The Joomla Guide component suffers from a remote SQL injection vulnerability.
582ce7ec14e6b908224810c6c3b67f6df11e933bf0fb6e610bf2ad5cafc916ea
ASX To MP3 Converter version 3.0.0.100 local stack overflow exploit.
6eb62e4f91052414c2c87bb2e24ccb2cc228de70545575ed71a52db3b1fdba3e
RM Downloader version 3.0.2.1 local buffer overflow (SEH) exploit that creates a malicious .asx file.
0e08cb5e17b35dae129f043078cb15f33455e7726551b065dde6216f029f4dcc
ASP Comersus7F Shopping Cart suffers from a database disclosure vulnerability.
f329299b7a543108afdc126da75e2e2c935be8430bbc13c85c1d95f1b3a1fc94
Easy Page suffers from a cross site scripting vulnerability.
3d0e4eb618caceb7a05eebb0fd603c7cc93d96a3b9a75e37d33aeaf1003b8cd6
The Joomla Xmap component suffers from a remote SQL injection vulnerability.
a2c881ed75bffa97fc8d2e64d5e8c0bc6705faa9be17070b2890678e5c19640f
The Joomla Weblinks component suffers from a remote SQL injection vulnerability.
f7abed5b1e3fc9c469ec4bc657f6e4ea67b816feadd281b8d1527b94009557eb
OneCMS version 2.6 add administrator cross site request forgery exploit.
8ab8915fa1505c926a2308d040a9378f814880aab9448fd823e751fc2b13fe15
Powie's PSCRIPT Gastebuch versions 2.09 and below suffer from a remote SQL injection vulnerability.
a877dae77f90cb557ee806ec7270624ccd227158f317bddab76bdcc60d3f1812
The Joomla Radio component suffers from a remote SQL injection vulnerability.
a9d001fecc7d6b066d3bfcccbd3d131d42d4c224aead4a13dbec9675a6ce24eb
The Joomla Business component suffers from a remote SQL injection vulnerability.
15a2efdf2f9a9819a16ad7682dfe74da30c48150e4b51f94f825cc6f4b97ba96
The Joomla Departments component suffers from a remote SQL injection vulnerability.
10aa99c9ce2c211ffc6c2ad26d6beb4f193f459788a2cad9a70ff934455a4476
ASX to MP3 Converter version 3.0.0.100 local stack overflow proof of concept.
b26a4687332849aa5253a9e509e57a89dbb8eb40b0b6376f44dfc9c0360cdb3e
aircrack-ng and airdecap-ng suffer from a denial of service / crash vulnerability when reading specially crafted dump files. Exploit code to generate said dump files included.
b40761105074bbca410e972c1e0f176ba38ecfa43d8ad420888d18ef5a548d02
PhotoPost vBGallery version 2.5 suffers from a remote SQL injection vulnerability.
a9e866c249ce1d2b696110e23e901d508b3e238c35f78be9b7bb6a6550f273c3
This Metasploit module exploits a stack-based buffer overflow in EZB Systems, Inc's UltraISO. When processing .CUE files, data is read from file into a fixed-size stack buffer. Since no bounds checking is done, a buffer overflow can occur. Attackers can execute arbitrary code by convincing their victim to open an CUE file. NOTE: A file with the same base name, but the extension of "bin" must also exist. Opening either file will trigger the vulnerability, but the files must both exist.
fc09c8dc01c38a077fed4faed0017f5c4c92e09f67b17b911db36ba4850952ae
xwine version 1.0.1 .exe file local crash proof of concept exploit.
b9643633f7d5a68cbe65a1d44af0a460083068522c82abc63812548b840fa245
PayPal.com suffered from a cross site scripting vulnerability.
6774aed58d76defe6afe169dfc07e49e4df024c41e35159681c6dcf99fb6f591
eDisplay Personal FTP server version 1.0.0 post-authentication stack buffer overflow exploit.
c49aaf762a0914bd4a4eb0937c666a2db581cf53adb618bac88e733e6f97cb66
Stud_PE versions 2.6.05 and below stack overflow proof of concept exploit.
83588a7c15c4abe8daf20aefa8cdf7a3646d497fcd87b70257a549f6658bc8d7
SAP MaxDB malformed handshake request remote code execution exploit.
29fd30d3dd3532eac58c280410d3c30796a92b529bbbd3086a27ae05d93e30b4
The Joomla Tariff component suffers from a remote SQL injection vulnerability.
c2ff733cd6e5510fd0572ed47869ace5e9509ac46b940e420480949c9e389277
The Joomla Units component suffers from a remote SQL injection vulnerability.
e7d2430a38b9e47c2f37d381c6fd7214a49cc97637dfb8ed856c23005bc86cc6
Devana suffers from a remote SQL injection vulnerability.
cf43a34b7c1ded53836470dfa85310fafbcc6decaa8b8ac00d87d9bb9f42cb71
TSOKA:CMS versions 1.1, 1.9 and 2.0 suffer from cross site scripting and remote SQL injection vulnerabilities.
ca19794175424edd62bacea2edd85933a145b94c9339d44c184679e5c6c87bda