Dalai Forum suffers from a remote file inclusion vulnerability.
1cf145147fc494de7f02b8fce8cb2ceb259871a5a6b2bb59fc30989a953b4adb
Proof of concept exploit for vulnerabilities in Toribash versions 2.71 and below.
bc7f5880bd7b38c848149f860d5730d6ded7c35e331dd519f7c18c903a4602cb
Denial of service exploit that demonstrates a buffer overflow in the logging function of the Unreal engine.
256616a46fd983fd5ab187b9b434b3f728d79cf9edac8d029f1e4dce45b796bc
Belgacom suffers from a cross site scripting vulnerability.
8ab58d37525d6a6542d5eb3bb46aa6df3411a25f2be4e56bd3a6088a2131408c
Mercury SMTP remote preauth stack based overrun proof of concept exploit.
5269ff7da8174aa44d0cb1467b56b47b2697e9bda21d10d34f14eeaa3def9b29
discussMaster version 2.0 suffers from a cross site scripting vulnerability in forum.asp.
977a0c9a0ee0e72488f752f1bd8c16a4a7201e7734840349f7ab8ef123991b9b
vBulletin version 3.6.8 suffers from multiple cross site scripting vulnerabilities.
8c03dda12ce7d1b518b319542f638585350aa1e97c86953599391c8807734a79
Squirrelcart versions 1.x.x and below suffer from a remote file inclusion vulnerability in cart.php.
39d0ce655f4bb0e38b5a090eaee614ee276852a083b19d7b1d10ee2943c62918
The ASP.NET version of Text File Search suffers from a cross site scripting vulnerability.
66263ba1b03a3bc49325c2ae5abed2036b824a42558fbb63ba016b1bcac46d90
Text File Search Classic ASP suffers from a cross site scripting vulnerability.
d9304302bd0601615327d029228a49aee51781e275fd51fa35cf5596ebc7ccbd
Template Security has discovered a root privilege escalation vulnerability in the BlueCat Networks Adonis DNS/DHCP appliance which allows the admin user to gain root privilege from the Command Line Interface (CLI). Adonis version 5.0.2.8 is susceptible. Exploit details included.
219aa7d9b7cf70a7456a29006c7032444b70633a33926ddf828895ebe52d9a93
EDraw Office Viewer Component version 5.1 HttpDownloadFile() insecure method exploit.
0087365c213a194631e52cec6d5a488a7e66652d404dc2be8c61f20c07488d4c
2wire routers versions 1701HG and 2071 Gateway are susceptible to cross site request forgery attacks.
6e7c23ea90ad8a1a27332592fa4fb20f3c7323f8e82e7c0ce27f431e06c7a3ab
Systeme de vote en temps version 1 suffers from a remote file inclusion vulnerability.
34c3272761112f763b48754f773655644abcd5449e12e80d542c3d77622da7cc
Zoidcom versions 0.6.7 and below proof of concept exploit that demonstrates a crash vulnerability.
138fd40e2de6eb84ad1259c781269ae1077d0bedea7a2ecaa48a56bea5fe28a1
Babo Violent 2 versions 2.08.00 and below proof of concept exploit that demonstrates multiple vulnerabilities.
bd1d92a75ce86e15b8e3df93845f1ad8307b2d173d06b3178b1ed0ea01de1ad3
Live For Speed versions 0.5X10 and below proof of concept exploit that demonstrates buffer overflow vulnerabilities.
0c6a89beb4a07b95ba34a7e6422d06439298f78de9f2f3aeece9e5828367709a
Easy Chat Server version 2.2 remote denial of service exploit.
e808d4c896bb783af02f943cc5328938b5c1135d16e27970900772552d7acf12
IBM Rational ClearQuest Web suffers from a SQL injection vulnerability that allows for login bypass.
1a8eca469402af864b35b5c2315573875eaca2bb769839401f4544dd6d947838
WireShark versions below 0.99.6 suffer from a denial of service vulnerability when parsing MMS messages. Denial of service exploit included.
90ada8e6d8d19f8c14348b012635138ac41888d2f21e0390cdda97eac4b912b5
Tomcat versions 5.5.0 to 5.5.24 and 6.0.0 to 6.0.13 suffer from a cross site scripting vulnerability in the host manager functionality.
84aa48ad32c84fc16f0e577cc862d655e1f81b84b1b780d61e5ec1d8d0ba64d7
PHP Blue Dragon CMS version 3.0.0 remote file inclusion exploit that makes use of activecontent.php.
787c73177eeb6c46b9235d0b3b8653a8d573a4e7f7cbd7a372ae1fb6d76c5b20
Surgemail 38k 0-day exploit that binds a shell to TCP/9999.
2052618648a56a9ccd597ea688048dd537cfebbf52f8785381bc86f1e8435311
Diskeeper suffers from a remote memory disclosure vulnerability. Exploit included.
70b1ac6a87eb969c45bd180714db1c04207811ba0e89f4133de0a96569224a90
JobLister3 by SkilMatch Staffing Systems is susceptible to multiple SQL injection vulnerabilities.
8378fbfda1a01be6ba640c5e923cc4bedd7795765b448ddb07773378d9ddbdf4