The Doomsday engine versions less than or equal to 1.8.6 and 1.9.0 suffer from a format string bug in Con_Message and Con_Printf.
57a85b55da6ef8e03b5925ba80a63e6207122e00315f1a1926b0109a4fe35ed8
Dokeos versions less than or equal to 1.6.4 suffer from a SQL injection vulnerability.
4f308287529bc84bf129c4b7461b1b0821bd70eeb73f1fdc9ac17b07e4eb4368
Horde versions less than or equal to 3.0.9 and 3.1.0 help viewer Metasploit Framework exploit.
db378988e98b9549df7f3cca304d901236f0426ce8cf95aa1ce38e6d59286894
PHPList versions less that or equal to 2.10.2 remote commands execution exploit.
de9c0544a6abcb065ce0e10198841d868f6f2309a2024366263601e574427dfe
A linux 2.6 kernel module that is designed to prevent the loading of other modules.
055c2a5b157b462bf26ea721be183b42a661947a9b402b31d72bbf81adac0469
A linux 2.6 kernel module that is designed to prevent the loading of other modules.
055c2a5b157b462bf26ea721be183b42a661947a9b402b31d72bbf81adac0469
Shadowed Portal suffers from XSS.
23d24a5c2f2d5fba7f51da46c97aa518bdc53ce2336966b2b071aef6602a9139
The Matt Wright Guestbook suffers from XSS
cdd799093cb6bb94253c508727d162b759e98859c70573f78c334f32f281c7fd
Autonomous LAN party suffers from a remote file inclusion vulnerability in gameSpy2.php.
865e838a30fbbb0474dafe38006426daec23b30b2d4e6aa68b50ac39c661131e
Virtual War suffers from a remote file inclusion vulnerability in the vwar_root variable.
f670bd6b8b53d9fcd8a96cf245a18cc3b8dfb00c60d95bbdfaef7a980b7169ec
GNMS is a free Network Management System, a tool to monitor state of network elements. All nodes are mapped on a window. States can be discovered by service, snmp, custom pooling, moreover syslog and snmp traps can be caught too.
f16b8673b8448308becb28dd480cfd1fc14b98a380a73d19f47ed82be7f83d48
Cisco Security Advisory cisco-sa-20060405-ons.shtml: Cisco Optical Networking System 15000 series and Cisco Transport Controller Vulnerabilities
2b8d85a5ccfcba0fa787dd24868aaace6ad22f3799477196f98408b9ad29ac49
Cisco Security Advisory cisco-sa-20060405-css: Cisco 11500 Content Services Switch HTTP Request Vulnerability
bcde973d0d67758ff40b4d03090f9b2548ccea75dbfb352ec1d579d2ed16e076
ArabPortal 2.0.1 Stable suffers from several XSS and SQL injection vulnerabilities.
ec8f2f439932a33c36f4fdb82c0b876c8309e2923328e74b5bc9f1b62153c804
SEC-1 LTD Security Advisory: HP Colour LaserJet 2500 and 4600 Toolbox Directory Traversal Vulnerability
d015214a56a990d14d7faa42df0ae69e1b72be48b9e246c711341f1cb79c26cc
HPSBPI2109 SSRT061141 rev.1 - HP Color LaserJet 2500 and 4600 Toolbox Running on Microsoft Windows Remote Unauthorized Disclosure of Information
8a27e4b5a2db5c1f27bba86fa5856bd0d70bed0ece4516679304f503858b5bc7
It is possible to spoof the address bar in IE by using Shockwave Flash.
6ef049622aecfb0367b58dc276dcb4ff4372dc8fae9f6d0f3fdd15c90fbbe1c9
Exploit for AngelineCMS 0.8.1 remote php include vulnerability in loadkernel.php.
25089666e022fd3219f595a1386fec8873afddf932fdfb8edb5804353632adc0
Symantec Vulnerability Research: SYMSA-2006-002- There exists a format string vulnerability within the McAfee WebShield SMTP server which allows an attacker to execute arbitrary code on the host computer via an unauthenticated connection. With successful exploitation, an unauthenticated attacker is able to obtain SYSTEM access.
a7aec9242cde724fecd60dd1e9d7c1d95f6ea96c27298a6d5a2eb2a07ae0d68f
Phpwebgallery versions less than or equal to 1.4.1 suffer from a SQL injection vulnerability.
80ee78e60b6db725b86953cccd6ab94991f3ccb5ea477c39ab4152cbfa5c95f3
MyBB 1.10 suffers from XSS
3d3c8ac8fc94676defad6d382087f6d073e69a132138fee7b823a89071331abd
ReloadCMS versions less than 1.2.5 do not properly sanitize the user-agent request header before storing in stats.dat leading to XSS when the admin views the site statistics. Permissions can be escalated further ones logged in as admin.
191369e980daf69a88a2bc929a6f7b30484c78f2eb5396c3405bc91a8954e92b
lucidCMS 2.0.0 RC4 suffers from XSS and full path disclosure.
f51b245fc4e09587c18170010848da6d79243a5b01e7af91b1a0bdcb3561f484
Softbiz Image Gallery suffers from a SQL injection vulnerability.
3a125f69967da3fea2b0e77e3e1d7fbccce754c1aee47d9935854cd721b17144
ext2hide allows the user to save and restore an arbitrary number of files to and from the reserved space in an ext2/3 filesystem's primary and backup superblocks. Using ext2hide, you can use this reserved section to store an arbitrary number of files, where they will be completely invisible to normal filesystem utilities, but still residing in permanent storage on disk. This can be useful for passwords, public keys, anything you like.
28d9964bdab102eea6b6c1594f8550726e219a353d4a4bd160db6749cad6a0f3