This Metasploit module exploits a buffer overflow in the Xftp 3.0 FTP client that is triggered through an excessively long PWD message.
ab255e702c98e4c4b3070e23514c2356e3288bdfacac985442228143c26206ee
Secunia Security Advisory - A security issue and a vulnerability have been discovered in Webessence CMS, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct SQL injection attacks.
11c4e69143801547e1c02eed3aac06d91a916845a29be00c8d868e9e0558c08d
Secunia Security Advisory - Christian Navarrete has discovered a vulnerability in Wing FTP Server, which can be exploited by malicious people to disclose sensitive information.
05b7201273e199a1839fdf7b0f182990ee5af3c4a71bd442e802d956766e9a5d
Secunia Security Advisory - A vulnerability has been reported in iNetScripts Free Upload Script, which can be exploited by malicious people to compromise a vulnerable system.
0cf0a0af544d3f31a24f83c444fc2cf61570d6e3334db10311fec4071304d3bb
Secunia Security Advisory - A vulnerability has been discovered in Kasseler CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.
5c84b30066a30a5f1774327b3002e977cde71d671bd721cb5159d75abdbf6226
Secunia Security Advisory - A vulnerability has been discovered in IDEAL Migration, which can be exploited by malicious people to compromise a user's system.
bc73fc0ff27a471a83e04cf74638a9bf48a3541091c7b5074c0597dce1a67b4b
Secunia Security Advisory - A security issue has been discovered in SmodCMS, which can be exploited by malicious people to bypass certain security restrictions.
37a78be3d5451f7f92791570871846b0ec00081850e4cdc2547e18a396d253c6
Secunia Security Advisory - A vulnerability has been discovered in CMScout, which can be exploited by malicious people to conduct SQL injection attacks.
6f3eead784db80175f9285f02ad2d934100fba38696ac68f6bd23aa6c462816c
Secunia Security Advisory - A vulnerability has been discovered in IDEAL Administration 2010, which can be exploited by malicious people to compromise a user's system.
5cd71e8d3bed87598752c8208a2660c0e81657b66c62923883324fbb96295601
Secunia Security Advisory - A vulnerability has been reported in Alstrasoft EPay Enterprise, which can be exploited by malicious people to conduct SQL injection attacks.
1e84e30c7d87af2ebfadefd923433d8849ed9b4429066b8bca80d095bfb5257e
Secunia Security Advisory - A weakness and a vulnerability have been reported in Joomla, which can be exploited by malicious people to disclose sensitive information and conduct session fixation attacks.
200088d4f9c748b1b96a9d97893355a2b7732907b1a05aa1dda3f74e0290ccb0
Secunia Security Advisory - A vulnerability has been reported in HTML Purifier, which can be exploited by malicious people to conduct cross-site scripting attacks.
62e6a482e2041d73e1b7e4954df82249e09a16288204214d064171d609c95d69
Secunia Security Advisory - Three security issues have been reported in Red Hat JBoss Enterprise Application Platform, which can be exploited by malicious people to bypass certain security restrictions or disclose sensitive information.
eab551773af9ae0099c57559ce9313af0a9377c61f5470a7866fd38d6f051c5d
Secunia Security Advisory - NetBSD has issued an update for ntp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
5e1d8be28f331acd2ec1586a903e1d31372ed5a49ce39edfb2e468531f1f8fb7
Secunia Security Advisory - Slackware has issued an update for irssi. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and bypass certain security restrictions.
95fd2668c063058ec558b04f5143b446676aa73e685e3455f82a4f99658498b3
Secunia Security Advisory - liscker has reported a vulnerability in PowerEasy SiteWeaver, which can be exploited by malicious people to conduct cross-site scripting attacks.
1a5cca5609f5005e6581ed05079cb8b0050c4f184a3ea7b9ad8c09f865d87e97
33 bytes small Linux / x86_64 sethostname() and killall shellcode.
f4eb2be4e4b279407995999d923a03d98acdd0315610e6324b68696da65a6dc0
Smart Blog 1.3 suffers from cross site scripting, file inclusion, remote SQL injection and directory traversal vulnerabilities.
a065a8dbbed20132927af3b7b57b3ec7456af26837aa74cae19e80c346f51ace
eSyndiCat version 2.3.03 suffers from a remote backup disclosure vulnerability.
70446b0f7615fc22d9cfa3ab76a056170c0bc3889204ce27e4d34e8d11240ad4
60 bytes small Linux/x86 shellcode that send "Phuck3d!" to all terminals.
222bcd93231be03d8446d74896dc2dff4386ef4ba1d7da74f7643266b106a418
30 bytes small Linux / x86_64 execve("/bin/sh"); shellcode.
157f66edfd08be1a3c8a966827ece567ea085fd32848c087d101f7838e9abb13
19 bytes small Linux / x86_64 reboot(POWER_OFF) shellcode.
89c6ad674181b68f9e1ee97100f163622188cf3b1f3b93a5abe8d653965af630
Whitepaper called Flag execution for easy local privilege escalation.
0304c7b0387b6acdbfddaf7c2a56bffac2f64c1f292208f6ddad65ba9303aee3
Whitepaper called Hash Collision Attack Vectors on the eD2k P2P Network.
0232a6532405a09cb7c603fefacfd54a63d899fdbd1b48c09d856b8d607fad84
Whitepaper that is a How-to on DNS enumeration.
285fe6b6c0b43221e845dcfcc4f0b438ee1d9ae049fa1993961fd2c8f74114a9