Filtered by vendor Sourceforge
Subscriptions
Total
27 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2007-1466 | 2 Redhat, Sourceforge | 2 Enterprise Linux, Wordperfect Document Importer-exporter | 2025-04-09 | N/A |
| Integer overflow in the WP6GeneralTextPacket::_readContents function in WordPerfect Document importer/exporter (libwpd) before 0.8.9 allows user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted WordPerfect file, a different vulnerability than CVE-2007-0002. | ||||
| CVE-2008-2503 | 1 Sourceforge | 1 Emule X-ray | 2025-04-09 | N/A |
| Buffer overflow in Uploadlist in eMule X-Ray before 1.4 has unknown impact and remote attack vectors. | ||||
| CVE-2008-0501 | 1 Sourceforge | 1 Phpmyclub | 2025-04-09 | N/A |
| Directory traversal vulnerability in phpMyClub 0.0.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page_courante parameter to the top-level URI. | ||||
| CVE-2008-6161 | 1 Sourceforge | 1 Wow Raid Manager | 2025-04-09 | N/A |
| Cross-site scripting (XSS) vulnerability in WOW Raid Manager (WRM) before 3.5.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | ||||
| CVE-2007-1137 | 1 Sourceforge | 1 Putmail | 2025-04-09 | N/A |
| putmail.py in Putmail before 1.4 does not detect when a user attempts to use TLS with a server that does not support it, which causes putmail.py to send the username and password in plaintext while the user believes encryption is in use, and allows remote attackers to obtain sensitive information. | ||||
| CVE-2008-2298 | 1 Sourceforge | 1 Web Slider | 2025-04-09 | N/A |
| Admin.php in Web Slider 0.6 allows remote attackers to bypass authentication and gain privileges by setting the admin cookie to 1. | ||||
| CVE-2007-1135 | 1 Sourceforge | 1 Webmplayer | 2025-04-09 | N/A |
| Multiple SQL injection vulnerabilities in WebMplayer before 0.6.1-Alpha allow remote attackers to execute arbitrary SQL commands via the (1) strid parameter to index.php and the (2) id[0] or other id array index parameter to filecheck.php. | ||||