Claroline versions 1.7.6 and below remote code execution exploit.
5765174ac4f20d6f6d6b9368bd082c4012d59d41776a81b2918f0bfed1a307bb
Denial of service proof of concept for Mozilla Firefox versions 1.5.0.4 and below that makes use of marquee.
7ad6a581f0403d42506b5f272b2675f64777696fc27e67bacae971a9ac5fe853
MS Internet Explorer stack overflow crash proof of concept for inetconn.dll.
20d8f0ac5f7f5efe78384ebb4123665a4d02d1ddcaf33820523793bf7131bb28
Secunia Security Advisory - Kreej has discovered a security issue in ActivePerl, which can be exploited by malicious, local users to gain escalated privileges.
538b70dbc8245b07a0a49333d21d323a6ed22ff9934d1136c884d7e1cb50a138
Netfilter NAT SNMP module denial of service exploit. This vulnerability has been patched in 2.6.16.18.
1fe96b9a941427034edd69ef6b3b9bde03bea81a02b43bdb42bf0fc58c8a1320
Various antivirus software, including Panda, ClamWin, Norman Virus Control, and AVG Antivirus are all susceptible to a bypass vulnerability.
c76c390286fcb06d013752562c0285f7c4b1f845c3c50d9b7b0af3a425999224
loggin.sh is a script written to emulate a Linux login prompt and then record the logins to /tmp/.dump.
25efdb578dca2b158dfb5d8a658aba550bf036075c4bcb2b131f68efe422a7b5
LifeType versions 1.0.4_r3270 and below remote SQL injection / administrative credential disclosure exploit.
3b515c7890da4749be21297fa5df1173d1e9ab44028fec1f20e92992501d40f3
DotClear versions 1.2.4 and below prepend.php/'blog_dc_path' arbitrary remote inclusion exploit.
ee591c17811452a75e68470252a15b465907877749beed51eff93db7160abd05
Debian Security Advisory 1089-1 - Several problems have been discovered in freeradius, a high-performance and highly configurable RADIUS server.
f275f74c7d55aa83870e73d7e1a2a8b0db5f44850cc54a12670d4d150d119052
dotWidget CMS versions 1.0.6 and below suffer from a remote file inclusion vulnerability.
1e21a05ccbdfec38dec4aca5251f6b994abc82512fdca109f0ce366554c36d84
phpBB2 suffers from a remote file inclusion flaw.
2a4bcbff7a4d2b4acbb3f7f4e090f3b311d5dc0100839be2a11b436c76400761
LocazoList Classifieds versions 1.05e and below suffer from a remote SQL injection vulnerability in viewmsg.asp.
f5d5151f7ccfccc3288bf4c9d0c981a23c4776d3f178c9daff6ae367f702a19a
Debian Security Advisory 1088-1 - Mehdi Oudad and Kevin Fernandez discovered a buffer overflow in the ktools library which is used in centericq, a text-mode multi-protocol instant messenger client, which may lead local or remote attackers to execute arbitrary code.
af84903a19c48ced1c85cbe8572e645eb82c405f6aa29149734a8b10811800a4
CoolForum versions 0.8.3 beta and below are susceptible to SQL injection attacks.
411bccd67efdd6e918ce495bd880511c60235f7adb3b2ea6ae7f61b5ade47a32
SCart version 2.0 suffers from a remote code execution flaw. Exploit provided.
2187d1969b383c0c87587b55d5f0f8a624922c97864ef5494a4e4b9fca951a56
Debian Security Advisory 1087-1 - Several encoding problems have been discovered in PostgreSQL, a popular SQL database.
1350d9f73394fa6a2735b526e2d97ced883b138230871a8578d22caefbd197b4
Pixelpost versions 1-5rc1-2 and below privilege escalation exploit.
fa0f2286d8bbbe9c0c3560251dc481a4500125d16eb02990243e47364b94adff
A cross site scripting bug exists in icq.com.
b95b9c93665bead339aa2f0669f4627e6f0f9b7ff074d4907396ef51eaede855
myBloggie versions 2.1.1 and below suffer from remote file inclusion flaws.
d304cc51d8e9e7f7f316e32e33f3a10981de802148a5bb9c442b2b7ffdd96a52
Pro Publish suffers from SQL injection and cross site scripting attacks.
81f62fe653158cfcf153ea7571366caf6c3bb885d3267688d85202852c8d43c3
The Quake 3 engine versions 1.32c and below suffer from a buffer overflow in CL_ParseDownload.
547961dbe2047e360dd3de22691ca05cea145a3bb0b3155f94bcedc22d747573
vorstellung.php in newsfactory is susceptible to SQL injection and cross site scripting attacks.
77b1e6f7978f3f66bdd409eaa97a6c21c68e59b0743db4b91ab1150bc96d84e3
rpt_menu.php from northstudio is susceptible to cross site scripting attacks.
464e07a329dada1ad22fbecda973b7637791954e8b6f2f0224cff3bc2828bfd2
SMS messages.php is susceptible to SQL injection attacks.
4fc211c531a238ad4ca86a70ff36a3e3c97e9a46d498116bb12d4c06aeac01b3