CPA Lead Script suffers from a remote SQL injection vulnerability.
44e46a1de51f3b6f1c4def0a11e1d4a9b8eee356140624f63d6dba939860b954
Wustl.edu (Washington University) suffers from a cross site scripting vulnerability.
a0c2c2b1cb61bdd20db638b3525729b8f1ea7f9ea4a28d1940c1f494a7acebc1
phpGroupWare versions 0.9.16.015 and below suffer from local file inclusion and remote SQL injection vulnerabilities.
ee41970c8feb6af1be1d6a7b70de5c9162deaf02d92bd776ad2298ca2889355a
Secunia Security Advisory - Two vulnerabilities have been reported in PostgreSQL, which can be exploited by malicious users to bypass certain security restrictions and compromise a vulnerable system.
93b8371f89423e0ce8fdc0f5d8e6ce954e73f4ed757db40e9cdd56a0687bd898
Secunia Security Advisory - Debian has issued an update for aria2. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.
965eb9ee5fccdbdd7155b6913a3e53aebe95dbd7cd528c60db40bac1f39b895b
Secunia Security Advisory - A vulnerability has been reported in multiple Hitachi products, which can be exploited by malicious people to compromise a user's system.
2d29d463cc4fcc25c00c10d7fbe561b5ade0c87ead494d9a01b7d96f744e6fdc
Secunia Security Advisory - A vulnerability has been reported in multiple Hitachi products, which can be exploited by malicious people to compromise a user's system.
c0eae847c6c1cca7aa2429a0e9ca1e80f0788d3ee0ba0ee1eae840c1987cde30
Secunia Security Advisory - mr_me has discovered some vulnerabilities in Magtrb MyNews, which can be exploited by malicious people to conduct SQL injection attacks, cross-site scripting attacks, and disclose sensitive information.
a712836cb7220c2a6359a6adeb670f7ab2e9ef4b67a750a8fcec8c6cc28c465b
Secunia Security Advisory - A vulnerability has been reported in SpringSource tc Server, which can be exploited by malicious, local users to bypass certain security restrictions.
cf64b8f383b61ae8b81486561c0bab00916f3fcce01ec2e1c35346caa9a7d200
Secunia Security Advisory - Jeromie Jackson has reported a vulnerability in Palo Alto Networks PAN-OS, which can be exploited by malicious people to conduct script insertion attacks.
a7deb5183bf145ae25a26bb3c91f602bdaa39edd83622c32c4697eda36836f7d
Secunia Security Advisory - Some vulnerabilities have been reported in HP Performance Manager, which can be exploited by malicious users to disclose sensitive information or to manipulate certain data and by malicious people to disclose sensitive information, manipulate certain data, or cause a DoS (Denial of Service).
32cd1d0c113b0f50d99776c080dd286d4615a7390c02ecedeb94e53baef04329
Secunia Security Advisory - HP has acknowledged a vulnerability in HP System Management
821e2e6418e9e59d1b22e6f5b95665b77dafb966128e434ca6d5f23a77001ee9
Secunia Security Advisory - A vulnerability has been discovered in JE CMS, which can be exploited by malicious people to conduct SQL injection attacks.
54b761058cc696ad0b08c20757c1598ab9880c9d649f2d06459cadad99c9fd8d
Secunia Security Advisory - ITSecTeam has discovered some security issues in CompactCMS, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system.
f20461cf9036555283196b8397555db9f9c0610904150487c68dd466ea82c343
Secunia Security Advisory - A weakness has been discovered in LFTP, which can be exploited by malicious people to bypass certain security features.
68593136f2b6176e96d3f2a3c2abb26877b97b948ec3ecdc8b4b59fbdc02b169
Secunia Security Advisory - byEGE has reported a vulnerability in WebLOADER, which can be exploited by malicious people to conduct SQL injection attacks.
88db0cf1c117752c1e4d98c354b6a673679e5ea3829b2c925ddaceb2191cb567
Secunia Security Advisory - A vulnerability has been reported in Invision Power Board (IP.Board), which can be exploited by malicious people to conduct script insertion attacks.
e498e6a04ea79a0ae24b1a41399b64ca91c3a5fb5b104520e35aafa225247382
Secunia Security Advisory - Paul Szabo has reported some security issues in Mathematica, which can be exploited by malicious, local users to potentially gain escalated privileges.
985d5fab93d8b359dba3001824358ab70c0db3c677cd22fe091f180371e6ba17
Secunia Security Advisory - Fedora has issued an update for quake3. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and potentially compromise a user's system.
041b9147e1bf0c4b2429fbff1edd37c8ff42873649c99a7b56a36d1f40801541
Secunia Security Advisory - A vulnerability has been reported in Interstage Application Server, which potentially can be exploited by malicious people to disclose sensitive information or manipulate certain data.
d2adf5d143f9b5683fc15983f7f3955799560b33404af192e8249d807444038b
Secunia Security Advisory - A vulnerability has been discovered in the JE Quotation Form component for Joomla, which can be exploited by malicious people to disclose potentially sensitive information.
6775aa17a36c34ece523d6ef2a379327456adce70e9f51977f50e7c930687943
Secunia Security Advisory - Valentin Hoebel has reported two vulnerabilities in the JE Job component for Joomla, which can be exploited by malicious people to disclose potentially sensitive information and conduct SQL injection attacks.
6a93a5168fae1e0b20b7b5344302f7fc43bedff85ecca6cb9197f983f4cd579c
Secunia Security Advisory - Fedora has issued an update for qt. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, and potentially compromise a user's system.
56af30f68f47604e4f7c211a1c1d7857b2c5a46d54dac69a736701f9094018ff
Secunia Security Advisory - Valentin Hoebel has reported a vulnerability in the JE Ajax Event Calendar component for Joomla, which can be exploited by malicious people to disclose potentially sensitive information.
37e33f860b81cfbaaf1670026a57ab5c3160f53e31815ffec8f05db44de8a553
Secunia Security Advisory - A vulnerability has been reported in CapsSuite Small Edition PatchMeister, which can be exploited by malicious people to cause a DoS (Denial of Service).
e1355abb4bb90e33cd5069ba380848d5de82314039fe5761e639350b6d1af08e