secunia Security Advisory - Gentoo has issued an update for blender. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.
2e9deb4f9afc18f6c90c6a92e5adcff24ee68e66abbbd137b10610238f78491d
Secunia Security Advisory - A weakness and some vulnerabilities have been reported in Zend Framework, which can be exploited by malicious people to bypass certain security restrictions and conduct script insertion or cross-site scripting attacks.
1232126119e2cdaa319f73ada9f50bd75233777b01e137a49582a8dd77463925
Secunia Security Advisory - Red Hat has issued an update for gcc and gcc4. This fixes a security issue, which can be exploited by malicious, local users to potentially gain escalated privileges.
539a573cf064a5b3e3e25eb3ef6e7fac2fb1ff9a97041491f51e9e7d34f57530
Secunia Security Advisory - Two vulnerabilities have been reported in Google SketchUp, which can be exploited by malicious people to compromise a user's system.
5cbeec5267ef6f54983b58ed2e25926726682cc015468e245d040c616b01dc8b
Secunia Security Advisory - rr has reported a vulnerability in the Direct URL module for xt:Commerce, which can be exploited by malicious people to conduct SQL injection attacks.
2908f2191ba326eb0554724a3214c57c103c12a1f0e5d7cf47af04f9fd7e8b26
Secunia Security Advisory - Fedora has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
672cdec4f1bf5e346aeb843e0302d94230f3e39899c87c6a9686e382735ced48
Secunia Security Advisory - A vulnerability has been reported in the Node Blocks module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.
c765f60078733757a6bca1b8efca628f0c2e09aab694c7d99e3280508659351c
Secunia Security Advisory - Ubuntu has issued an update for network-manager-applet. This fixes some security issues, which can be exploited by malicious, local users to gain knowledge of sensitive information and by malicious people to bypass certain security restrictions.
9f66100dc6bf146f0f0bfbf75170d4e811892855999b761c05c44e1fbe73f7ca
Secunia Security Advisory - Ubuntu has issued an update for OpenSSL. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
025a6fd883c8fbd99bb32e6bc74905463fdd40fea10c409411f6bd70adb3c413
Secunia Security Advisory - A vulnerability has been reported in the Bibliography module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.
5e23fd6bf8954db17706bab68fa29baffe8a2e753391858c2a8c7575f8205272
Secunia Security Advisory - Gentoo has issued an update for net-snmp. This fixes a vulnerability, which can be exploited by malicious people to disclose sensitive information.
5b9d77a05f2be0777c13057be77f6695495aa2bbae010bc1268601f325264580
Secunia Security Advisory - Gentoo has issued an update for squirrelmail. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting, session fixation, and phishing attacks.
fd35f092d21421a1a033d182a2a3ce1bf2db559e54c6e0485c89ad4e85da8b29
Linux kernel versions 2.6.28 and above suffer from an issue where locked fasync file descriptors can be referenced after free.
bf4b36103b7fd4bfc5b3d7bc2a781801086000a705d62c49f239f5091370bb78
Gentoo Linux Security Advisory 201001-9 - An input sanitation flaw in the WEBrick HTTP server included in Ruby might allow remote attackers to inject arbitrary control characters into terminal sessions. Giovanni Pellerano, Alessandro Tanasi and Francesco Ongaro reported that WEBrick does not filter terminal control characters, for instance when handling HTTP logs. Versions less than 1.8.7_p249 are affected.
f50111006fffa62948fd5efaae52f0ed28bc7804c0455af5537768f817e9d1a8