RUNCMS version 1.1A is susceptible to a file inclusion vulnerability.
fec522d818bddde8f0ed43e3e7d05a87589be35f4652c817945938163449ec81
PHPOpenChat version 3.x is susceptible to multiple cross site scripting vulnerabilities.
eb640f8cd71386f8b9bcd2ff6d49201c80d343e38dfeb94f3d88ebb58c229c92
Linux kernel versions up to and including 2.6.11 has various bugs in the ISO9660 filesystem handler code that can cause denial of service conditions. Script included that tests for this.
3b9fb06993c1ae8e5272ced026e456981eb915235b15ab9645b2d41729a0dc8d
Denial of service exploit that makes use of a format string vulnerability in MailEnable Standard Edition 1.8.
8a00478be0a8dc102229ae0af5901d3d9b81f6f9a086a712f08d589f8d2b366a
The Includer is susceptible to a classic directory traversal flaw.
54583911fad5c3ca95b65240cb846e00bae518d346af5e082ed018982f1ffc47
mcNews versions 1.3 and below suffer from a remote file inclusion vulnerability.
f9e9ec34c301312d7e617b7e6cf832abe7df9d917c55413d2e0a5d1891281851
A vulnerability in Servers Alive versions 4.1 and 5.0 allows for local users to gain SYSTEM privileges via launching cmd.exe inside of Notepad.
0c3423da8217e298682650198193fe0275155764a0bdd9b81c865cb9968d161e
Remote exploit for GoodTech Telnet server versions below 5.0.7. This exploit can spawn a bindshell or launch a reverse shell.
589775b96701523a09ebbc413fcde21a03c4bcb8b334a15046465788ed9e1f10
Remote denial of service exploit for GoodTech Telnet server versions below 5.0.7.
50541d61ec0d111e523e600f46f1c0dd7b440d15b9b035a45d2f1b96478ac85e
ASPjar Tell-a-Friend is susceptible to a cross site scripting attack.
a9859f6f1abf693dd2512f65eba681a508a7d811df9375d5784de0511a0257a2
Flaws in ZPanel versions 2.0 and 2.5b10 allow for remote file inclusion and SQL injection attacks.
9baeafefe182bb444ac7cc84cdac4d719fd8032824de04cb3b76373092c86081
Freeciv Server versions 2.0.0beta8 and below remote denial of service exploit.
04d0aeed31b4422e14a403a60f6530a3c0dea1a0687b0b8551759c2207cbc67c
Local exploit for linux 2.6.11 and below. Kernel memory can be overwritten because of an integer overflow in sys_epoll_wait, and "misuse of __put_user in ep_send events".
fc9331fe6b0eebcc26317aaac23265807b069e0b82669096d868b41bb4e299df
phpBB 2.0.12 admin_styles remote code injection exploit that shuffles back a shell.
845e167f1f189bf60e31d44effd84a843cb6e44ab79a2c488c4a374a19e52158
Limewire versions prior to 4.8.0 suffer from various flaws including arbitrary file access and directory traversal attacks.
cf618d50152470e5049b2ba8b0695b380dadbe6e6d82fb18e342c764068a5cbf
LuxMan 0.41-19.1 local root exploit that makes use of a buffer overflow.
7b01e49311df22b1e782ddfdbb2ef21a26bd6b3b31f09ee7f544b869544f4e19
Wine versions 2005021 and below are susceptible to an insecure /tmp file creation flaw.
86742930b5f70ab2a1840474db279a3dfdac3bd9bc514d58f39b9d20445df058
Ethereal 0.10.9 and below proof of concept remote root exploit that makes use of the CDMA2000 A11 protocol dissector stack overflow vulnerability.
1ceecb4270201dc750be03c55e86e81cd63d1db6a414c779fa45a09c5e791dd8
Platinum FTP versions 1.0.18 and below remote denial of service exploit.
662527f8a0a1c0feddfba34eac142cc791713fc7163d5cbb2f16e79dfa3f12d3
Denial of service exploit for the Active Webcam webserver version 5.5.
43af06f6b9989857961ddbede2f22668b1db4d7847fed577caa4911531fb3b13
PaBox version 2.0 is susceptible to cross site scripting attacks via a variable that gets user defined and later used in an IMG tag.
bb99e378a5bd7a4d9b7e12872dc2af16556ed81e670f86e6f4b5716d85941f76
phpBB versions 2.0.12 and below have a flaw that allows for access to the admin control panel without authorization.
b8a59235613e9e76d6729f2ba7f08567a2ed061dc3fc891e1d0c03668520b2fd
SimpGB from Boesch IT-Consulting is susceptible to a SQL injection attack.
6672398fc735ecec82ebea1c82d475162575c55186e262dba184eaabd0692406
Sentinel License Manager version 7.2.0.2 exploit that makes use of stack overflow in the License service on UDP 5093.
a4cfd3100347273b6ad016300dc53e6a5746d8d8ed1b576320b69ea69a4c4f3d
YaBB rc1 is susceptible to a cross site scripting flaw.
f933d516fdbbe1de8a2df8fba1ed5406fb6babe8894960bc9bd9e3bee0395763