This Metasploit module exploits a stack overflow in PeerCast version 0.1216 and below. The vulnerability is caused due to a boundary error within the handling of URL parameters.
5df98c072ead0db9bfc32de3fd48f0ed1721865288b1926f120f6f47bf449043
This Metasploit module exploits a vulnerability in Internet Explorer's setTextRange on a checkbox.
d88d10eefc1151c15d86169bcb06ae44b634aacc19080eb4cd937c787a9843d3
Microsoft Internet Explorer createTextRang remote command execution exploit. Tested against WinXP SP2 RUS IE 6.0.
a2766d515bd66ef3fd37e9617c76b3ab7d6de03231a59be4454f195a4b5f3907
Microsoft Internet Explorer createTextRang download shellcoded exploit.
9adfd05f0d777459838812e04ced967b108595b6b9d3acd4e3a6ce8307b51816
GreyMatter WebLog versions 1.21d and below remote command execution exploit.
ad617062aff17f427e3bbad02653ce94694faa679458a3e75bfb3f7e8092f652
GreyMatter WebLog versions 1.21d and below remote command execution exploit.
b607b78672cfa0b6607c9223bb9272c64d54b00df086a8e659cdaf0c1d9efa34
rdist NLSPATH buffer overflow exploit for Tru64 UNIX 5.0 (Rev. 910).
4c4a19453affa5482e5bbca99f5e8e7e6d25e7f2f3f895644df68abc77e86074
edauth NLSPATH buffer overflow exploit for Tru64 UNIX 5.0 (Rev. 910).
f73421b49ce9bd7859f4e56e743fa6c9d04c1db4b6d1f331a4c65e5863484bf0
Maian Support version 1.0 suffers from a SQL injection flaw allowing for authentication bypass.
283ea12b9fb8215868c76df046f3dd365903dba00cc56ed89772730e5dea9413
Maian Events version 1.0 suffers from a SQL injection flaw.
5fe7cbd8f8a97ff006e00911b015e012293a2d4ce39f04e1c0d24cb7e4537bdb
Genius VideoCAM BN is susceptible to a local privilege escalation flaw.
c6a5fb176d590a289db5941aa235aa32e3610ef9d31ae14c0f34c7b8c0a3d29d
VWar version 1.5.0 R11 and below remote command execution exploit.
b4bf7d3fa3219423536b9e28e36b61aaf94d831b2b7a74812717fc00a9893f44
All versions of ExplorerXP suffer cross site scripting and directory traversal flaws. Written in French.
13ea3c716c7168598c296075e5b0c01df9475c8fb2d5e2692c305bd486810b68
AL-Caricatier version 2.5 is susceptible to cross site scripting attacks.
81a3e146413c3532574a6bb29c11fffc524f76d947a6399666918d72a881e61b
PHPLiveHelper version 1.8 remote command execution exploit.
ceca173446a7363d1d1d93cf29b2fc8934649ad94204b53f42038112bb472d8f
Blog Pixel Motion is susceptible to SQL injection attacks.
6038e3b04a9b81b93d2ffb163eedd1d4b43789b825db49907cb03288d17ec6ca
G-Book version 1.0 is susceptible to cross site scripting attacks.
55caf33a0e431317f6b91fa2044049b0931196d0611346b3c60a5f80dc76164f
CanfTool version 1.1 is susceptible to cross site scripting attacks.
248b9ef0708c7466364156e48b114fa4f23dda7bf0802b2297a40ae711d30ea6
phpmyfamily version 1.4.1 is susceptible to CRLF injection and cross site scripting attacks.
f676c2bb623ad32216500b2d97cf2962cc455911e0cdc23bf34c40e72618b406
VGL Forbin is susceptible to SQL injection attacks.
f885e49e3ef5f5b8885c312dcec9ec1a3181f23953c8a1f090d48c66d0f4d0d3
nuked-klan is susceptible to SQL injection attacks in index.php.
9bf4ab605f000a8cc60a3157335e5e8c062558281eadd229814ae0027ad3faeb
SaphpLession version 2.0 is susceptible to SQL injection attacks via print.php.
ac25350cd13b9efc31a39b5f047fa535b6f2b4ab9ab61f6463b4a7b7468bec26
UBBThreads version below 6.0.3 are susceptible to SQL injection attacks.
7958ae99e80d01957defa5390d6f9f9fa35135b22025db9396e8b54f3de94a00
Suspect CMS 0.2.0 remote command execution exploit.
bbb8a4fc07afe1d6b48c03ed19cae63d751e6f1722410aec0922d4070645a8da
beeceen CMS is susceptible to cross site scripting attacks.
8f817fd7a7a1fc0256e83c0858fd3d4feeff7611dc2f9e814efcd75c984b38d0