Geeklog version 2.1.0 suffers from a remote command injection vulnerability.
9862cfda9e37e8491628321364f663ba55f0f6c354b2b080cdc177f023d9abc9
phpwcms version 1.7.9 suffers from a code execution vulnerability.
cd56fa80d63aceb3a22a492c868c6e092fa4610b513cc94b467a08a82adb923a
CodoForum version 3.4 suffers from a cross site scripting vulnerability.
08b398c865df0e4a28a1609ae30f8501dbf54ccaad37e409beaaf451d588213b
Geeklog version 2.1.0 remote command injection exploit.
787ba2b70d8b44c6755f398d14b0ee82b5849a076df078cf40da972729cb0371
4images version 1.7.11 suffers from a code execution vulnerability.
3793a0088de878f1cdc70c69b6eb9f2bb9bce1325703390f91737ebb4854c8f1
4images version 1.7.11 code execution proof of concept exploit.
7eccaedc5b4e1b203a89329c72edcc441608199f3d846dc9b66770c51e572ba2
phpwcms version 1.7.9 suffers from cross site request forgery vulnerabilities.
a6f973066696b3e3532c0de5065f9492e0231780e8842fc6ee52f6c2bbf1ba37
4images version 1.7.11 suffers from a path traversal vulnerability.
c4757c716ab488a177508f9169af87ac53f3ef3126f3cfd083af1e9588a97ad8
Cacti versions 0.8.8f and below suffer from a remote SQL injection vulnerability.
9360ec416bde873ec1d7ef3ca752240e463cf1396011ebe65a86a035905bb4a3
Geeklog version 2.1.0 suffers from a cross site scripting vulnerability.
24d6c11f6838af6a04a17e76fc68f30c3c957ca0a5967139c090b0cd44daf6a9
4images version 1.7.11 suffers from a remote SQL injection vulnerability.
29e49a89ef6936496101fcd56ffc45b506e9814af1222936fc7634b8d76f141f
4images version 1.7.12 suffers from a cross site scripting vulnerability.
e29705c77e725464b6e9ceec32238f33b46902963af3d0422c3583435a6b0654
Core Security Technologies Advisory - The 'application' tag in Microsoft Windows Media Center link files (.mcl extension) can include a 'run' parameter, which indicates the path of a file to be launched when opening the MCL file, or a 'url' parameter, which indicates the URL of a web page to be loaded within the Media Center's embedded web browser. A specially crafted MCL file having said 'url' parameter pointing to the MCL file itself can trick Windows Media Center into rendering the very same MCL file as a local HTML file within the Media Center's embedded web browser.
9799e326c07a7ab71d9ef358d6f4d5e6a701d96b2706e59c7ebca20a69575734
Red Hat Security Advisory 2015-2589-01 - The glibc packages provide the standard C libraries, POSIX thread libraries, standard math libraries, and the Name Server Caching Daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. It was discovered that the nss_files backend for the Name Service Switch in glibc would return incorrect data to applications or corrupt the heap. A local attacker could potentially use this flaw to execute arbitrary code on the system. It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data.
500d94725a7bca027910198d11bcaf63c36b7385c61ae995036c7436f222d112
Red Hat Security Advisory 2015-2587-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel's file system implementation handled rename operations in which the source was inside and the destination was outside of a bind mount. A privileged user inside a container could use this flaw to escape the bind mount and, potentially, escalate their privileges on the system. It was found that the x86 ISA is prone to a denial of service attack inside a virtualized environment in the form of an infinite loop in the microcode due to the way delivering of benign exceptions such as #AC is handled. A privileged user inside a guest could use this flaw to create denial of service conditions on the host kernel.
7c10b5b27343af2c74bf31bd63e001e77554ed3df9654b75aad0b83c56e51efc
LG Nortel ADSL modems with software version 3.04L.02V.sip._LE9500.dspApp3341A2pB022f.d19e suffer from authorization flaws, information disclosure, insecure configuration, and denial of service vulnerabilities.
07c137c52ba038e547265ff65850d81997d590daad3e58b85cea0d0e33cf7bb3