The INCA IM-204 Dsl router suffers from several directory traversal vulnerabilities.
d154a28851a5ecc232276eaba8aa654f16f4143959d76d61325fc495678c0f96
SYM06-022 Symantec Device Driver Elevation of Privilege: Boon Seng Lim notified Symantec of a vulnerability in SAVRT.SYS which could allow a malicious user to use the output buffer of DeviceIOControl()to overwrite kernel addresses because the address space of the output buffer was not properly validated. A successful exploit could potentially allow a local attacker to execute code of their choice with elevated privileges, or to crash the system.
f5202c722020e111fddf5bf3e2bd2045903fbb7dc8ff2fb201d8425a9084b16b
WikiNi suffers from several cross site scripting vulnerabilities.
cbcfca9ea57027397d41e1d395565f510b4bdfa73a403ae9fad24c5f94d90bc2
WebAPP v0.9.9.2.1 suffers from a remote command execution vulnerability in apage.cgi.
a08b19149716526147cdd55205c40da852ad5ae42f7dadf506764debefc073a7
Shop-Script suffers from multiple HTTP response splitting vulnerabilities. POC included.
6d26cc8e33feba6e5ec461f5967a7deebc9b5bd0abb14de790021141377573fb
The package XDB.DBMS_XDBZ0 contains SQL injection vulnerabilities in the procedure enable_hierarchy_internal [DB01], disable_hierarchiy_internal [DB15]. Oracle fixed this problem by using bind variables and verifying table names.
0bc0fcf44b3587488b47fde10758d3000967bf7dad61df65add1616a307eaa07
The package SYS.DBMS_CDC_IMPDP contains SQL injection vulnerabilities. Oracle fixed this by using dbms_assert.
648ea5ceb80599a2e691a1cb28f91392a881db00ad56e55abda3cd3476411d08
The package DBMS_SQLTUNE_INTERNAL contains SQL injection vulnerabilities. in I_SET_TUNING_PARAMETER and SELECT_SQLSET. Oracle fixed this by using bind variables in their dynamic SQL statements.
4069956a10c351e3cef1567cf88f9a1d8575c9c417fa3e3ffb5bbc73bd747a58
The Oracle package MDSYS.SDO_LRS contains a SQL injection vulnerability in the first parameter of convert_to_lrs_layer. Oracle forgot to fix this problem with the April CPU. Oracle fixed these vulnerabilities with the package DBMS_ASSERT. To exploit this vulnerability it is necessary to have the privilege to create a PL/SQL-function.
e534a5773771e19c3b85bf82e2c954ea1824a79bf7333544191910efe07b0cfd
The Oracle Reports parameters showenv [REP01], parsequery [REP01], cellwrapper [REP02] and delimiter [REP02] are vulnerable against Cross-Site-Scripting.
6dc5d2078bd03101c9d465edd2759c33b1fbc60013e65092cefc7c6e9079c3ef
Oracle 9i - 10g Rel.2 Advisory: Updates, deletes and inserts are possible with least-privilege via inline views. A user with create session only can insert/update/delete data (e.g. the dual table). This bug is similar but not identical to the bug which was fixed in the July 2006 CPU (Modify Data via views). No workarounds available.
1f9c0e6ff91688e81437a17159b854620002de70ed2b2f738ea364f727c081da
The list of values (LOV) in Oracle wwv_flow_utilities.gen_popup_list contains a SQL injection vulnerability. Depending of the APEX application it is possible to inject custom SQL statements.
31b98b197a3734d9bdbf1e6602233a75c9d700af6752b4ba006bad71a156b817
The package WWV_FLOW_ITEM_HELP in Oracle APEX contains a cross site scripting vulnerability.
91ba505930f02bcbaefdcb8f89bfba0654ef85250394f1dfdaa6191eeeb5744f
The parameter NOTIFCATION_MSG in Oracle APEX NOTIFICATION_MSG contains a cross site scripting vulnerability.
39968f8da257a3d90ebd519ef0e6d6d1f40dce618c3be5c3b4e53ed0e7231646
Smarty-2.6.1 suffers from a remote file inclusion vulnerability in test_cases.php.
0c251ac507b07521fca880f1e913df2aee85a60d2d2d05b022a9520a2844f003
phpAdsNew / phpPgAds security advisory PHPADSNEW-SA-2006-002: Some scripts inside the admin interface were displaying parameters collected by the delivery scripts without proper sanitizing or escaping. The delivery scripts have public access, while the admin interface is restricted to logged in users. An attacker could inject HTML/XSS code which could be displayed/executed in a later time inside the admin interface.
2e25fc4dbd7f2e8667f215f5c7b29bcecfb4f2df299917ae69d01e51ba800864
AROUNDMe 0.6.9 suffers from a remote file inclusion vulnerability in pol_view.tpl.php if register_globals = on.
8ac51c233edf05a96e26ba0f74edb8e780d0937a56c2b41dd80a1a4239d21203
PHP Generator of Object SQL Database suffers from a remote file inclusion vulnerability in function.php3.
1c71fb8093c224e022c750d2d3f7a2d6b4a7a977d56a2612be9c6d756f78829a
Zwahlen's Online Shop suffers from a cross site scripting vulnerability in article.htm.
d861ee2fa2119ea8bb74a0306d89eafe124001b486738c8153fb4b70fcde68ee
iDefense Security Advisory 10.21.06 - Novell eDirectory NCP over IP length Heap Overflow Vulnerability: Remote exploitation of a heap overflow vulnerability in Novell Inc.'s eDirectory product could allow an attacker to execute arbitrary code in the context of the running daemon.
dc5474d0694fa7b14b331edde1edc4bb1c9f1b20d63cb4402abdc1ca5ce549cb
iDefense Security Advisory 10.21.06: Novell eDirectory evtFilteredMonitorEventsRequest Heap Overflow Vulnerability - Remote exploitation of a heap overflow vulnerability in Novell Inc.'s eDirectory product could allow an attacker to execute arbitrary code in the context of the running daemon.
30158593b9365d8bfcd058c6a4c512c4438d61b1122142bea89af170d19bd94c
iDefense Security Advisory 10.21.06: Novell eDirectory evtFilteredMonitorEventsRequest Invalid Free Vulnerability - Remote exploitation of an invalid free vulnerability in Novell Inc.'s eDirectory product could allow an attacker to execute arbitrary code in the context of the running daemon.
852542c0c78828dd85165aa8f1e8ca012edf50e273cf7a90c75b4d8c2cd3f4f3
Plague is an odd proof of concept backdoor tool based on the premise of using existing system files and commands to keep and maintain a backdoor on Linux systems. Uses awk and sed to make malicious commands seem innocuous.
6e5511d6e1d98fbe28a389f584a60200782738f61d0f946455bb06699e5de469
IPEER v2.0 is vulnerable to a remote file inclusion bug.
4b75e8609d55c3015627c0a8287dcebf8cc6100cefb940ddd12c785d071e0ac2
It is possible to crash CMD.EXE in windows via a buffer overflow.
ea02304ddb47f95b7fd4a53a2ceeb2b2a8f5a20003f99fcda241ec164e9f7fb9