phpTrafficA versions 1.4.3 and below suffer from an administrative bypass vulnerability via cookie manipulation.
d83f507525ff57f2c8d002bf6a8aaf48f7647088f2218c1ada710cf6111f6c4c
Levent Veysi Portal version 1.0 suffers from a SQL injection vulnerability.
ead62478072412c5b3fde04a63926e16f1296361a9e156fc47c6108223253c9a
Gentoo Linux Security Advisory GLSA 200707-05 - The pam_login.cgi file does not properly sanitize user input before sending it back as output to the user. Versions less than 1.350 are affected.
3688c006f0c957da63cde4a75c077010127132236dd5b7f19475488ae22b772b
Debian Security Advisory 1329-1 - Steve Kemp from the Debian Security Audit project discovered that gfax, a GHOME frontend for fax programs, uses temporary files in an unsafe manner which may be exploited to execute arbitrary commands with the privileges of the root user.
384f0ae4375d9b997e90777838071eb64d7a500b881c44d4f42b8eb21d118a7d
The SAP DB suffers from a web server stack overflow.
0749c32ef0d9c060f3d5e24c3f8a13e4ffa2c55ae533dcc7bbbf4b19e62ae074
The SAP Internet Communication Manager suffers from a denial of service vulnerability.
3854d1251268dac04e302b6d8b502a6a84ac55220bf172bc4ddff70550560b3b
The SAP Message Server suffers from a heap overflow vulnerability.
f0067ae9b255a470a410cce57416f08c6a0878c3437509ae1415b1141910ec3c
The SAP Internet Graphics Server suffers from a cross site scripting vulnerability and a heap overflow vulnerability.
765df3e3026044a65328944f7a4494ae170aee42c1789d8a3707eb8de4989b7f
Netragard, L.L.C Advisory - Maia Mailguard versions 1.0.2 and below suffers from file read and directory traversal vulnerabilities that allow for remote code execution. Details provided.
d36bb22c015e1a08a2926bcf374d2972835a70bfa94c4a09681029459a05bf6f
The wp-pass.php script in WordPress version 2.2.1 suffers from a redirection vulnerability.
34164951dd23e1069f68094fadeec29d745e2538bc48b15d93bb496e84a202d3
EnjoySAP, the SAP GUI for Windows, suffers from a stack overflow vulnerability.
64f5aa6fc4f12c13f5c5d24b6cdf2e92f8451f609f253bb3d31c002dfc2f0b5a
EnjoySAP, the SAP GUI for Windows, suffers from a heap overflow vulnerability.
142ff655dae0e4a77bdd173861a8fb4488b208319a8efec9fcfa5526c6ac2e33
HP Digital Imaging SaveToFile() exploit that makes use of hpqvwocx.dll version 2.1.0.556.
519a153cd814e8ce4e771489fdb8a9f24917a8c1a442d42f2e6167e6f4eb4083
ViRC version 2.0 JOIN response remote SEH overwrite exploit. Tested on Visual IRC 2.0 / 2k SP4 Polish. Executes calc.exe.
c6782288f12a3ccf5a191e0a8e8953d94108243ace96aad60878b3fe1aadaddc
LimeSurvey version 1.49RC2 suffers from multiple remote file inclusion vulnerabilities.
51d842cd8da86eacce25f7828320067a54e955d51a7b6262bf52b54f641b7b26
eMeeting Online Dating Software version 5.2 suffers from multiple SQL injection vulnerabilities.
3ff19a997cc03a0f32c44c8e576b8206d19e244e3310555b5017731ab2035347
phpVID version 0.9.9 suffers from a SQL injection vulnerability in categories_type.php.
8c718c95f22ff9a4963a19a87445935d13b2ba36e74bdfeecd39d528de5c7f56
Secunia Security Advisory - Debian has issued an update for gfax. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges.
4ef7e380196956412ba865954027996cef20ca9150711a171af49f5a91d83ea1
Secunia Security Advisory - Adriel T. Desautels has reported vulnerabilities in Maia Mailguard, which can be exploited by malicious people to disclose sensitive information.
89e3158234537b2f3b2586d87cb0943043f50ca33daeb7936617d34846cb6136
Secunia Security Advisory - SUSE has issued an update for evolution and evolution-data-server. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.
3ffc596be3f96722134382c472cc104a882c8881084a353ab504d8dbfc1a07db
Zen Cart version 1.3.7 suffers from a session fixation issue in its backend administration interface.
fae3f42542ed29ac868326931bdf3ef90eeb0aabcad895da2c149314f711fd29
HP Security Bulletin - A potential security vulnerability has been identified with an ActiveX control in HP Instant Support - Driver Check running on Microsoft Windows. The vulnerability could be remotely exploited to allow unauthorized access to the system.
befafdc28f5bd586ab4c0b3bfa8345334f223db7f05311683b52d599109f84d1
AsteriDex versions 3.0 and below suffer from a remote code execution vulnerability in callboth.php. Full exploit provided.
794379780fb3e3988a39c423bf0d884ff440774220df9bdf836c25beaaf1e46d
VRNews version 1.x suffers from a remote permission bypass vulnerability in admin.php.
07adecd4f4b1b6b14974c442bff909582be7c6dc4f0544072adf1c1a899ebe35
smspasswd provides two factor authentication via cell phone short message service (SMS). It currently supports LDAP and RADIUS two factor authentication for users with cell (mobile) phones.
eee812fd97d3a11a5d25f879958e58ea64259a386b6c425fced7634b4a6c81e9