CoreHTTP versions 0.5.3.1 and below suffer from a remote command execution vulnerability.
3c2bca2cfde516a13c2987315e8c27791221f4c84adae867779481e05a5bd998
This Metasploit module exploits a remote command execution vulnerability in corehttp versions 0.5.3.1 and earlier. It requires that you know the name of a cgi file on the server. NOTE: If you want to do something more than remote shell, you'll have to change CGICMD.
f31dc0038a72a13e6598040ea8df55829bf9b87af889ef2f3d93f21265eb37bf
The Joomla Carman component suffers from a cross site scripting vulnerability.
e026c97957269f446e1ba80a1f07e6806dd90ec74d9556023ac7862471a03bb5
The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. Metasploit is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.
a650778f7946a7f113acd716023978fd94f01325e9a4cf6342fb00ba3f6a2c0b
The PHP-Nuke Emporium module version 2.3.0 suffers from a remote SQL injection vulnerability.
f515ef8d50509532b1b29e0436421a43aefc35393de920788cdacb2c4b0833df
Debian Linux Security Advisory 1962-1 - Several vulnerabilities have been discovered in kvm, a full virtualization system.
c9480f11858d4b9c77e1808e9c627e7bc6f853a9d658853abb9245d86064d791
Add An Ad Script suffers from a remote shell upload vulnerability.
74bc5e05e71acc225a7c2444c1dfb4948cd9a97f8d7190f8b5e2d5e0f7dd08b6
webMathematica suffers from a cross site scripting vulnerability.
c74b3b4b2fddf716580db459b147dee7bb184ca247670c511d260ed423a3df84
35mm Slide Gallery suffers from a directory traversal vulnerability.
713c2c4a792cd92f9fcbd73c8d987ddd85b2c259a10b8d09230695d8de5deb30
35mm Slide Gallery suffers from a cross site scripting vulnerability.
5879ea2ebdd10a5a867a8680bc576597ccd1096f1bf71a6df963b4e587e0d023
Linux kernel 2.6.18-20 2009 local root exploit.
8aabc0da3ce575f922800e13e51a5409627e1251b39b36108430a5bcc47434d6
Debian Linux Security Advisory 1961-1 - Michael Sinatra discovered that the DNS resolver component in BIND does not properly check DNS records contained in additional sections of DNS responses, leading to a cache poisoning vulnerability. This vulnerability is only present in resolvers which have been configured with DNSSEC trust anchors, which is still rare.
b232afe078edbe6a5f91d0493fd8ada096321c556f09e2d8f0b113c1a5f943ae
Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.
eeed30cdab325f7806d6df7a8818a3fedaae429638cc9d2e563515f293cd19c5
weenCompany suffers from a remote SQL injection vulnerability.
d74d8fd99dc992ddf715f2c593a8e8dba2f5d06ba6f6c62478c07b49d7c4b88e
The Joomla Jeema Article Collection component suffers from a remote SQL injection vulnerability.
1d0f028c4e56f5d37a1d224e84bce6f7214b30518663d34cc4133633a2fa0ab2