Asterisk Project Security Advisory - The Asterisk Manager Interface has a remote crash vulnerability. If a manager user is configured in manager.conf without a password, and then a connection is made that attempts to use that username and MD5 authentication, Asterisk will dereference a NULL pointer and crash.
a17f68d00918d6d34071de5f8df573e502384f3fa913837d7bf6360c91718452
Asterisk Project Security Advisory - Multiple problems have been identified in the Asterisk SIP channel driver (chan_sip) when handling response packets from other SIP endpoints.
1466bb9117813fc5de7943aeb33b93d1848fb5d8fe9fe5ea4eb00860aa85e899
Asterisk Project Security Advisory - Two closely related stack based buffer overflows exist in the SIP/SDP handler of Asterisk, the vulnerabilities are very similar but exist as two separate unsafe function calls.
a949bf50c43304dfaf9a9feae5a4076f7dd8a9e29097cee33dd9e616bb3fe0b7
A vulnerability allows attackers to execute arbitrary code on vulnerable installations of Computer Associates BrightStor ARCserve Media Server. User interaction is not required to exploit this vulnerability.
5f051d451b1cb655c302560bb76e182d99aa01278266b8298e9a10f46856cb50
Debian Security Advisory 1280-1 - It was discovered that aircrack-ng, a WEP/WPA security analysis tool, performs insufficient validation of 802.11 authentication packets, which allows the execution of arbitrary code.
4e446dd900ffe883ee046d067cf29b944700bdb18544695d33f78e4b6587c1ec
Plogger suffers from a session fixation issue.
7b23bb299f4b532126a72a3325459b42cb5a3ecb373942f4c209c2d91c784322
A flaw in _cpyfile.p in Progress Webspeed Messenger allows remote attackers to gain full control of a system.
a29b9734ca0fdc7a305fcfd890b442bc7ec97cce4f6a97ae774c37689445cf30
HP Security Bulletin - A potential vulnerability has been identified with HP StorageWorks Command View Advanced Edition for XP software where new user registration or addition may allow local unauthorized access to user accounts.
07cd8adf8291147c5062405c49b56df2ac886e69ff07cc99c75873e8984c634f
The CA Clever Path Portal is susceptible to a SQL injection vulnerability.
ab86c4d223c13593aa7f8dc9925b0ce1d0cd8940f7edde24b140739769e49d97
Gentoo Linux Security Advisory GLSA 200704-21 - iDefense Labs have reported a stack-based buffer overflow in the cab_unstore() function when processing negative values in .cab files. Multiple file descriptor leaks have also been reported in chmunpack.c, pdf.c and dblock.c when processing .chm files. Versions less than 0.90.2 are affected.
6c17169458553639ef56790ddc6bbd90f5c43c348594a708efbe65a448211898
YA Book version 0.98-alpha suffers from a persistent cross site scripting vulnerability.
402b570826e1cdc2982bcf108c60b73131fe089afc7eb556a360aa1e0b86360c
Secunia Security Advisory - XenoMuta has reported some vulnerabilities in freePBX, which can be exploited by malicious people to conduct script insertion attacks and by malicious users to compromise a vulnerable system.
e0dfc51de930a2d4d60aa6761d7d730e1ee11cfae4e5320100a655731bf3065a
Secunia Security Advisory - Some vulnerabilities have been reported in phpMyAdmin, which can be exploited by malicious people to conduct cross-site scripting attacks.
7a3d24f52ce4d3990d9b4528f976551ba09e304ee9d188d5a0321cde6693f41b
Secunia Security Advisory - Some vulnerabilities have been reported in Xaraya, which can be exploited by malicious people to bypass certain security restrictions.
684c594a399d7faa2fcfa533a0cc3da53c604350ebc59f40831436081559ec73
Secunia Security Advisory - 0x86 has discovered a vulnerability in MyBB, which can be exploited by malicious people to conduct SQL injection attacks.
e252984148b3067dfa4c0eaaa7c0bfb4ac18489e7f956bced0585a4a3e1cb8b1
Secunia Security Advisory - InyeXion has discovered some vulnerabilities in Post Revolution, which can be exploited by malicious people to compromise a vulnerable system or to disclose sensitive information.
512578cd6d7fa2e054702fb6d59abccef0fd4f4bb531e8d1145ec8810cddbeca
Secunia Security Advisory - A vulnerability has been reported in OpenBSD, which can be exploited by malicious people to cause a DoS (Denial of Service).
42bbd26d79071aca295848e974bf7da847d9cbcfafdd48d3185bfc7182442d9c
Secunia Security Advisory - MoHaNdKo has reported a vulnerability in ACVSWS, which can be exploited by malicious people to compromise a vulnerable system or to disclose sensitive information.
e7f4e84107e98232db6cadded8e12efbd6894aea0b0dd1b6ceb739891e0c70a5
Secunia Security Advisory - rPath has issued an update for postgresql and postgresql-server. This fixes a security issue, which potentially can be exploited by malicious users to gain escalated privileges.
bc82b45e2fad86328fae213ab59fc05d0f27a2012391c7168da61be6df751395
Secunia Security Advisory - A vulnerability has been reported in HP-UX, which can be exploited by malicious people to cause a DoS (Denial of Service).
cfd3d0921baabc870bb03cc29716b6b4235e1dd1f5b6f75e7967c8c443d6428e
Secunia Security Advisory - Gentoo has issued an update for blender. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.
282bb5ec3a8e127175eb665fac6b65e17edd0e7fd5ca8becddfb7f454b4e83af
Secunia Security Advisory - Some vulnerabilities have been discovered in Pagode, which can be exploited by malicious people to compromise a vulnerable system or to disclose sensitive information.
5bbf9fd1762ad915e56cb777f412c89575446528b222545ba51d0ce46abcbc47
Secunia Security Advisory - seko has discovered a vulnerability in Big Blue Guestbook, which can be exploited by malicious people to conduct cross-site scripting attacks.
ef5a4218ec4e4afed68e68f6914d151171e48d2a84ab9e221c5783360263c161
Secunia Security Advisory - the_Edit0r has discovered a vulnerability in TJSChat, which can be exploited by malicious people to conduct cross-site scripting attacks.
76c85cf9bd3227874368dab6f2b5bbedc471e80d920dfc1386aa3ecd54fa3985
Secunia Security Advisory - ilker Kandemir has reported a vulnerability in EsForum, which can be exploited by malicious people to conduct SQL injection attacks.
a1d6dc1667304a5017b1ef7abc531cf8a027165eeca84c31f2e8056b2121600d