Tempus Media version 1.0.0 suffers from a cross site scripting vulnerability.
b321ad9531ccf22daa2bd9c0ab212cceda9f2ee2f96b4f79d71915a9b9ad3537
ZipItFast version 3.0 .zip file heap overflow exploit.
36a895415c604e3f4a10ed45fa762309d60ce5d4547e36c2496ee6c5d3122432
Remote code execution exploit for phpMyAdmin versions below 3.3.10.2 and 3.4.3.1.
f5f22298bd549a0b165bd80aca48e7785c5491d504015ab5cf318f76a751fd27
phpMyAdmin Swekey remote code injection exploit that affects versions prior to 3.4.3.1 and versions prior to 3.3.10.2.
ad7c03013a93cbfc3a71ddcf1e0e7a96dc3afaf12cd89e7617e169215191b09f
Portix-CMS version 1.5.0 RC5 suffers from a local file inclusion vulnerability.
d75f99a58ceda336355dab7dcfcb6804faac7552beedefd20add8f01c2e9c542
ZipGenius version 6.3.2.3000 .zip file buffer overflow exploit.
e621d0fb009928678cd0ee110533f5387aac241d20b1631a2350be79c4d13055
Proof of concept exploit that demonstrates a man-in-the-middle vulnerability in Symantec Backup Exec version 12.5.
3979851cf1fa7192520b4f86ca9af1ee3e958064a4ce2ca510936f5e993712ee
This Metasploit module exploits a stack buffer overflow in process bcaaa-130.exe (port 16102), which comes as part of the Blue Coat Authentication proxy. Please note that by default, this exploit will attempt up to three times in order to successfully gain remote code execution (in some cases, it takes as many as five times). This can cause your activity to look even more suspicious. To modify the number of exploit attempts, set the ATTEMPTS option.
ba8634a1f89adc72bb1fa6c7125d662b2e0d1e9a7d1b79249e69e1b06460f06e
Secunia Security Advisory - A vulnerability has been reported in Hitachi HiRDB, which can be exploited by malicious people to compromise a vulnerable system.
e429224bc3a0651da95f766b2d3d89fcf19b5f1a3fbc5085ee5607b9efc70f8c