paNews version 2.0b4 is susceptible a cross site scripting vulnerability.
baed6369a954fc4957ef416b7fb87822b7f310b87774c9c755c279b175ac521d
DCP-Portal versions 6.1.1 and below are susceptible to SQL injection attacks.
369368397a17c90a555f6596b0f62881bc06f75c9a278a76ba4dc9ad4c756c8f
osCommerce 2.2-MS2 is susceptible to a cross site scripting attack.
ac6bf46dd191498b292341b2d089922e0f769e893ca80ab4d7cc6dba4fae7292
Kayako eSupport version 2.3.1 Support Tracker software is susceptible to a cross site scripting attack.
701cc0d2f840a611aa647b2f19cf764e6408a3c48a2b94eb0985d849c4311ec8
PHP-Nuke versions 6.x through 7.6 are susceptible to cross site scripting and full path disclosure flaws.
ca13a3e75891adf42e3b2fee30849b14966b6f3332fc95157f18f35ac28d7a5e
CubeCart 2.0.4 is susceptible to full path disclosure, directory traversal, and cross site scripting bugs.
81f97e6ee0721e5fa871122501e8bcb048eb473ab6dbf4f6b188525e71045591
Successful exploitation of an input validation vulnerability in scripts from AWStats versions 6.3 and below allows attackers to execute limited perl directives under the privileges of the web server and get sensitive information.
1a226b0593c65789e7210aa2a9b495c75d9c954dc2b889e5c30d5f93af90474d
Proof of concept exploit for the Quake 3 engine making use of a flaw in the handling of big queries.
13956c6e8d433fd1a581c534b1b76326451860d9807d8e671cb9533aa35ae846
BrightStor ARCserve Backup buffer overflow proof of concept exploit.
7d0b4a2e24e12ce44e33a8962a865ecfdab582d552df7e09621a2b9dfe423cca
Armagetron versions 0.2.6.0 and below and Armagetron Advanced versions 0.2.7.0 and below remote denial of service exploit that makes use of a fake players flaw.
b70f930ff4433cd490eef0c61fe59ee24d95a57041c6307ed4fe8e6891c4d910
Armagetron versions 0.2.6.0 and below and Armagetron Advanced versions 0.2.7.0 and below remote denial of service exploit that causes crashes via big descriptor and claim_id fields.
04b43dedb12a6cf4e6d7997117079eb6e3cdce410084ab36845aae2b1cb49093
ELOG version 2.5.6 and below remote shell exploit. Includes targets for Slackware, Gentoo, FreeBSD, Mandrake, Fedora Core 1, Debian, Windows XP, and Redhat.
2f0be5f4ffcc4b64e7f89322b4934d525fd19649bcde7c18cf2b2398d88e016e
Prozilla versions 1.3.7.3 and below format string exploit.
ce4f5605fb2d005b96931f346390bbafba7ca87d6d0324af7f7a06ab6b6dfac7
DelphiTurk FTP version 1.0 local exploit.
7b2edbd886fa5926e7ff8db32dec2e47e15c9862d007aebfe62c1807f75cc664
Mercury Board versions 1.1.1 and below suffer from SQL injection vulnerabilities. Detailed exploitation provided.
23ea46dff8eca495cf9d1561a86e7c38983ac523a335371c8657203321701552
Proof of concept exploit that makes use of a directory traversal flaw with RGP files in RealArcade versions 1.2.0.994 and below.
962ad2be6158967b0cb8e38e82dbb988f520bbb6b77e04e566e6b1c37b2e9b1c
Proof of concept exploit that makes use of an integer overflow in RealArcade versions 1.2.0.994 and below.
4ce4c8c83fbaba2229272915e034271f2135a47a08c5f10282f6f0d6cba9fadf
php-fusion 4.x has a bypass vulnerability where a remote attacker can view any thread.
c7ed125f9030d5ddd42cd6eefbd5b3f3c4ed2a1d8327228f82d6f55f50e50a2c
A sign extending bug in AppleFileServer exists while parsing a FPLoginExt packet. Exploit included.
f172aaf165f55268a1cc2d2eb0e697bd235cf9e069b14565a19c5b48a3a6788f
3CServer ftp server version 1.1 remote exploit that binds a shell to port 1180.
b5968e526f536105d0b7f4dd141a4dd4e87ff1181b770a5035d8b3578d83f457
Local root exploit for the PerlIO package that makes use of a buffer overflow in PERLIO_DEBUG.
9d0552984b75d1eee91c3d55047ad2d3a217517c70c32a822a80f3f6ad4a4f98
Local root exploit for the PerlIO package that makes use of a flaw where manipulation of the filename set in PERLIO_DEBUG allows for local root compromise when using setuid perl.
37c8e812ac9515d45c3ee54cc72ae33c4155953042f46623108ce7b9ced75a3c
Mac OS X local root exploit for Adobe Version Cue that makes use of insecure path.
017cece775091cace1f674e295d3b3f0bba7d27840068e165334ad1654ae1d51
PerlDesk version 1.x remote SQL injection exploit.
e34bc935547597b87bad620eb8eb5c828670151482eadf48731c111052cd5e75
The Finder utility that Mac OSX uses to launch and manipulate files and applications fails to check for hard linked files before performing changes. This allows an unprivileged user the ability to overwrite files as root. Full exploit included.
607bf00b82581926e1ae755d2297dd135f36f47351d4a9b69559b86cf1ab5d89