The vulnerability is caused by scripts using "unserialize()" with user controlled input. This can be exploited to execute arbitrary PHP code via the "__destruct()" method of the "SugarTheme" class or passing an ad-hoc serialized object through the $_REQUEST['current_query_by_page'] input variable.
A denial of service vulnerability has been found in the way the multiple

overlapping ranges are handled by the Apache HTTPD server.



This update fixes an issue when launching the module from an agent running

in a Linux system.
Traq is vulnerable to an authentication bypass vulnerability, this module exploits this vulnerability in order to install a plugin hook to ultimately install an agent in the target host.