Teraway Linktracker version 1.0 remote password changing exploit.
7027fcc70398d9e8e2d66dee8ffcd68d9e5ae7ec96995f35015cd7b70d391c42
Teraway LiveHelp version 2.0 suffers from an insecure cookie handling vulnerability.
94424288a683a0c148fdc97485ac317f71d8e2e77f8c16080c082e98603d55b2
Teraway FileStream version 1.0 suffers from an insecure cookie handling vulnerability.
fe916c8db88d23e556da7ea485614a60b4c4f2f1a4e7c6a9584f819fea3ad04a
Teraway LinkTracker version 1.0 suffers from an insecure cookie handling vulnerability.
fb8fc35cdf82b4af6c283c476b06ce9edb04dae754ff858e2108a6f67cd4d78d
iodined versions 0.4.2 and below remote denial of service exploit.
b1f0a07e55012a0ff922068a8d67f0159336da0829ec424b440a86db2493e012
Belkin Bulldog Plus HTTP server remote buffer overflow exploit.
86a3023eb014cc26e03634e7749c1f5402bd9aecb403ecdfdfe6f6b5f21e061e
dWebPro version 6.8.26 suffers from directory traversal and file disclosure vulnerabilities.
4e7a0041ab3314539b590f1461021c62947025487182dd337b600242e719cf1b
Zoom Player Pro version 3.30 buffer overflow exploit that creates a malicious .m3u file.
a5c7a28ce0db08ccec2de12b144fae199b979e23302efae721abf993654b85c0
LightBlog versions 9.9.2 and below remote code execution exploit that leverages register.php.
540da2af6331aed6ff5ed62fc59f20bd2a37b1807d9d548022bad9d1c9a941df
Rilke CMS version 0.95 Beta suffers from a cross site scripting vulnerability.
d76b44b8a35822477b6bd56dc6200078a95b38a0bf99daf4abd8b570b82a461c
@ltacontent CMS suffers from a cross site scripting vulnerability.
345c591b580eed2f526c5605d14b294af52e28899bbce529426ecad6c11a24a9
TugBoat Studio CMS suffers from a cross site scripting vulnerability.
472d58a7f3e1d71ef4a62d68424a5cf4dfad1b94e1add01708a812cf5cb52709
Baba-Book suffers from multiple cross site scripting vulnerabilities.
d02a475adca3b16863938aeaca3e4fde6029d8cf0c8d195475939ec01e91209c
MataChat suffers from multiple cross site scripting vulnerabilities.
1a2a1a7f47e746499de2df3c36513df90565051ea77e6fcdc1e727d30c4a28cd
SumatraPDF versions 0.9.3 and below heap overflow proof of concept exploit.
e620464b4bf83ca9fe7c86e1405ce9d8a4c1161aa6112074265ce09a3a36ac7c
Debian Security Advisory 1779-1 - Two vulnerabilities have been discovered in APT, the well-known dpkg frontend.
666473d9325824b89cca75552369538408ab331e9192631b884e06d1abd17665
Mandriva Linux Security Advisory 2009-097 - Multiple vulnerabilities in ClamAV versions below 0.95 allow for denial of service conditions.
1c78a96a831f6665eddf13b79a924f572a5529daa119fe7eae73056384cb2a6b
Flatchat version 3.0 suffers from a local file inclusion vulnerability in pmscript.php.
04061fcfe2699a1d178b4b2b9ea6e55ded6b6bcf4fc82820a3d4fa4b28981fd5
Mandriva Linux Security Advisory 2009-096 - Multiple overflows in relation to the Ghostscript code base also affect the printer-drivers package.
677058db25c0fed629e439629bdf05e520dd5f4a75292cd812374bfc7248e98f
Mandriva Linux Security Advisory 2009-095 - Multiple buffer, heap and integer overflows have been discovered in various parts of the Ghostscript package.
930dec0646ef31085feae7d0653b330c99bfc8422de55b11261c27919fa265cd
Aruba Networks Security Advisory - A management user authentication bypass vulnerability was discovered during standard internal bug reporting procedures in the Aruba Mobility Controller. This vulnerability only affects customers using public key based SSH authentication for controller management users.
291d267c35e45a94c6f92b96a8b8caf7e3787c5d5f59e06c888a90fb1e486fe7
Invision Power Board version 3.0.0b5 suffers from active cross site scripting and path disclosure vulnerabilities.
2904f847267b10bcb97633e73482ff107294abdbed257779ab2a991d01cbbd4b
Photo-Rigma.BiZ version 30 suffers from cross site scripting and remote SQL injection vulnerabilities.
44fc7b084a5c6f78026d37e8208fed3ed79cc38d9efa149e72f5ec805f7b24e8
Pragyan CMS version 2.6.4 suffers from multiple remote SQL injection vulnerabilities.
7074f5d7cfaea0f38c4ee93b915196c2fb67a7ca130d44914a2c38c315c034e3
SUSE Security Announcement - The code library glib2 provides base64 encoding and decoding functions that are vulnerable to integer overflows when processing very large strings. Processes using this library functions for processing data from the network can be exploited remotely to execute arbitrary code with the privileges of the user running this process.
427e328c4b032da7dde92fb10cd1cc8487f3a3aa216decfff08d5507caa4d5a0