Computer Associates ARCserve D2D r15 Web Service Apache Axis2 world-accessible servlet code execution vulnerability proof of concept exploit.
9d0586e0c75ea154f8652912c58f4f946928e474cb239b0b08baebf63d06c2f3
EPSON Status Monitor 3 suffers from a local privilege escalation vulnerability.
bdd59a07432408d0d4b87e1fa1270c97e9c24ead8095fa5897699959c52a76b1
Adobe related service suffers from a privilege escalation vulnerability due to improper permissions.
da9bb4ee3eabf0b74cbc1c0859895471d878edbd11d6da4c968ad411dc2a9097
PeaZIP versions 2.6.1 and below compressed filename command injection proof of concept exploit.
7a1031d528d4e736b853742268e21241be84465070b23c6c7e45071ee9944dcd
ICQ 6.5 URL Search Hook / ICQToolBar.dll .URL file processing Windows Explorer remote buffer overflow proof of concept exploit.
7db4ef3b45e02ee4e93761483eb3e15822ea237e62bf8f3e0332ef68373ae5f0
Dokuwiki version 2009-02-14 suffers from a remote temporary file inclusion vulnerability.
325797fcaa798d398eff7aace204be01243d3c306797a3ab4010456a4fc404fb
COWON America jetCast version 2.0.4.1109 local overflow exploit that creates a malicious .mp3 file.
3b7b819b6aeac7328ca7c5e500ba8227f30b5bb7f059dd591326b42c209d55b2
Pinnacle Studio 12 "Hollywood FX Compressed Archive" (.hfz) directory traversal proof of concept exploit.
140e18b7f263c208877fbd4b9e099be7be793ab75d118fc919ff39ed4291ab12
Bitweaver versions 2.6 and below /boards/boards_rss.php / saveFeed() remote code execution exploit.
c6e6458bc379630566edb13719dab179c4f4e4f7429501040bdeea0557510f62
Symantec Fax Viewer Control in WinFax Pro version 10.03 (DCCFAXVW.DLL) remote buffer overflow exploit.
2aed8b7e6e6ce96375af28dd2e4580c2567f748fbb45706ec2ce25127c08a6f9
Zoom Player Pro version 3.30 buffer overflow exploit that creates a malicious .m3u file.
a5c7a28ce0db08ccec2de12b144fae199b979e23302efae721abf993654b85c0
Icewarp Merak Mail Server version 9.4.1 Base65FileEncode() buffer overflow proof of concept exploit.
59dae0c32108366fa1a61fb75f0fadb241ad621ce1c71c06297158373bccd1d7
Geeklog versions 1.5.2 and below savepreferences()/*blocks[] remote SQL injection exploit.
01f186f7d9475a21bd6726d4df16f0d0bb6421ab3a8a03f626b9833f14455435
ftpdmin version 0.96 RNFR remote buffer overflow exploit for XP SP3.
14f9582635a04a183b0c1e61df98e2ba135bc5eb659e5c49b2daa8a46af6e98c
Geeklog versions 1.5.2 and below SEC_authenticate() remote SQL injection exploit.
9289d8cb946255c3e09f10474f3767b6c11d5d133f66a2107765e2d20994e7ef
glFusion versions 1.1.2 and below COM_applyFilter()/cookies blind SQL injection exploit.
76c3a33c1103cadd63c4f1742f22cdb230b4876086835a15891e8dba8cd5ccda
glFusion versions 1.1.2 and below COM_applyFilter()/order SQL injection exploit.
0d052959a67255c2e45321b7cf1bd2b09df0473ac3c5ee52fd046ce1cf9e3042
PHPizabi version 0.848b C1 HFP1 proc.inc.php remote privilege escalation exploit that uses SQL injection.
f19fa58eccb848bc5470bef28dbbf0086ee2285a4e51e3d5c796b1c703fb0ef2
BS.Player versions 2.34 Build 980 and below local buffer overflow exploit that creates a malicious .bsl file.
bbd96e9f073356e0b12a5ecfeb3103c430963df93c0bb8111141d6519e1b5a78
CDex version 1.70b2 local buffer overflow exploit that creates a malicious .ogg file. Written for Windows XP SP3.
6d0c8e995537a042fda7cdf197ba95b487e7911b7642726ab07e6fac1a6597bf
PPLive versions 1.9.21 and below suffer from a URI handler argument injection vulnerability.
6b519876a5ddbbf84a7a7e31fbfb4c67cf6f9a2868b6168a7fd4a8c09fb223fa
GeoVision LiveAudio GetAudioPlayingTime() Active-X control remote freed-memory access exploit.
1e56e0f385f0433ae8f52b18f89640bc0e9625d7e3a85748f3bd7e80ab96fb8c
SupportSoft DNA Editor module code execution exploit that leverages dnaedit.dll.
b4f171a5e1092d8dd52b815a5ccb43eebcf3330cbda106d95b211bbf4af57c9b
Sopcast SopCore Control SetExternalPlayer() user assisted command execution exploit that leverages sopocx.ocx version 3.0.3.501.
c8ad28db3188f7a8c3d2dc7d08602bb8f80dfcb9040c262bf8287c712a696860
Sopcast SopCore Control Active-X SetExternalPlayer() code execution proof of concept exploit that leverages sopocx.ocx version 3.0.3.501.
5fa2489d39dd257067a34cb4a4c40c6ecee84847500eac51b5077ce71cb1fbe3