The PHP Code Snippet Library suffers from multiple cross site scripting flaws.
a16e148c1a56fe523fc219611a5c7718feb71d496bde3a990090d68dd7e0c44c
b0rz is a tool created for testing different remote daemons for vulnerabilities and to find bugs in them. Features include string expansion, hex conversion, multisend, and support for UDP.
41e4e5098a02f7622eca6acd87afe2acef6df773599acc9150ebe840a0fdff42
TRPG is a root password generating tool. It can make use of multiple salts and generate passwords at least 45 characters in length.
36a091e201af2c333897f277f62a857fc28d9f22aa63b2cbf503467f094f6d04
Cheetah version 1.0 is a remote Linux/BSD backdoor that offer low CPU usage, Port/Backlog selection, a remote shell, user/password protection, and process faking.
14494a026dcba9f3ddc81a36464f7285e7aa4ab559ded6f69da75edda6346e4a
Secunia Security Advisory - The vendor has reported a vulnerability in PvPGN, potentially allowing malicious people to see sensitive information. An unspecified problem with statsreq may expose sensitive information. This has been fixed in version 1.6.4.
eb13bde7441f7919b0f7a01be5de38099cd8a59db84f8b2a42db26a9b75864d8
Test exploit for Painkiller versions 1.3.1 and below that makes use of a memory corruption flaw.
9c66530de24124920a8c7919ae764141257f4b47f65e889b3185d1ef064c9822
Painkiller versions 1.3.1 and below have a memory corruption flaw with limited code execution possibilities.
9f3fbf17f9fbeaebbb20c73ce8470c4497975e358be471e51bb0a326a7eac154
GulfTech Security Exploit - Easy File Sharing webserver version 1.25 denial of service exploit that consumes 99% of the CPU.
aea01cd9eb07d991268829b7e9d3317ecce42f8c3c22780ebe13704ee0b1811d
GulfTech Security Advisory - Easy File Sharing webserver version 1.25 is susceptible to denial of service and unauthorized system access vulnerabilities.
dd5041d478afd6a443b87b296cde275f172821ea68015ab1cfa70c6beadc736a
GulfTech Security Advisory - Multiple Liveworld products suffer from cross site scripting flaws.
ebc7c3c7aae2e82bed1c14b4ed71a11fb9c443b20dfa4e4c5326466ff63aae6e
WebAPP is susceptible to a directory traversal attack and another flaw that allows an attacker the ability to retrieve the DES encrypted password hash of the administrator.
11c3e39d3b080f15fea744544c722881b3bd66496b99b5de45c74dda7613da5a
rdate version 1.4 is susceptible to a format string vulnerability. Notice: It is likely that this is a benign vulnerability in that rdate is not setuid by default.
5542ec0fb3fe5a1ae95e93e3229447e7fdaee199e2c20e4244a6bae013b858fd
sredird versions 2.2.1-1 and below suffer from a format string bug and a buffer overflow that may let remote users execute arbitrary code.
b1e0ac8fc476c2edf91a769ccfb968ff2145d0af5c80f3a90373bbf293b01c15
PfPro is a Java based GUI for creating OpenBSD PF firewall configurations.
4d44ba929e59e4debc3e7f9f23bd25686b97b6a03bed52ee7181063142dd611d
Sun Security Advisory - A buffer overflow in the Sun Solaris CDE Mailer dtmail allows for arbitrary code execution with mail group privileges.
ca18021130a1e5ab89ea6203a8ebcbdbfa538c3854cd33b9f2f569a74b080e0d
Epixtech Dynix Webpac suffers from SQL injection attacks that allow for login bypass, command execution, and more.
7842802db764f0b8ea08e0baaa91d45b1bd5d2155471489b26a70d4c7f3867d8
Much like in the recent advisory about detection of directories in Opera, a similar method of detection has been discovered in Internet Explorer versions 6 and 5.
a94516d00047679677f625607045687b8c609c3ed6725c2e200f39e5a865492d
The RADIUS protocol testsuite is a tool for auditing written completely in python. Included in the tests are various FreeRADIUS flaws.
ce98d45d7e8071114a8fe23e37a494919b078501b7d0c867b6ba3b616596a719
Squirrelmail chpasswd local root bruteforce exploit.
c11002c92accfa594a79fbcbddbe201aaa79a0133e832a399b9ff95def57b50b
Debian Security Advisory DSA 541-1 - In icecast-server, the UserAgent variable is not properly html_escaped allowing an an attacker the ability to cause the client to execute arbitrary Java script commands.
9daf4bbd5722447c08923b0aa6f406682997d55613d9eb4df95195f4068203c7
Window Washer 5.5 fails to actually full wipe files as the product functionality claims. After deletion, files can still be recovered, and only their metadata is actually wiped.
89a7d8436364d56f477bfb3214d6f7e95b44c08435d95d303a6ca67f7911277b
PHP based exploit for Gallery versions 1.4.4 and below that makes use of an arbitrary file upload flaw.
b806e5a726748ac3e812380c5c54072f07a8feb8a713637a035694778211fc2d
Secunia Security Advisory - A vulnerability has been reported in Davenport WebDAV-CIFS Gateway, which can be exploited by malicious users to cause a DoS (Denial of Service). The vulnerability is caused due to insufficient validation of XML documents sent from clients. This can be exploited by using a specially crafted overly long XML document, which will require excessive resources on expansion. The vulnerability affects versions prior to 0.9.10.
e69794a5a1f7e7bd97b1bfc29879ad648aec0a8c01d3bbde37f944ab688eeb90
Hitachi Security Advisory - The JP1/File Transmission Server/FTP is susceptible to a denial of service attack. It would be seriously impressive if their advisories could be more vague.
c4584dc5d034d76b53e99bf3511f5dd3c0d268faee1e697f1b6a7b9f1abdedc7
Hastymail version 1.0.1 stable and below and 1.1 development and below suffer from a cross site scripting flaw.
709201c79d2b06cd0e09ff4c5a021b7bada568a87a090c48e68a4d882a3b9128