net2ftp, a web based FTP client is vulnerable to remote file inclusion.
05972276c3cfdb0a43b36f69bb8417afa7097db684733b70044072e6f9431b02
National Cyber Alert System Technical Cyber Security Alert TA06-262A: Microsoft Internet Explorer VML Buffer Overflow
7afcdded8979342c0002bad148d2d374ebdec7581eb6d22df8b8e7322d4031a2
JAF CMS version 4.0 RC1 suffers from several vulnerabilities including cross site scripting and php code injection.
ad8294b08d1910de4851208877d43c8decfdf40169f4a030d2669ea2da840029
rPSA-2006-0173-1: Previous versions of the openoffice.org packages are susceptible to several vulnerabilities, including a denial of service (application crash) and a user-complicit unauthorized access attack that enables an attacker to cause arbitrary code to be run. These versions are not susceptible to CVE-2006-2199 because Java is not enabled in those builds.
b00e4cdda3349bd8985c2b406e7fed444423732a5599fa7ac67099cdd62d4062
eVuln ID: WD26 - Live Customer Support Solution suffers from a flaw that allows an attacker to read any file on the server.
6c23fe8083e12b5db67778fa5f203dbde4de36413b7924cd094b2048af076db7
A-Blog suffers from a flaw that allows for remote file inclusion.
1077d5570f91f0cc564ced7475bf18b618b5bb275d07873b4d21b2b2e7fe39b0
ATA over Ethernet (AoE) is an open standards based protocol that allows direct network access to disk drives by client hosts. This paper investigates the insecurities present in the ATA over Ethernet (AoE) protocol and presents some attacks that exploit various vulnerabilities in the protocol.
6f5f1121fa212f6ba378f2274c2af2edfc54295b55f0b7057d7ed3adbec04da9
PHP Invoice 2.2 suffers from a cross site scripting vulnerability.
5038ac7926fa49074b95ffb01e09ba8a3020df360b786a764c686bb25e249ffc
phpMyChat 0.1 suffers from a flaw in ChatPath allowing for remote file inclusion.
2a99e648c24ea3e256659548ce74cb75c260f382fd9335f4aa45dd1753b07652
Vbulletin 2.X suffers from a flaw in global.php that allows for SQL injection.
a586c4cb074197fa6494bd24f76acfb53e8508402a8e973509c969a83d094a4a
CubeCart suffers from multiple input validation vulnerabilities leading to cross site scripting, sql injection and full path disclosure. Php exploit included.
7be55c3a5974ba564355ee56ea7e564a735efb94e0b2d3cc1dbd2fd6d16667d5
webnews v1.4 WN_BASEDIR Remote File Inclusion Exploit.
3acac40aa329a87b6c2b9c6fb142e583086995479809d97e701dd2451f856ed2
iDefense Security Advisory 09.23.06: FreeBSD i386_set_ldt Integer Signedness Vulnerability
06ed2d55db72d0fc2c8f38bc15d96a5c618bc910e7a0c27c86b0268f6315efee
iDefense Security Advisory 09.23.06: FreeBSD i386_set_ldt Integer Overflow Vulnerability
a401fd6acfc845a93e586357178249f58b9337f39f2b84e0b431596c5fae6c86
Back-end versions 0.4.5 and prior suffer from several remote file inclusion vulnerabilities.
23207fd8a3e913ac065914d4cc5975acb17a3d25e1bdb3299716e4f0405e9cb8
php_news 2.0 and prior are vulnerable to several remote file inclusion vulnerabilities.
bb0016bf49266da56ea374a5ca848ca6eb9d6dd563c3cf1ea2ef2b238573b2ea
QuickBlogger versions 1.4 and prior are vulnerable to a remote file inclusion vulnerability
80e0bb097fec80ff63a052b435d89196398d5b547c27319c1a686e624e59c762
DanPHPSupport version 0.5 and prior suffer from several cross site scripting vulnerabilities.
6d7e0f442d386918ea9f5e1ad3a647ccde01c0f3f3fa48ea3f40543cb3e6d5f4
WebspotBlogging versions 3.0 and prior are vulnerable to a remote file inclusion vulnerability
5fc638beba1ea0c81c4252a75ba74dfdaedb02c83f7309b113501ec6debaefd0
Polaring suffers from a remote file inclusion vulnerability in general.php.
d3d54ade883939fbb451bfc71023eb63f96a7e9a335748eac9a7b1737f5b54e4
the "Indexed search" extension 2.9.0 for Typo3 suffers from a cross site scripting vulnerability. Fixed in Typo3 4.0.2.
672e6f39920b4cd59c33e17655829eac6f46a0e66248d52ca2ef1e5b0262ec23
Very small python program that attempts to crack a md5 hash using an external wordlist.
d9432ac047f99766329e140a2cff5d6332507aaf07eda2699e62f22d3b80ae5d
Shadows Rising RPG is vulnerable to remote file inclusion in cpanel.inc.php
07c0d038cb71d8594974ea828297f117a94c74f3e051f9ef3123eb3083236472
Simple MySQL brute forcing program written in C that uses an external user and password list.
947a89b03512033a3418df20aa8295c4288d94c88b8991cd487561a3ba57a0b2
Echo Mirage is a generic network proxy. It uses DLL injection and function hooking techniques to redirect network related function calls so that data transmitted and received by local applications can be observed and modified. Windows encryption and OpenSSL functions are also hooked so that plain text of data being sent and received over an encrypted session is also available. Traffic can be intercepted in real-time, or manipulated with regular expressions and action scripts
d10e18c9e1b0a1c6efdff4557cbcb55a342a8fca721bd7feff6117b515a49f92