DynPG CMS version 4.1.0 suffers from multiple remote file inclusion vulnerabilities.
859380d29c660d18752dc837ccaa0dbb525851bf1b39108d2eef7f9d3416f598
The Joomla Network component suffers from a remote SQL injection vulnerability.
d9ba6346b690f973d2abd9dba2bdf969a7e6cf8ced2cd592ad6c2ae5f6b88b9c
The Joomla Tour component suffers from a remote SQL injection vulnerability.
076bfb80874e3bc0d8c39a803263627885c1cfaa562d8ed90fdbbf3ca08d21de
The Joomla Trading component suffers from a remote blind SQL injection vulnerability.
8dfcdb059dc806db66c5ef80558028df74b5a4cb845b8f8e62e212678a66213a
Simply Sites RGV suffers from a local file inclusion vulnerability.
6c0ff8818ecdcd22813e8b7ba0118c3d56492ea6be7d0b241ae0d6a0ddf7f4fe
Apache CouchDB versions prior to version 0.11.0 are vulnerable to timing attacks, also known as side-channel information leakage, due to using simple break-on-inequality string comparisons when verifying hashes and passwords.
bbe4edeb361a96c9e551e286e2cd996324760c3fa8fc5cad42081d50e8efd871
Easy-Clanpage versions 2.2 and below Gallery SQL injection exploit.
5810ec00df041e1f5ea588586321b4a8e6124ff9c101cab4f0ad9b7f73ddb5c5
Centreon IT and Network Monitoring version 2.1.5 remote SQL injection exploit.
4553234f18b52c174d2dee239d2fa79608be2fba9fedd7cec5b2a07fe0c9b911
PDF hack that demonstrates how to execute an embedded executable.
210679723fb461545cbf20e0f88717eb3f49856def8b6a1dc62a64f16049f8ac
Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.
7b0b6e67c87d43b04ce3beceaecddfaf344499f0ee45e9568df6be16808879d2
CDTrustee version 2.06 local crash proof of concept exploit that creates a malicious .bak file.
fdf8fd0795930a92a6cf578592f6c1147debe8f5f3bd12a258716a38426efc32
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
8758b489ea5686fa09cdc50850116031178fa7429b63d3f37d74d588e9b6179e
Secunia Research has discovered a vulnerability in Sun Java JDK/JRE, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by a sign-extension error when parsing the length of a resource name in a Soundbank file and can be exploited to cause a stack-based buffer overflow. Successful exploitation may allow execution of arbitrary code. Sun Java JDK/JRE 1.6 Update 17 is affected.
8dec758bd05e09255310908caee81ca57294e5838db04bd1710b8f3a771dd7df
Secunia Research has discovered a vulnerability in Sun Java JDK/JRE, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by a sign-extension error when parsing the length of a resource in a Soundbank file and can be exploited to cause a heap-based buffer overflow. Successful exploitation may allow execution of arbitrary code. Sun Java JDK/JRE 1.6 Update 17 is affected.
7d87820c079f661519dec2809651c7e5860de57169dceabbdc743b7267772403
This paper discusses how an unprivileged local attacker can elevate their privileges during an initial installation or update of iTunes for Windows. This vulnerability was responsibly disclosed to Apple Inc. and this advisory was not released until a fixed build of iTunes was released.
08157a8dd7cfd5cb407ffa0138623559421da7fed35cdf32b494e3edc81120bf
BitComet versions 1.19 and below remote denial of service exploit.
7c7f351180729ed29e9a2bd0c5f28888de8584470cd4a5be74b4598958d117f7
Debian Linux Security Advisory 2025-1 - Several remote vulnerabilities have been discovered in the Icedove mail client, an unbranded version of the Thunderbird mail client.
5ccd1a2ad93d249d46e731464cdcc802a972eeda3800afed3825af7057dffa07
Debian Linux Security Advisory 2024-1 - Jamie Strandboge discovered that moin, a python clone of WikiWiki, does not sufficiently sanitize the page name in "Despam" action, allowing remote attackers to perform cross-site scripting (XSS) attacks.
df816b8afbf70c2954a08251cfd6d16c462747e1df0f6748278ddd52d3b1433b
The Joomla DW Graph component suffers from a local file inclusion vulnerability.
12cced99b788e75168e848407d504c3f3ffdf3be53c344704c880029d369f8c5
Whitepaper called Exploitation With WriteProcessMemory() - Yet Another DEP Trick.
1652f3773f25200d646b0477e5a31535e06bc7fad3add54a1a0a29fa8eaa6d84
Whitepaper called Introduction to PHP Trojans. Written in Spanish.
8fcdc63bcd4fb561d922607d7923a7e2ab2bb726e95df7dc775a0befac9ff31d
Whitepaper called Hping kullanarak TCP/IP Paketleriyle Oynama. Written in Turkish.
c2f31fc6584d688b2dd6c520126c877ba3775708ae5816d3845a1b3fd1307b5e
Whitepaper called Hping ile IP, ICMP ve UDP Paketleri Olusturma. Written in Turkish.
9958b3c881d042b77cbb659d95622ed2a2bb699e9e5afe04feedd1c92f43dd22
Whitepaper called Hping ile Ag kesif Calismalari. Written in Turkish.
e283a5aa6c1023dc960b0c2d4392785d6d932b4c6433f18bd3bc00467d23ae44
Remote unauthenticated exploitation of an input validation vulnerability in Apache Software Foundation's ActiveMQ server could allow an attacker to perform a stored or persistent cross-site scripting (XSS) attack.
a93c7b1bf48d73b062e00b4bcc020d13797e54a1c0439e6efadd535c2fdb2b1b