Publique! Framework version 2.3 suffers from a remote SQL injection vulnerability.
b5c3513c8949c151cfc05bdfe1cd8973445f1bbc09b6cebdbedbef350dbaac2d
Status2k remote add administrator exploit.
0963d7f0df034726c05cd0e475a5566182a77d8c09f06d0ec2194f29055d6b8c
The login page of the F2L-3000 version 4.0.0 is vulnerable to SQL Injection. Exploitation of the vulnerability may allow attackers tobypass authentication and access sensitive information stored on the device.
0aa31d61a17571c0fb1db50bfa89f614672ac6e1de71f37e6ea906313453af1b
Whitepaper called Cryptography - The Magic Of The Asymmetric. Written in German.
f737c81ee79e0d58d85ded394f940a3195d39935d8a7917ec137a9d11bab632b
Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP.
bd68a6cfe09718d6847c3fe3e70e9fe2026a5bd51002c5b6b456b6b59ef41941
This Metasploit module exploits a stack-based buffer overflow within Phobos.dll of AOL 9.5. By setting an overly long value to 'Import()', an attacker can overrun a buffer and execute arbitrary code.
9b8e41c5f18f1940b770dab8c88980a409b2f76dd6cb4f4dea7b75f2c9423d54
Winamp version 5.572 local buffer overflow exploit that executes calc.exe.
1162945d8cffe926d0d36a6ccb59950053d8f8ecb6477b387e268e72cc1e7766
Whitepaper called PHP RFI Prevention. Written in Turkish.
9b285f924d3fec07f867d5721ad0668203170946fe83e8003360acbb89f9619f
SQL-Ledger has been patched to address cross site request forgery, local file inclusion, no secure flag on cookie, default administrator password and remote SQL injection vulnerabilities.
285bfdfd6459c517b7d7fdad4e66f894515d9a97b2c09fb44c8c4036cdd19c20
Mandriva Linux Security Advisory 2010-025 - Multiple vulnerabilities were discovered and corrected in php-pear. Argument injection vulnerability in the sendmail implementation of the Mail::Send method (Mail/sendmail.php) in the Mail package 1.1.14 f for PEAR allows remote attackers to read and write arbitrary files via a crafted parameter, and possibly other parameters, a different vulnerability than CVE-2009-4023. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct these issues.
5f25e471637759cc8181b0216c625c69d6faeab30fa48e8d0988c3ea8ca5be0a
BoastMachine version 3.1 suffers from a remote shell upload vulnerability.
2651a3bb58e46c9853187e2b36d9fca27e375ef9d487387de810853f3c2799ff
Opera version 10.10 XML parser denial of service proof of concept exploit.
07b347736c9eacea5303892923b1407b25d1b7e0ac4d144b6fb05dd676f03ea7
Winamp version 5.572 whatsnew.txt stack overflow proof of concept exploit.
7b1e4d3aca7b13c466e1b3c16a12434b67268d5a8dfcbbdb848358d16d18be34
P2GChinchilla HTTP Server version 1.1.1 remote denial of service exploit.
4c090cc3b9017bfff39b23bb7a5305fe47543b3ac277ba555898946b5aa6fa9a
Apache Tomcat suffers from an insecure partial deploy after failed deploy vulnerability.
6e42d1072930b0a860fd427cec3601f44c65eee0533acddfbb5bb93668b5b599
Apache Tomcat suffers from an unexpected file deletion in work directory vulnerability. Versions 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 are affected.
b8916693e4e438f1e8ec19e93a66873769e5d428e6db947e2f31149843bb9c15
Safari version 4.0.4 suffers from a javascript crash denial of service vulnerability.
932b7c0432f67943950f03679d20b5599d0dac8992b68270d539d33cc3b771f8
Secunia Security Advisory - Some vulnerabilities and weaknesses have been reported in Google Chrome, where some have unknown impacts and others can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, or compromise a user's system.
dd68f878fdbf054cbca1b92574b0879c383af48e16f1d0c1b7de16faa96eedcb
Secunia Security Advisory - Hernan Jais has discovered multiple vulnerabilities in OCS Inventory NG, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct cross-site scripting attacks.
ddfdf3eaa1470a2a487082f99d155e966636193f88e91eadc09a6094d3545c40
Secunia Security Advisory - A vulnerability has been discovered in bozohttpd, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
6b178bd9e67c7ae871ba4877ff20175af5d8d449cf349b6633a575fc108ff890
Secunia Security Advisory - Debian has issued an update for python2.4 and python2.5. This fixes some vulnerabilities, where some have unknown impact and others can be exploited by malicious people to cause a DoS (Denial of Service).
bf70c996f1b0a6b633e106e63a8651484019df400ffe29695cd21c9aa6a09487
Secunia Security Advisory - Multiple vulnerabilities have been reported in the JBDiary component for Joomla, which can be exploited by malicious people to conduct SQL injection attacks.
7c1d9e74c0828124df9168b67ff348ab45e5395b5745366810c7e1a9f715fc7c
Secunia Security Advisory - A vulnerability has been reported in Support Incident Tracker, which can be exploited by malicious people to bypass certain security restrictions.
793c90ca7e1c1a6c357ad31d64520492e44aa1bf780fe7ec54bbd322bdfcf351
Secunia Security Advisory - A vulnerability has been reported in XenServer, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
9c24f3d8012ce5e0fb3cdcc079226ac1a59f58edd245b9eff68b494a98535220
Secunia Security Advisory - Some vulnerabilities have been reported in Rising Antivirus, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges.
f538eec53b24bdd34eb00504c3613b1ce0a0b8484386ca73fea0baf5d9a496ac