Pop Under Ads Network version 1.0 discloses MySQL credentials in html source code.
b61df52b0185ea6b9e4036666b505dc6b4b1381807797cebe5c6b71b04558560
VenShop System 2010 suffers from a database disclosure vulnerability.
b0ceb4716a625ecbcff7f9491cf60784443bc16c2085848c56ecc381ccdd0731
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
b1af02c61253dcdb4e1a4f552adaba4e07aed0e5468e45c0764550161480e3de
This Metasploit module exploits the Web UI for Metasploit Community, Express and Pro where one of a certain set of Weekly Releases have been applied. These Weekly Releases introduced a static secret_key_base value. Knowledge of the static secret_key_base value allows for deserialization of a crafted Ruby Object, achieving code execution. This Metasploit module is based on exploits/multi/http/rails_secret_deserialization.
0aed762884874a2a56109540ad0db42b6eefad643e2cf8d5c9179b0f1d8783a6