This article explains how to resolve a vulnerability in Parlallels Plesk Panel.
This article contains information about multiple cross-site scripting vulnerabilities reported for WordPress.
This article includes information on multiple vulnerabilities reported for LEPTON CMS.
Information on multiple vulnerabilities reported for Support Incident Tracker.
Information on multiple cross-site scripting vulnerabilities reported for Wordpress.
vtiger CRM is an Open Source CRM software for small and medium businesses.
Affected Application: vtiger CRM before version 5.2.0.
Issue: On 12/07/2011, multiple cross-site scripting vulnerabilities were reported for vtiger CRM before version 5.2.0. Attackers can use these vulnerabilities to execute unauthorized code, modify site content, or perform other malicious activities.
Drupal® is a popular open-source content management system that is developed and supported by a community of users. The Flag Content module lets users flag offensive content for an administrator to review.
Affected Application: Flag Content 5.x-2.x through 5.x-2.9
Issue: On 09/13/11, a cross-site scripting vulnerability was reported for Flag Content [...]
TYPO3 is an enterprise-level open source content management system.
Affected Application: The TYPO3 extensions Webkit PDFs (webkitpdf) versions before 1.1.4, and Questionnaire (k3_questionnaire) versions before 2.2.3.
Issue: On 10/09/11, cross-site scripting and SQL injection vulnerabilities were reported for the TYPO3 extensions webkitpdf and k3_questionnaire. The vulnerabilities let attackers inject code to [...]
WordPress® is a popular open-source blogging tool that millions of websites throughout the world use. The Twitter® Feed plugin lets users pull Twitter data into their page.
Affected Application: Twitter Feed plugin wp-twitter-feed 0.3.1.
Issue: On 08/24/11, a cross-site scripting vulnerability was reported for the WordPress Twitter Feed plugin, wp-twitter-feed. Attackers [...]
On 07/27/11, an information disclosure vulnerability was reported for multiple versions of Joomla! The vulnerability lets attackers use the view.html.php script to discover the absolute path to Joomla!, which they could use for additional attacks.