MyPic Image Gallery suffers from a local file inclusion vulnerability.
640399046421e3e491304061d4a9275eb2c7cb2232523580b84923ecbcad5135
Shutter version 0.1.1 suffers from multiple remote SQL injection vulnerabilities.
d1c8f04af840afb0e596262590901051b0324521a85a9e2d0a28d6e387232f0d
Tuenti suffers from cross site scripting vulnerabilities.
4e8fe0c2d837defa39114a0594f6c599ae12850797cebb8f0e81ff82fe8287fc
Rule Set Based Access Control (RSBAC) is an open source security extension for current Linux kernels. It is based on the Generalized Framework for Access Control (GFAC) and provides a flexible system of access control implemented with the help of a kernel patch. All security relevant system calls are extended by security enforcement code. This code calls the central decision component, which in turn calls all active decision modules and generates a combined decision. This decision is then enforced by the system call extensions. This version is for the 2.6 kernel. This release is for Linux kernel 2.6.29.2. A significant speedup and even better SMP scalability are expected from the new RCU based list locking. The most important changes since 1.3.5 are the addition of VUM (Virtual User Management) support, OTP support for UM, support of ANY for NETLINK control, checking of CLOSE requests in RC, the addition of SCD target videomem and kernel attribute pagenr, ext4 secure delete support, and many small bugfixes too. Generic lists were changed to use RCU instead of rw spinlocks.
66dcad3c234b65559696456d38149a04cd02c28cda5102eec00809e82d17d428
The Joomla ArtForms component version 2.1b7 suffers from remote file inclusion vulnerabilities.
23cbc2f11bd463cc34a235d99eecb976da177ad7f7d3f3665a590fee8c0edd51
A remotely exploitable vulnerability has been found in the HTTP header parsing code of the CFNetwork framework.
3cd844ab4b16ffea30d4bf56950667b6ccf6b6b2a12354c933cb59ebebbbebe9
Remote command execution exploit for eleven products from Harland Scripts.It performs authentication bypass and php code injection.
d1140d12b0338d7071589dd5f62ebf69e5f7c88b02a74d628c1561586acb7559
iDefense Security Advisory 05.14.09 -Local exploitation of an index validation vulnerability in Apple Inc.'s Mac OS X xnu kernel could allow an attacker to execute arbitrary code in the security context of the kernel. The Mac OS X xnu (Mach) kernel implements workqueues. This allows the kernel to schedule events to take place in a task. An input validation error exists within this implementation, which can lead to execution of arbitrary code in the kernel. Apple Inc.'s Mac OS X 10.5.2 and earlier is considered vulnerable to this issue.
ed4e7b2fc134914f7bdc9f1008e2d35746dfd1067a45e9a131b5af02148a1720
Remote denial of service exploit for Eggdrop and Windrop version 1.6.19.
60f8840bfb8084e43a27ff950e9d4205d92a140f20771733ef0eaf1f5f59484f
This is a local root exploit for the Linux 2.6.29 ptrace_attach() race condition that allows a process to gain elevated privileges under certain conditions.
db9565192db3ee04f85227cfe9fa0b007cf4b055bb2747ed491261b3a6efd308
Audioactive Player version 1.93b local buffer overflow exploit that creates a malicious .m3u file.
b7c75834188a626427ee7dbbfcb54f802ca4417ab27445a9db57b06fcc29150c
Rama CMS versions 0.9.8 and below suffer from a file disclosure vulnerability in download.php.
de91e17a74542ab2089dca37e08c816a9bc083c1756335444eb3e57b5ee1ead1
StrawBerry version 1.1.1 local file inclusion and remote command execution exploit.
3eedb539474d00b7bb96788c419e57a7f851d345f38f92befea1840592d15da6
beLive version 0.2.3 suffers from a local file inclusion vulnerability in arch.php.
bc31af3bdafb91c6bd39bccd1e14886c65d99c1a3d1850cd1a7fe4f1d6eca1e2
Secunia Security Advisory - A vulnerability has been reported in Xerox WorkCentre, which can be exploited by malicious people to compromise a vulnerable system.
47a5de8ad1907d4fa67bd28036fe7db0f330de384cdecfbd1278bbf77b7cf023
Secunia Security Advisory - A vulnerability has been reported in vbDrupal, which can be exploited by malicious users to conduct script insertion attacks.
6c7eec10f56b2183a4220621ce27a96d3e3be142e58205ad86fc14ea55062656
Secunia Security Advisory - A vulnerability has been reported in HP Data Protector, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially to gain escalated privileges.
db87b47495719a435ac2b1f0a5a3921e7aab75d64a44257829cbd1a0cf37f3b2
Secunia Security Advisory - Red Hat has issued an update for poppler. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise an application using the library.
69e02072a87221a93a7fa35532daaae99f4acecaecec48c935e9d9cd5990a79d
Secunia Security Advisory - Red Hat has issued an update for acroread. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise a user's system.
21ad74c3b71babb93fdb01f8205d734525ed7a7aba28e5b185fd9d2110b267c6
Secunia Security Advisory - Sun has acknowledged some vulnerabilities in Thunderbird included in Solaris, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, conduct cross-site scripting attacks, or potentially compromise a user's system.
2d0a25b3a83351ce0abf679fa25a8a5c57b27754bce8a40683981007d347b8cb
Secunia Security Advisory - Red Hat has issued an update for perl-DBD-Pg. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
9a26988850c8fe4f1ab1d28d7d54a7513b81bf7c203a00000f5e58056355fba1
Secunia Security Advisory - Some vulnerabilities have been reported in copSSH, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service).
f25d55d14d403a61f290d27bcfce55c17ffd057944d68b08fe4dd8791182a6ec
Secunia Security Advisory - A vulnerability has been reported in Drupal, which can be exploited by malicious users to conduct script insertion attacks.
d6444ac0674a92d643b5a7011996f2d9c450af62db7a3708515e7868ae8a638a
Secunia Security Advisory - Some vulnerabilities have been reported in cwRsync, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service).
ffc21e3655b83ded2e94253a69fa6a22ee62c20aeed0a3d8453cec6af4b19064
Secunia Security Advisory - Some vulnerabilities have been discovered in Family Connections, which can be exploited by malicious users and malicious people to conduct SQL injection attacks.
8010bbbb1b67a42448af890bc70991a9f6d86901d2c9b30e3f0db497e1e6bb53