Duru Design suffers from a remote SQL injection vulnerability.
b559292f24ebe85eba41dfa8199cfb085732dc4d999cfe4cfdcd0266e349deb5
Whitepaper called Attacking the Washington, D.C. Internet Voting System. In 2010, Washington, D.C. developed an Internet voting pilot project that was intended to allow overseas absentee voters to cast their ballots using a website. The authors of this paper participated in a challenge to break the security of the system and in doing so, elected Bender from Futurama to the school board.
705cb8163275671c27c510a5c5b8844bcd41d0a76937766a605fd5ca273a0a7a
CnnCMS version 1.x suffers from a remote SQL injection vulnerability.
d436ff041fb8f812be29f707d33b193967410e1cfb4f891ca66db3f737c8e6dd
Rivettracker versions 1.03 and below suffer from multiple remote SQL injection vulnerabilities.
bf5cb5d1b2aa0f3104dcfb78bf15da96dca749daeda9bd4579d186571746613f
Tender Knowledge Base suffers from a cross site scripting vulnerability.
12405475fa4be50e860bfd76b41a29d061a51ebeea6f9b615a11e075e7879356
Splash Pro HD Player denial of service proof of concept exploit that creates a malicious .avi file.
4f32a79f26cac44c8b87a9a2d0254b51a8ce32d6876f9726cd59cf6f05bba627
Passport PC To Host suffers from a memory corruption vulnerability when handling a malformed .zws file.
702f046230f5d06b667b90581f9b5e60857bee240b2a182580ea7a260382b2be
Centre Hospitalier suffers from a cross site scripting vulnerability.
d372673ff341d5bdce3f31502520cffd6fa819695801cc5ea25159146aa52c4f
Sepehr-Team suffers from an open redirection vulnerability.
425ad6ce48ac9037f30a67a94fb5b5ebcf57b4a28d8a703eb34be04267238748
Timesheet Next Gen version 1.5.2 suffers from multiple remote SQL injection vulnerabilities.
3394a6bffc9643928250c88dec33fb2e24acacea8fc030e162ad703fe6b53dda
BJMaster Design suffers from a remote SQL injection vulnerability.
d323aa76e46e4fbf4c806cecdf82910166fc0b60ec2453524fc4b5f5b91454cb
Web Net Marketing Design suffers from a remote SQL injection vulnerability.
ef1b47ba334cbbc0c952a6b8f25fd4ed4e29643f5be3fd505938fd1e37809e6f
Pussytorrents.org suffers from a cross site scripting vulnerability.
4be5d81e403f6ef3d0f476eaeab4a2e71eb8b8d72b8274ec4452e0e4f4ee4024
GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.
013800e2bb94d72f5f1c3b447553223039f01bd0655d60138e1a0cea50022962
This Metasploit module exploits a stack buffer overflow vulnerability in VideoLAN VLC versions prior to 0.9.6. The vulnerability exists in the parsing of RealText subtitle files. In order to exploit this, this module will generate two files: The .mp4 file is used to trick your victim into running. The .rt file is the actual malicious file that triggers the vulnerability, which should be placed under the same directory as the .mp4 file.
9952cf454696629976235ec8de966c57016db79252896be88870fdf2312f2133