Guppy versions less than 4.5.6a suffer from a directory traversal flaw.
0c4d9e03b254b7559762e6468588ce209b31b09e1710113e432ea53258356eb2
There is a high risk vulnerability in Guppy versions 4.5.11 and below that will allow remote attackers to destroy database files. Details provided.
a56334d59160722210ec923946ac49e919e81d4c1acbc090031cf3742db3b438
Guppy versions 4.5.9 and below suffer from remote code execution and arbitrary inclusion flaws. Full exploit provided.
968ffef02bac67138cf981ec650bc3a7d33b94c0c0c8eb860f158874ad6f9ca9
GuppY versions 2.4p3 and below are susceptible to cross site scripting attacks and have a lack of authentication when various data submissions are performed.
638ddd4acfb1768d65554ad49dc68964fd98689e44a4646b73d7ba18355e680b