Beginning cracking of Window's software and software protection on x86 systems.
8797103045b47d84aa72016aa7ac869d6c89827a1ae29cc23a29b9c65e12305d
MaviPortal suffers from a cross site scripting flaw in credits.php.
25b9bac751e54ce92a77856e9da4154da07ab6c109d4519bd4c9494d7568b6d7
Land Down Under versions 8.x and below suffer from a SQL injection vulnerability in journal.php.
45ccf38b9723652baa2225f111e670b162639c91f84bc19713d1548fb276a46c
Secunia Security Advisory - A security issue with an unknown impact has been reported in Linux Kernel.
f327c7d055667cee88243d3a91e31c1629f81e263209f6d3e12c25be1692429e
Oracle Portal 10g suffers from a cross site scripting flaw.
878e0a6b3f6ad7d83b2c2c2f71e761077965bbc8a5aeb7d162143cd0387b81a4
Mobilelib Gold version 2 suffers from cross site scripting flaws.
9f3a1841f3ec216dcc81267829bdf9676de23556864417d9bbfadc24fe1ca5ca
Plash is a sandbox for running GNU/Linux programs with minimum privileges. It is suitable for running both command line and GUI programs. It can dynamically grant Gtk-based GUI applications access rights to individual files that you want to open or edit. This happens transparently through the Open/Save file chooser dialog box, by replacing GtkFileChooserDialog. Plash virtualizes the file namespace and provides per-process/per-sandbox namespaces. It can grant processes read-only or read-write access to specific files and directories, mapped at any point in the filesystem namespace. It does not require modifications to the Linux kernel.
39c171fe00850cdb0a4b825e1842f17f0703d13776f9b5c86f7961d0808dd892
Durian Web Application Server version 3.02 freeware for Win32 buffer overflow exploit.
1ec4bec9b4831edea37252314d1cf5ab292efd79cfee4332f818a0de5267884b
Durian Web Application Server version 3.02 freeware for Win32 denial of service exploit.
36e7d8607fffd1652b89eac5d8cda415e96ffcc2d435145cc53598d9e824249c
Debian Security Advisory 1244-1 - It was discovered that the Xine multimedia library performs insufficient sanitizing of Real streams, which might lead to the execution of arbitrary code through a buffer overflow.
e202c237c2787dd791adab6c2a7554e3d822eb7f6f3a850884507adb63dd682f
A memory corruption condition has been discovered in the OpenSER SMS handling module. Versions 1.1.0 and below are affected.
484303104de315ea5d9fd85799b9664894e8389db532bc70a191c30073f4389e
A buffer overflow vulnerability has been discovered in the OpenSER OSP module. Versions 1.1.0 and below are affected.
42a4b2aa0f57d83ca91f9994b291e1190eff41754422867b20123ad93fe24821
The Limbo CMS event module suffers from a remote file inclusion vulnerability.
9a79d39c64654ee7d119a0006ecd3be128f7126af8c6d75b09819b71dcfd6e43
Secunia Security Advisory - Takagi Hiroshi has reported a vulnerability in tDiary, which can be exploited by malicious people to compromise vulnerable systems.
911f7cf7ad2eb5d3423bde92a74448287b2be9b30d5595ca6bbfc27e4762fd87
Secunia Security Advisory - Ruben Santamarta has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious, local users to gain knowledge of sensitive information.
87c773946aee7fecc3ce7dabd03d2ef8e8a866a34cf6bb0d23b8e42124504cd5
Secunia Security Advisory - hack2prison has reported a vulnerability in AlstraSoft Web Host Directory, which can be exploited by malicious people to disclose certain sensitive information.
1c2ed58843aedb1a9a3f534ec405403a11d337d0e601fda1831ee7052c05e506
Secunia Security Advisory - Debian has issued an update for squirrelmail. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks.
f1313eae21ec52c89115ff9932497453e404968ed9408bf7522eb82ca2908465
Secunia Security Advisory - rgod has discovered three vulnerabilities in Cacti, which can be exploited by malicious people to bypass certain security restrictions, manipulate data and compromise vulnerable systems.
cb51aeea8abaf6070b6543b34052d31774172c46a30ee8212d0a28f84e04670f
Secunia Security Advisory - SUSE has issued an update for MozillaFirefox and MozillaThunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to gain knowledge of certain information, conduct cross-site scripting attacks and potentially compromise a user's system.
b0eb0fbdebf5d837bc689f73ea81d1dd954f4f8edb77f9c628a8b9a0b6fdefa4
Secunia Security Advisory - Some vulnerabilities have been reported in Joomla!, where some have unknown impacts and one can be exploited by malicious people to conduct cross-site scripting attacks.
5ccae12cdcb3f8b0e25eead8a66b49450645a5af78032f03cba03123f7d5ffc5
Secunia Security Advisory - Debian has issued an update for xine-lib. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.
a8aed9eafa5f93d4144c11abd9ebb79acf0feb482c147c7751d62ca1bc6ccb12
Secunia Security Advisory - shinnai has discovered a vulnerability in AIDeX, which can be exploited by malicious people to cause a DoS (Denial of Service).
ec0f7cedd4c2ba16582e39de2300cac5f814ed2a0b7dfd32d53152e666cf0d6f
Secunia Security Advisory - ajann has reported two vulnerabilities in While You Were Out and In / Out Board, which can be exploited by malicious people to bypass certain security restrictions and manipulate data.
62064520dda973879aa7b7f0298a06f415f3cb35cf6ea7c683cb4df3bc823877
Secunia Security Advisory - ajann has reported a vulnerability in ASPTicker, which can be exploited by malicious people to conduct SQL Injection attacks.
cafee32ff1f13c1bb61aa87d8472b03652edbe3e94b7feea8a8cca1bab8591da
Secunia Security Advisory - Kacper has discovered a vulnerability in WebText CMS, which can be exploited by malicious users to compromise a vulnerable system.
3d120cfff72c9b767c3b9b2692e829cd1c1902c1c5c8ae21d84fa74fd592525f