Secunia Security Advisory - A vulnerability has been reported in MoinMoin, which can be exploited by malicious people to conduct cross-site scripting attacks.
dbb06e9024e1f41431d9abae553472458a255bed70ccd37244357a0807e68519
ZDaemon version 1.08.07 denial of service exploit that makes use of a NULL pointer vulnerability.
0f8294656f1e073963160a8bf2da99c31164a4e9e43b013be3a611e0b2e1e6ee
ZDaemon version 1.08.07 suffers from a NULL pointer vulnerability that allows for a denial of service.
c56fd29ffc88a1846b94470ef624d4f2b241b724b8c7103d687b205a76d49920
Gentoo Linux Security Advisory GLSA 200807-12 - bannedit reported a boundary error when handling overly long IRC MODE messages (CVE-2007-4584). Nico Golde reported an insecure creation of a temporary file within the e_hostname() function (CVE-2007-5839). Versions less than or equal to 1.1-r4 are affected.
0eec759a1cfe1ca98fb4f80bef0651e9b8f23d8a49b28cf1bb0ba2f2c55c67bc
Debian Security Advisory 1612-1 - Several vulnerabilities have been discovered in the interpreter for the Ruby language, which may lead to denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:
5d24e424dbd94fef53e920a1e92c911678b0e91c226816b1b3a20d3e7c1593b9
Interact E-Learning System version 2.4.1 suffers from a local file inclusion vulnerability in help/help.php.
7003f34ab97d514a0fe8f635ebc4a2cc7142e9d616351bb1d5eceb47f8d7378f
EMC Dantz Retrospect 7 backup Client 7.5.116 suffers from a NULL pointer reference denial of service vulnerability.
73ccf4c76e1adeb5afc15a423e0bc3ad6b3d06e97d2e9f7018ef2e4e95211f77
EMC Dantz Retrospect 7 backup Client 7.5.116 suffers from a plaintext password hash disclosure vulnerability.
c2bb2ecbd153d0f29359874bdad8708b8121a9c370532cece33c3cd2d884ba99
Abusing HTML 5 Structured Client-Side Storage - A whitepaper analyzing security implications of this technology and how showing how different attacks can be conducted.
c64f46f0dee1cc8afaeb831f82685547bbb69798c0794383672564b16c1fe348
Secunia Security Advisory - Luigi Auriemma has reported some vulnerabilities in SWAT 4, which can be exploited by malicious people to cause a DoS (Denial of Service).
6869954cb3943d46dd3bf1c8ee337962c942d67bfac6960dd9d83742e8f44512
Secunia Security Advisory - SUSE has issued an update for multiple packages. This fixes some security issues and some vulnerabilities, which can be exploited by malicious people to manipulate certain data, bypass certain security restrictions, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.
c17133be06f6a3879d98592e2b6aeca002062135cb4230768a4bda90e16957b4
Secunia Security Advisory - Jesus Olmos Gonzalez has discovered a vulnerability in Filesys::SmbClientParser, which can be exploited by malicious people to compromise an application using the module.
b94dbcf4879de9dcc6e1a95d0219b8fbf35b6c808437463385d653c623364c8a
MojoAuto remote blind SQL injection exploit that leverages mojoAuto.cgi.
89fbfa456056a21b74e09b8918c2f4b4019184b61dd495ab93dc3a1021e388b3
MojoJobs remote blind SQL injection exploit that leverages mojoJobs.cgi.
6714a20a18dc7237b2be6e27e6a193746833b1eae9efab048e503b3401675fc4
MojoPersonals remote blind SQL injection exploit that leverages mojoClassified.cgi.
5f1603f3549ae8e16db01cf6f283062990f4261a297445ffb2a934ea69613cca
MojoClassifieds version 2.0 remote blind SQL injection exploit.
000f29537c75f24938062db039a3dfd903432cfd563b71af04604530d45101f7
Gentoo Linux Security Advisory GLSA 200807-11 - Nico Golde reported a boundary error in the HTTP::getAuthUserPass() function when processing overly long HTTP Basic authentication requests. Versions less than 0.1218-r1 are affected.
8607f75a06fab3821da2621d52f653fbebd1b4174ff7239dbe405544c9b077e8
Gentoo Linux Security Advisory GLSA 200807-10 - Matthijs Kooijman reported that the make_catalog_backup script uses the MySQL password as a command line argument when invoking other programs. Versions less than 2.4.1 are affected.
1ce872641186558f30df9e781a28be8a87679e2cfc7a6192ecc8be09ba5d01b0
Flip version 3.0 Final suffers from a remote file inclusion vulnerability.
2d8153329b9449a20345561220be90b8af9faffd82cde1d053870dd8e3f2e20d
Arctic Issue Tracker version 2.0.0 remote SQL injection exploit that leverages index.php.
ae4b9d90549eb8dda513c2f1982ac7c92d173e1651a89ef51a0850cf1dc6f778
EZWebAlbum suffers from a remote file disclosure vulnerability.
081640ba7602be156e088c197157995ee7aa643257d38bb76bfef52e128b5644
hifriend.pl from Hibyte Software remote header injection exploit.
7c0b473aaa795399a43d6e49fd976e10b8dbbfdfbe765865e2a1c172afc1fc11
The MyReview web application versions 1.9.9 and below and 2.0 Beta suffer from a mishandling of submissions allowing for unintended downloads of said data.
ffac269563255108a5c20a3679275754ac2fb6dfa1ba5fd7676e275428565cc4
Maran PHP Blog suffers from a cross site scripting vulnerability.
786aa8c54f7146a625c948f71905c8d86ae91f97230d90d71a55faada3849a96
HRS Multi blind SQL injection exploit that makes use of picture_pic_bv.asp.
231fdb53dc20fa677d408d1462f657e176bed56608d4397131918a459c4458fc