FCMS versions 2.7.2 and below suffer from multiple cross site request forgery vulnerabilities.
09afb1bfca46b03a639f6d879a92455fc64819f72f67724e6c3a57992651ccb7
Xoops version 2.5.4 suffers from a remote blind SQL injection vulnerability.
2b179a5b592970daa6c84cd35f7b2c76a1fa845165abf65d270f5d19cbea058e
Digital Scribe version 1.5 suffers from a cross site request forgery vulnerability.
d89220e612658209a0a53bf2f07815e4783ae69c51cc994725f7bf68d71fc8c9
Pixie version 1.04 suffers from a blog post cross site request forgery vulnerability.
51e68d1acd27d0ec24b2a7bc2def683ca87f6f06cb2075fc170ea91ce0b7e7eb
The D-Link DSL-500T ADSL router suffers from cross site request forgery, brute force and predictable resource location vulnerabilities.
e1197c8518b708baebfcc89aaa6623dcba5d96a385f0f97bae7e527c4ce530bc
2B.COM sprl suffers from a remote SQL injection vulnerability.
7c7d483a891e647b0933ba514aa6478bf11df06521a5fa3a5c37fd900ec9796e
The search engine at search.babylon.com suffers from a reflective cross site scripting vulnerability.
a058da3322355dea54968eb6a909522538f6f19ddac9df9320726a42c32c2df3
Whitepaper called Anti-Virus Evasion Techniques. Some of the techniques discussed are binding and splitting, converting exe to executable client side scripts, and performing code obfuscation/morphing.
a67e9dfc2edc6ef44c9c82a4132902d3b4329e23e0b4c682cc1ef2191fb41ee3
WordPress UPM-POLLS plugin version 1.0.4 suffers from a remote blind SQL injection vulnerability.
98921f30cbd1957f41300ca9134e7e6e2f77a9de7141c68ac2698d31cd442e95
The Google reCAPTCHA WordPress plugin suffers from a cross site scripting vulnerability.
92d795ae233b50ca42875a19a0458ace0fefe494afb9c7fc317c8f989b2c94af
Mandriva Linux Security Advisory 2011-183 - When receiving various stanzas related to voice and video chat, the XMPP protocol plugin failed to ensure that the incoming message contained all required fields, and would crash if certain fields were missing. When receiving various messages related to requesting or receiving authorization for adding a buddy to a buddy list, the oscar protocol plugin failed to validate that a piece of text was UTF-8. In some cases invalid UTF-8 data would lead to a crash. When receiving various incoming messages, the SILC protocol plugin failed to validate that a piece of text was UTF-8. In some cases invalid UTF-8 data would lead to a crash. This update provides pidgin 2.10.1, which is not vulnerable to these issues.
2d414ceea15e43838e4951396fac9e14dee36394f9b458f9c9cc1ccd87f5eee1
Secunia Security Advisory - Red Hat has issued an update for libxml2. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.
66677af889661d71030c3ca6cdf82eaed12905cd4371ee743910d9d2b7337ba4
Secunia Security Advisory - A vulnerability has been reported in Adobe Reader and Adobe Acrobat, which can be exploited by malicious people to compromise a user's system.
25da7e7b9ee9ca14278785722a672514eaf87c6b26cbab853b47dd73f014550c
Secunia Security Advisory - A weakness has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions.
5153ba11b23d3a5ad383fa6bd72437e5707f03cf1af73bb99607079cdfaab0bf
Secunia Security Advisory - A vulnerability has been discovered in the Pretty Link plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.
24575c0599a4c1df8605a65067894f8421eb7b42f62c162813ba1b1417dc05e9
Secunia Security Advisory - A vulnerability has been reported in Kerberos, which can be exploited by malicious users to cause a DoS (Denial of Service).
e71c60e58b839feab87fdfeb66d02c093970782e50ff62662dc687cc449da8ce
Secunia Security Advisory - Red Hat has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system.
626eaf01381433a87a91e0e1e94dd7d951dfdc5f7da578b867ab137c8a6959b4
Secunia Security Advisory - Red Hat has issued an update for krb5. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service).
db81b30723298cee27f071617c154bae80ac7962e5c8fbda1dcff48d8f240343