PopnupBlog version 3.30 suffers from multiple cross site scripting vulnerabilities in index.php.
3e9ee35055fa5c97c7a10632d65981c1f8da82ed61d120f0eb8e9b1054c6dceb
Crafty Syntax Live Help versions 2.14.6 and below suffer from a remote SQL injection vulnerability.
64d8d5a4d5584020885aa211271e020ff1a652044d38061ffb50dddcd2edf986
ezContents CMS version 2.0.3 suffers from multiple local file inclusion vulnerabilities.
5b392d4253a69ba1f8117510c21e9f1ebbdced0ce6339fb4559869611b4acf2e
Pluck CMS version 4.5.2 suffers from multiple local file inclusion vulnerabilities.
beddc1ce8725dcaee0c7917067ae3d99d8b0c7b92f3b44b3204fb87ff15b22ec
Gorani CMS suffers from a blind SQL injection vulnerability.
b40acb094b1af6eac7f1763d52e1c058a506e292ff82be44e50cdc03591c5354
Neoteric UK websites suffers from a remote SQL injection vulnerabilities.
6ecf1dbb106824debeaf29e7da9b9bb8d4a3e0ce2f3574f37dd2e1d6b75e7722
Million Pixel Ad Script suffers from a remote SQL injection vulnerability.
f1b0356e722f5d3fdc945046998f3d398e4bf5be94decd8c618048cb12bef796
GeekLog versions 1.5.0 and below remote arbitrary file upload exploit.
b26c8c90b9bdacefdee0d88c4e2998d9a045932ef4956cdb2db9cd5c43e295ef
WebBoard versions 2.0 and below suffers from an arbitrary SQL question/answer deletion vulnerability.
fe1a3896a065d34797ca808aea02ccc2e2f416ff54cbe6e28d2e1e2087fcadc6
Web Directory Script versions 2.0 and below suffer form a remote SQL injection vulnerability.
36471eff0f93c7571862502aed38288fa57f06de4f2dbd64bf423bd3d2765353
65 byte NULL free /bin/cat /etc/master.passwd shellcode for freebsd/x86.
bf75fbba65f9c2d9805dac05cb9b181b3ddf504b414102d4ab8ea326f74b262d
Secunia Research has discovered two vulnerabilities in Calendarix Basic, which can be exploited by malicious people to conduct SQL injection attacks. Input passed to the "catsearch" parameter in cal_search.php and "catview" in cal_cat.php is not properly sanitized before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Calendarix Basic 0.8.20071118 is affected.
358d37fecd8acb96000a176d4f4e2d18a9dfcb997de501582c7456288498588d
Secunia Research has discovered a security issue in Novell iPrint Client, which can be exploited by malicious people to gain knowledge of potentially sensitive information. Novell iPrint Client 4.36 and Novell iPrint Client for Windows Vista 5.04 are affected. The insecurity lies in GetFileList().
2c3c2243ebc9b5ac67f52da83e31f5e81556363c6029b2679375d9ac3b7e40a5
Secunia Research has discovered multiple vulnerabilities in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system. These include boundary errors and buffer overflow issues. Novell iPrint Client 4.36 is affected.
e1d4ec43ab4fff51d3a1817235f89f3457a927d567c596a2f6258abe63091fb0
Dana IRC version 1.4a remote buffer overflow exploit.
f40b7b219e0a183fd81248a561c10ef3d29439d3f9cb6481b4229b294e4c94f1
NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.
a228a2f1838d73cf31064923f71c3c61b75176044136fca403ee7ba79f0282b7
fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.
c2835d4522a45737392c181df6459fb3db2755b779a246601d66359fd8e12d20
Belkin wireless G router and ADSL2 modem authentication bypass exploit.
8ce8143e597ced9c7dab89d51e2bdb1e108d115ee28193bc7a9dcfe34a4a08be
Pardus Linux Security Advisory - Insufficient sanitization can lead to Vim executing arbitrary commands when performing keyword or tag lookup.
1af038f49dd7be46df684cca00b19f3590775e4fc513b99292bcdeb1e65d3219
Pardus Linux Security Advisory - Multiple vulnerabilities have discovered by g_ which potentially can be exploited by malicious people to compromise a user's system.
19543faebfa0c824149c043f1f5ca4914a2d200771201b1afa424f14923c36ef
Pardus Linux Security Advisory - A vulnerability has been reported in Libxml2, which can be exploited by malicious people to cause a DoS (Denial of Service).
64c355dcce91e0b0f828984ad3723412eb26fdf00f38a5667c4504d985959f28
149 byte connect back, download a file, and execute shellcode for linux/x86.
d67d04dd640e5e8e64dd7aa188fb64ebe0807bf415e57a234d0efcfc60be458c
Matterdaddy Market version 1.1 suffers from multiple SQL injection vulnerabilities.
11d0b6202382e5eb2f71bc99ef8fd6ac20eeac3dd9fb9eb9604da29c14f31a0c
BtiTracker versions 1.4.7 and xbtit versions 2.0.542 suffers from a remote SQL injection vulnerability.
0fa6d573893adc76791d44b0b6f3998218991237eafe5070781528a685b61ed8
The password checking routine of Grub fails to sanitize the BIOS keyboard buffer before AND after reading passwords.
e6830a2e51a4006859ef717174a6c7a9f4a2c589b17b9d1341a3caf2fa43c057