Provided by SecurityTracker
libarchive Integer Overflow in Processing Files Lets Remote Users Execute Arbitrary Code
Linux Kernel setsockopt() Bugs Let Local Users Deny Service and Gain Elevated Privileges
JBoss Authentication Flaw in JGroups Lets Remote Users Bypass Security Restrictions on the Target System
WordPress Multiple Flaws Let Remote Users Modify Passwords, Deny Service, Obtain Potentially Sensitive Information, and Conduct Cross-Site Scripting and Open Redirect Attacks
Movable Type XML-RPC Interface Input Validation Flaw Lets Remote Users Inject SQL Commands