Hardened-PHP Project Security Advisory - DokuWiki comes with an AJAX spellchecking service that can be called by every visiting client without the need of authorization. Unfortunately, the spellchecking service used the /e modifier of preg_replace() to handle links that are embedded in the text to translate in an unsafe way, allowing for arbitrary code execution.
36f2eef55480c038e6f244e40684af192918fc3124d276f94581c4096cc9cb92
HPSBMA02121 SSRT061157 rev.2 - HP OpenView Storage Data Protector Remote Arbitrary Command Execution
dec2421b118bcbcd01329a30b05ac6413555f005eb6647edb85d3a5290964584
HPSBUX02090 SSRT051058 rev.2 - HP-UX Secure Shell Remote Denial of Service (DoS)
6f3d42b062cc06430c353a883246b5e241f12412cab442ad6dfbff8b0c140477
Core Security Technologies - Corelabs Advisory: CORE-2006-0330 - Asterisk PBX truncated video miniframe vulnerability
68387be4a55b8d2e35790910943697fa879ed82f77f6725e10ab2b5421773005
Core Security Technologies - Corelabs Advisory CORE-2006-0327: IAXclient is an open source library that implements the IAX2 VoIP protocol used by the Asterisk IP PBX and several VoIP software phones. Two vulnerabilities have been found in the library that may grant attackers remote execution of arbitrary code on systems using software packages that rely on it to implement the IAX2 protocol support.
7ba3b346dc7517aff33efbe4dd099cc6f8cbc6b2d7ccdf6c04785dfa56992eef
rPath Security Advisory: 2006-0099-1 - openldap
9d09b818308aeca8a5c37ba8a6612810f2862b7e33ecde4323935f3d5460484f
rPath Security Advisory: 2006-0098-1 - gdm
8fef2c2920b40ab9ca6851cb7dc0d48e7c77d8b20050a7836cf6e9625c9b1413
rPath Security Advisory: 2006-0096-1 - spamassassin
8584f08ad4d12a526d48dcb732cebf12ecb5a6b2d5fc7c2cd2ec6134f62d99d0
Web server 4D 3.6.0 remote DOS exploit.
9ecb021967a204a4e0c6a30ce25bba730abc3141dc7ffad2d9d627831ae2f3b7
MyServer 0.5 denial of service exploit.
c5eff9bd4d626f2c87231b61b8aa13dcaccb0941e2392a5a2cd80a30c7397ca7
Clan Manager Pro 1.1 and prior remote file inclusion exploit.
33a4a11d03588e954bd7f1728e66ad72cc8284ac0936425f2882698d0d9f14bc
Fedora Legacy Update Advisory: FLSA:190884 - Updated squirrelmail package fixes security issues.
ad9bdc6fac6d6604d850286db5fc0e5f4f4d12d654dd15c972aacd0ed0836ea2
Fedora Legacy Update Advisory - FLSA:190777: Updated X.org packages fix security issue
0b177de6a9939bbd9ca1d458c6ffcb40410c4361894fe7a31e6f56db7e658db5
Fedora Legacy Update Advisory - FLSA:189137-2: Updated firefox package fixes security issues
1189511be1c0e21641f364b95652d17f5914444802fc8e1456be26d57672b02c
Fedora Legacy Update Advisory - FLSA:190941: Updated ipsec-tools package fixes security issue
ccaccd9144401858ea71d9bb3eca3a12e621a75cfaa86192257b9a581ec39051
Fedora Legacy Update Advisory: FLSA:189137-1 - Updated mozilla packages fix security issues
81496ee91d22033c80e7689d237b3bedd94b43a16543c9d558ff41eec5699665
BloggIT versions 1.01 or prior suffer from arbitrary code execution vulnerabilities.
0bc85b59e1874ae02b9adfb22039712f92ab2077543dbbb82d04516b39963b9b
aWebNews version 1.0 suffers from a remote file disclosure vulnerability.
5c9f5bc5d30352655a77d39b647d30e151e63b31a79dc8ad4003053833c675a7
Xtreme Downloads v.1.0 suffers from multiple file inclusion vulnerabilities.
38e4e7557526336ccb7e5323268cd5e52b35a9b790b7f3403a99ffd73990aef0
[KAPDA::#47] - myNewsletter 1.1.2 SQL_Injection
82a7ec23cb143125b684e3399b7dc53358e514e87658b7faa3df0c09565847e7
Dmx Forum v2.1a and prior Remote Passwords Disclosure exploit.
af5f88293d2fbb88c507a61b62e99d1c4f00c5f7c4a85862e3335162a854b2fe
[MajorSecurity #9] HostAdmin 3.1 and prior - Remote File Include Vulnerability
8d94dfb563f0b734c5d4993c4ff573f0f99ab2a83e9c37c0a3df76a6aa8dfc9c
[MajorSecurity #8]DreamAccount 3.1 and prior - Remote File Include Vulnerability
c5dc46008c0077c7b0151dc2d240e8a1f30de73263af4e3fdad497789240d2b4
NewsEngine 1.5.0 or prior suffers from a remote SQL injection vulnerability in newscomments.php.
0e2f1699f9db1562259804487687422defe2294c9603b089bbba37007c8f8600
FunkBoard CF0.71 Remote User Pass Change Exploit
838f01d4b20928b6141b400e94625cffeaa222430c1147cc17be768a8eec8d7c