The P-Synch Windows domain password reset web applications style parameter allows JavaScript injection.
c811e757dfd03f032fd13506676e048f9ede59a8110969e28f822537f3024761
The Visionsoft Audit VSAOD server allows unauthenticated remote uninstalls.
32402fc81e4ee4ae9e23d1ceb60cacbf198a7d5fc6b22292f9f6fc8f8265bdf5
The Visionsoft Audit VSAOD server allows remote execution via replay attacks.
004207ae5040f7c23e2f7d9ad194d7a20cac4fec06e9f90ca3090225f8f4378b
The Visionsoft Audit VSAOD server uses a weak algorithm to obscure passwords on the wire and within configuration files.
b6fd4cef86a7b3de8087f1a06c1b54ae2bd07778dc4aaa91dcebb564068f580a
The Visionsoft Audit VSAOD server allows unauthenticated ini file overwrites.
080c13ef81c71eead5eac67e36b28638bf7df5074f26812c3f11e624fd39d0bd
The Visionsoft Audit VSAOD server has input validation flaws which can result in an unauthenticated heap overflow.
35bcdad69de32a6aedc37641dbe69fac6033d3ecd0cdbb3c608b7eb0b1ca6942
The Visionsoft Audit VSAOD server allows unauthenticated arbitrary file overwrites.
6d06f3e515cfdc1f95baad70dd94df729268176755bcede76369cf643d89352f
Nth Dimension Security Advisory (NDSA20070524) - The JFFNMS application has high risk issues with its authentication mechanism. These can lead to SQL injection allowing authentication bypass and Javascript injection. There is also a potential backdoor although this is unlikely to be exploitable. The JFFNMS application has default PHP scripts which can lead to information disclosure as an unauthenticated user.
474819ff3749ac56f3c7f1d1b13919e237c6efaf980c43a4b2095a7bf984b293
Movable Type suffers from an arbitrary code execution flaw via the upload mechanism.
0b31d6a0dfd7abcd18c560458c0d9865a7390a60e5b854f71a8693c098b4eb2b
Movable Type suffers from a potential phishing related vulnerability via the comments mechanism.
3c276beb395f5afce929267deecd680a8fb1ea1fa06b682a26d11a36b1c85b2e
Movable Type is susceptible to a javascript injection vulnerability.
ab5a992f85b2ddbd9fe71384246afd15acf38ae095b23d76906d5e3cb5b11f18
Movable Type suffers from a flaw that allows for an arbitrary directory to be set during the creation of new blogs.
2c3558d86ef4ec68aded9d4cc30ad144683d5f54bbd56ee0b46e418c480f8eb4
Movable Type stores the login and password hash of a given account in an issued cookie allowing for replay attacks.
cd1e46735a3e9f778946e48e9a468c364cceb7f4ac9114579998620651d40587
Movable Type suffers from a username enumeration vulnerability.
ee29ddfeb701b4ef2d1a0e50162a49a9860abd02f5f86b163015b33f088e5a20
Nth Dimension Security Advisory (NDSA20070412) - The D-Link DSL-G624T router suffers from arbitrary file inclusion and javascript insertion vulnerabilities.
63d8bc93ef24b7dee086ae1ccdae3dd0f4a713ee1c672a963e39926fea334594
Fuzzled is a powerful fuzzing framework. Fuzzled includes helper functions, namespaces, factories which allow a wide variety of fuzzing tools to be developed. Fuzzled comes with several example protocols and drivers for them.
756d0936668277d0a6e297852e5b8e31741e59e53616005718f5af29870b22fe
Nth Dimension Security Advisory (NDSA20070206) - The FreeProxy HTTP proxy server suffers from a denial of service condition which causes the server to hang. This occurs when an attacker makes a request for the hostname/portnumber combination in use by the server itself.
c7b12f6799051d5027341db08ed250fa1d21493fba113dbb006a7fc84bbdda28
Nth Dimension Security Advisory (NDSA20060705) - The IPCalc CGI wrapper version 0.40 is vulnerable to Javascript injection within the request URL.
513ab8a7e34357e669b4f147dd257356d71af53e3132e6abbcdb05f40e3bba13
Movable Type blogging software stores the admin username and password hash in a cookie, leaving the system vulnerable to XSS.
e717f6c404ec08c8a538f3e595e63353134ba9c9d6f6977e7706f15dd003b701
Nth Dimension Security Advisory (NDSA20050719) - Mentor's ADSL-FR4II router, firmware version 2.00.0111 2004.04.09, is susceptible to unauthenticated administrative access, downloading of configuration files with the system password, and denial of service attacks.
0f83b740a762a56491cbed35335983e8fef2cbc2304efae7c7441605de1e61ae