Chilkat Zip ActiveX component version 12.4 multiple insecure methods exploit.
23d0231520e381bda68cb57b4f94b01909cc5f5719e6d126cf99e63dbfbd2d06
NeoTracePro version 3.25 ActiveC TraceTarger() remote buffer overflow exploit.
11d3f30745554bc47b955ab0c7601ddc908689f79b7a829efcc671e96a905865
AP DB version 7.4 WebTools remote SEH overwrite exploit.
f2a112f5e51a381667eec278a104f6f466ea2d7699473049500bd5a026741d85
Aigaion versions 1.3.3 and below suffer from a remote SQL injection vulnerability.
f477c1fa8a2e114029b99bdb32b4e04daf91e335c09d3b6bb2d7b210360b4821
AV Tutorial Script version 1.0 remote user password change exploit.
cd8796f314db2631356ee6df43d15d829d84060a778e3ed6de9593bb0d621466
FlashGameScript versions 1.7 and below suffer from a SQL injection vulnerability.
d3f5d470f849e8d1d8f4220063aeeaa88e6b30d2efffefdd7442441bfb407d21
GameSiteScript versions 3.1 and below suffer from a SQL injection vulnerability.
01b9f2d34470726e0059c9669a7df64320d03423f82d52418460e00f5326b170
iDefense Security Advisory 07.09.07 - Remote exploitation of multiple integer overflow vulnerabilities in several of the image loader plug-ins included with distributions of 'The GIMP' allow attackers to crash The GIMP or potentially execute arbitrary code with the privileges of the user. iDefense has confirmed that version 2.2.15 of The GIMP is vulnerable on both Linux and Windows platforms. It is suspected that all previous versions of the GIMP are also affected.
00db260f0059dca5f28a11f85c9a8750fe40b83b8a95462ae5862095e4114d96
eEye Digital Security has discovered a stack buffer overflow in Java WebStart, a utility installed with Java Runtime Environment for the purpose of managing the download of Java applications. By opening a malicious JNLP file, a user's system may be compromised by arbitrary code within the file, which executes with the privileges of that user. Systems affected are Java Runtime Environment 6 update 1 and below and Java Runtime Environment 5 update 11 and below.
4634c67fe886c62ca9877c8e797c11203f134b24b6f4f56bbd706b71a5db40d7
iDefense Security Advisory 07.09.07 - Local exploitation of an input validation vulnerability within the NPF.SYS device driver of WinPcap allows attackers to execute arbitrary code in kernel context. The vulnerability specifically exists due to insufficient input validation when handling the Interrupt Request Packet (Irp) parameters passed to IOCTL 9031 (BIOCGSTATS). By passing carefully chosen parameters to this IOCTL, an attacker can overwrite arbitrary kernel memory. iDefense has confirmed the existence of this vulnerability in version 4.0 of WinPcap as included in Wireshark 0.99.5. The version of NPF.SYS tested was 4.0.0.755. Older versions are suspected to be vulnerable.
46e2bfe73ac2f8cddb383c6eb203c2af59b776d93221bddaf74a00d1d638a46c
Debian Security Advisory 1332-1 - Several remote vulnerabilities have been discovered in the VideoLan multimedia player and streamer, which may lead to the execution of arbitrary code.
0c2b7b9e21cf08d6a887da90ba62a1e7e907fb77e892fe7c0aca8ee401405292
A vulnerability exists in how Mozilla Firefox handles internal wyciwyg:// pseudo-URIs.
93f02ea123437363186523aeae7e0ca0e0d453814f6ae1c66ad755016eaf7b78
CodeIgniter versions below SVN 28.06.2007 suffer from directory traversal and cross site scripting vulnerabilities.
9c844f45f780673c7009cc92946fc378cba3a9fbd7112b32708978958096e5fd
alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.
046b5a882ad4beed71f1f3887a92c6c5cd8e1f94b273d94c22e571b53a63ba09
The PHP Comet-Server application may suffer from a remote file inclusion vulnerability.
3cfb90496a5cc27853237bc1398d79b98d471afd586bfbe548fdc72d215b15e8
Metasploit module for the buffer overflow vulnerability in Apache mod_jk version 1.2.20. Written to work on Win23.
efe145dee4b7080b59ab059e6c8b9dd4a32fc76e8f62346dc54be9192176437f
Apache Tomcat Connector mod_jk version 1.2.19 remote buffer overflow exploit for Fedora Core 5,6 (exec-shield).
24366bcf5fd939402e2136ae4afaf302d0e97d8a5f9ab0e2664a94791726f33e
Apache mod_jk versions 1.2.19 and 1.2.20 remote buffer overflow exploit that binds a shell to TCP port 5555. Written for SUSE Enterprise Linux and FreeBSD.
4343e34adf3fa71ca9c9be78dc3cb878faf1fd6762925f141c3657a3379e0462
Debian Security Advisory 1331-1 - Several remote vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language, which may lead to the execution of arbitrary code. Stefan Esser discovered HTTP response splitting vulnerabilities in the session extension. This only affects Debian 3.1 (Sarge). Stefan Esser discovered that an integer overflow in memory allocation routines allows the bypass of memory limit restrictions. This only affects Debian 3.1 (Sarge) on 64 bit architectures. It was discovered that a buffer overflow in the xmlrpc extension allows the execution of arbitrary code.
1fce4b0b46bc0da44b8af40e54073c49f088b0f0cecd1ec997ffa0a91147d009
Debian Security Advisory 1330-1 - Several remote vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language, which may lead to the execution of arbitrary code. Stefan Esser discovered that a buffer overflow in the zip extension allows the execution of arbitrary code. It was discovered that a buffer overflow in the xmlrpc extension allows the execution of arbitrary code.
2f61278426160afc3394bc0eabb02afcc1f4c2d9133820a6b516d03fd3299f52
YouTube suffers from a cross site request forgery arbitrary code injection vulnerability.
8c63475befd9faa726379b0d0186378755a4451f827d67ce1223839aa48a9eb0
Secunia Security Advisory - Debian has issued an update for php5. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
b460db20e99b9ec168ff80909c4df472d49bdb121f2e02c2842535902c479369
Secunia Security Advisory - Debian has issued an update for php4. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.
ca7197328318c1e7e509f374580f6c5d92ff114dba81265050f3161279dacd66
Secunia Security Advisory - Zhongling Wen has reported a vulnerability in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service).
2813c63e47f6aea41f45094eda100bffe292f3433684cb0699f677dae3d09a47
Secunia Security Advisory - Xenduer77 has reported a vulnerability in FlashGameScript, which can be exploited by malicious people to conduct SQL injection attacks.
916c2decb24e6f8c236f087ab7f5c93cf04e2de5a53aca4ee5fd0ca3a887b4e9