Remote proof of concept exploit for Raydium versions SVN revision 309 and below.
df0a79143ecc3e6f7c7f2d7a3a0610d01ec1f060ca6f8fa99f8fb2024c2dafc1
Raydium versions SVN revision 309 and below suffer from buffer overflows, format string, and invalid memory access flaws.
fc9789d4dc2d01d1185c7f66a6bc4d376dca0cead895a512d0357225e4bf792c
PHPBB 2.0.20 suffers from multiple security related issues having to do with avatars.
3a97bfd0a4a9d6f1703696b299aed47987f9649a25961d353c6c2c571c710bbf
Open Directory Project suffers from a cross site scripting vulnerability.
ab11ca88c22a124d4af5b36ae3d900db033f46416942a4a4f44608f702a96625
Jax Guestbook version 3.50 suffers from a cross site scripting vulnerability.
1c276f2a34f00f09e8c8c9c346a3ba60e890ae9a6af73186555d1b340389601b
Two code execution vulnerabilities are present in Apple QuickDraw PICT image format support. Twenty one code execution vulnerabilities are present in Apple QuickTime support for various multimedia formats including: MOV, H.264, MPEG 4, AVI, FPX and SWF. Exploitation could lead to execution of arbitrary code. In order for an attack to succeed user interaction is required and therefore the risk factor for these issues is medium. Vulnerable systems include Mac OS X versions 10.4.6 and below without the May 2006 security update installed, QuickTime versions 7.0.4 and below for Mac OS X, and QuickTime for Windows versions 7.0.4 and below.
8f07954712d0132d44032c1c58a7fa2505bdf2e850f835b45907c2298d579a60
Directory Listing Script is susceptible to cross site scripting attacks.
371abccd73f8a929f6564f7eb0fd7f54bb64250d4739ec48ff5e688cb5febdf9
chat.php from PHP Live Help ASP is susceptible to a cross site scripting vulnerability.
22385325e8a45a21c8bf09b58385080408e5a643b0fa03c9e9405454903ddeb7
Foing suffers from a remote file inclusion flaw that allows for arbitrary code execution. Versions 0.2.0 through 0.7.0 are susceptible.
3885475915d3ff6d51dd65ae9d53f538423d7b55905504d6171747951c24f471
Trustix Secure Linux Security Advisory #2006-0026 - Multiple kernel vulnerabilities have been fixed for Trustix Secure Linux 3.0.
53606678b9cc0783fa01b2a9a9a36991ecb42fd6edbf2c6d971e6e93f7509f49
Dovecot 1.0 beta is susceptible to an information disclosure flaw.
afa2b69a0f54d2a6f8140096f2c5ec449c351796c10dff9632fc14a062aca821
SMAC 2.0 is a MAC Address spoofer for Windows 2000, XP and 2003 systems. Users can generate random MAC Address and SMAC will validate MAC Address before spoofing. User can pre-define MAC addresses and load the MAC Address list. Spoofed MAC Address can sustain from reboots.
e5bf8406e7688144292d1bc4926eb70f7b4361675d40e88002e181fec233e2a3
SEC-CONSULT Security Advisory 20060512-0 - The Symantec Enterprise Firewall leaks internal IPs of natted machines in response to certain HTTP requests. Version 8.0 is vulnerable.
807aa7028b29ee6916e21a15ef082d41db7b0c19a41584be3677e3145973e8e1
A vulnerability that allows for arbitrary code execution in Apple QuickTime versions below 7.1 can be exploited by persuading a user to open a carefully crafted .mov files or visit a website embedding the malicious .mov file.
a89f12ae3f451f766a0aca560c2172873afbd4aee6a95b6ad188f185d5f05218
Touch2 is a utility which modifies the ctime. Touch(1) can be used to change the last-access & last-modification times on the files (or directories) you read or modify, but doing this will change the last-inode-change time to the current time. Touch2 can be run after touch(1) or other commands.
beaa155ed43ff7c33a27410bfd5934b0bbf58517b6f6e389227e99ed03714bf0
ZDI-06-015 - This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Apple's QuickTime media player. The specific flaw exists within the parsing of H.264 content. The implicit trust of a user-supplied size value during a memory copy loop allows an attacker to create an exploitable memory corruption condition. Exploitation requires that an attacker either coerce the target to open a malformed media file or visit a website embedding the malicious file. Versions prior to 7.1 of Apple Quicktime are affected.
079d3c9b83a953ba0bedb07efcf43346d8ca8269df05b93a6ee5704d47b30901
MU-200605-02 - A remote buffer overflow condition in Apple's RTSP service could allow for arbitrary code execution. The vulnerable code is triggered with the use of a malformed RTSP header. QuickTime Streaming Server versions 5.5 and below are affected.
193c81cd2ec447f58781bf500a1dcd68539eacc3a38e3fe8c308fb7fd356f9a2
eEye Digital Security has discovered a critical vulnerability in QuickTime Player. There is a integer overflow in the way QuickTime processes fpx format files. An attacker can create a fpx file and send it to the user via email, web page, or fpx file with activex.
43adc773eca673b0b8c59d551604cc2d366d6bcdd7893a6ec67c822b737336af
Ipswitch WhatsUp Professional suffers from source disclosure, information disclosure, and cross site scripting flaws. Weaknesses are confirmed in version 2006. Earlier versions may also be susceptible.
a9a7a332f27024112aca7776f100288c07c382051fe5ea02a197f2d35645d3f2
The phpBB charts.php code suffers from cross site scripting and SQL injection flaws.
aac363a8ee7a42ddf9b0b3f9f6c6ffee25b002e6df39300f7adb859ae64df841
Magnolia CMS suffers from a script insertion vulnerability.
dd524302c41665a82915609e959651905f66bfeb0b514c54f69d243a8cd5213e
OZJournals versions 1.2 and below suffer from a cross site scripting vulnerability.
79b5661efdd0636877a1f29e8679765339c3deabe2caacf01d437cb3497b34fb
Secunia Research has discovered a vulnerability in UltimateZip, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in UNACEV2.DLL when extracting an ACE archive containing a file with an overly long filename. This can be exploited to cause a stack-based buffer overflow when a user extracts a specially crafted ACE archive.
4094f1b3d23d12c9fd6164ced4bf912c2ee2ba1fb20f09b78f9a133cd2147e1b
Remote exploit for an arbitrary file inclusion flaw in Unclassified NewsBoard versions 1.6.1 and below.
0abf7924e12ca0c4cf02b57e277252115334faa389dec0a3d0df88dd9c22be0c
Password encryption / decryption utility for OpenP2M.
d1461af4759e1ea090f8fc54fe1f7d61f94f92e6d433b080cac7c4b9431e37e0