dotProject versions 2.0.1 and below are vulnerable to multiple arbitrary code execution and information disclosure problems.
65d278cfd1e0fb5de0c01a4650d9eb60a82d1f8ca72d701d3d4d18e7db65063f
waraxe-2006-SA#044 - XSS in phpNuke version 7.8 and older.
ce82cf015db258e8ead19ce271052cd72aebd9aa649c6173ec1c5bfb830a570d
PHP Classifieds version 6.2 and lower suffer from an authentication bypass vulnerability.
4b8c16384943dc39537120913f0a9674df13a3ec5d8a7b58c899bbe2ab481c94
Power Daemon versions 2.0.2 and below remote format string exploit.
39a8b85e05a16b3857c96bcb51cc1ee38fd0e29b3cb64210d0c45b3de0471118
OpenVMPSd versions 1.3 and below remote format string exploit. Binds a shell to port 31337.
34c8403152d1b4997f141bd55afc9628f8378212a498478c212c889ec346fb10
Microsoft HTML Help Workshop .hhp file compiled file header buffer overflow exploit.
d8c8e6100f377fb5a222992659e174f484e4a84eae0b3d385a7a8557f67fa7d1
Mozilla Firefox versions 1.5 and below remote command execution interface that makes use of location.QueryInterface(). Max OS X version.
7c6bea30c17ae1b878021bf81a94043f8b3f1890987d1740121af33489ac7eb2
This Metasploit module exploits a stack overflow in the Qualcomm WorldMail IMAP Server version 3.0 (build version 6.1.22.0).
8a121139f249e6548cbc7820b46b86c8b80b4461dc890da11b6984bcb56cc9f0
Mozilla Firefox versions 1.5 and below remote command execution interface that makes use of location.QueryInterface().
27403aaf40c5cf1757082c221602bd936a4ba0e10502192e6ae985fd103555ee
FlySpray version 0.9.7 remote command execution exploit.
08e4e0364fcebe84eab16cb684c4d150629df368ed8fb9360d9aa06927987008
EGS Enterprise Groupware System versions 1.0 rc4 and below remote command execution exploit.
4a055c7a495058d0eaed542b5f4a20e534396b2e877bcfb7634554447035c506
gastbuch versions 1.3.2 and below are susceptible to cross site scripting.
10800f5d68d19645c993ed7441ba1f86c4a93f2b7c2442a311397c86bf4e10c7
everyone.net suffers from a cross site scripting vulnerability.
faa21458375340fb658623afc01ab5f9d714d590ae8de211b90a17527e637322
Clever Copy version 3 is susceptible to cross site scripting attacks.
bb659a8d787b7e02bd56556f78253d2a98ac3acb4f3c0e4e65cde661fbfbf38a
phpstatus version 1.0 is susceptible to authentication bypass via SQL injection and an issue with cookie verification.
ac582903f48ff5fb734560491dcfc953a46e989140dabf9069e4768ba27887af
phphd version 1.0 is susceptible to authentication bypass, SQL injection, and cross site scripting attacks.
dd4245be5d5106d9c2af9125bdb87d0380607c39a5d75335623e00673c77c321
Privilege escalation exploit for Windows networks using weak service restrictions.
34bff3fb3d15bec768c08cd8b636431feca0c25ff6e698753eed31aa91257bbe
DB_eSession 1.0.2 is susceptible to SQL injection attacks. Details provided.
0c4bfa65000f352328789779fbba47a37f9db793706e672cbe7275c9751558fe
It is possible to bypass Fortinet URL blocker by making special HTTP requests. Proof of concept perl script provided.
5dd916680286e804f6dbba8e52af19008d76c533f0844268f71cb39b1c0a9cc9
Invision Power Board Army System Mod Version 2.1 and earlier SQL injection exploit.
e79905219129958092a62173bde4e1690e49d31286dea8aefd523c65bbb362f5
The default installation of VCardLITE does not remove install.php leading to remote code execution.
591812a313d35f631224cd2d21366f80578e7cb6754e0e6013a781753bff4dd2
DocMGR versions less than or equal to 0.54.2 arbitrary remote inclusion exploit.
8f43b3c2374f928ec272502525294bbf093540b5e37c536e1abe0d22716644ef
phpht Topsites suffers from Authentication Bypass and SQL injection vulnerabilities.
213287f699c950aabca67f9c7c27689dddf1ec9f122187b40a2e7b5ea12ada3d
phphg Guestbook suffers from SQL injection and XSS vulnerabilities.
a0752210d88fc6404dca68e23fbeacafdd89300478373ac2c6420a3bb60836e9
The upload script in ImageVue 16.1 does not perform proper checking, thus allowing an attacker to upload a file to any writable directory.
24a803315facb9fc1c45027e328c38457d94c691b23f352808c3454136e1849c