RitsBlog version 0.4.2 suffers from remote SQL injection and cross site scripting vulnerabilities.
04c270a31c61d62424c774368c0ec3076eedeb455e44d6c7558d5c31d9263b75
VUplayer version 2.49 .CUE file local buffer overflow exploit
86282dd45c27beb8b0f93dc8c5e9830c1c0ca024f7f6878eea7beb68ab8d5673
Debian Security Advisory 1730-1 - The security update for proftpd-dfsg in DSA-1727-1 caused a regression with the postgresql backend. This update corrects the flaw. Also it was discovered that the oldstable distribution (etch) is not affected by the security issues.
422c018fd821493e6bba8fd79fc76a6860442a69113ba1ce44662dd4dc848dfb
The eXtplorer file management component for Joomla! and Mambo suffers from a local file inclusion vulnerability that allows for remote code execution. Versions below 2.0.0 are vulnerable.
0c8be37f45dd7716c3e21eb52f60bdef7051a84c86dec14021ede81924f79d5b
Internet Download Manager version 5.15 local .LNG buffer overflow exploit that can add a user, spawn calc.exe, or a reverse shell.
7527ff2505c9e73bb87e3aad89c8f20b520b7df9c8ec0d3efca0d312e7f1fa12
Academic Web Tools CMS versions 1.5.7 and below suffer from multiple cross site scripting vulnerabilities.
80bab068f154421effca84501b67ac35d666a318f087352c33f1a93af627fb50
OpenX version 2.6.3 suffers from multiple cross site scripting vulnerabilities.
8cd5cc68b1a3038bfd30b384151ab76cbf9014fda66b495c8fd3b1746e35d6d9
FRHACK 01 Second Call For Papers - FRHACK is the First International IT Security Conference, by hackers - for hackers, in France! The FRHACK Team (TFT) encourages speakers to present new and interesting projects for FRHACK 01 and will give preferential treatment to submissions that have not been presented at other conferences. The conference takes place September 7th and 8th, 2009.
82d8282dcf44468e200fa83f029fadd85ce52e0be2096b313f056721c216bdb1
This file documents recent incidents that have been reported to the Web Hacking Incidents Database (WHID).
b75d34e09ff5f706bc546f62f391d928327a0a0992c1927332d39262a989aa71
Debian Security Advisory 1729-1 - Several vulnerabilities have been found in gst-plugins-bad0.10, a collection of various GStreamer plugins.
bd7632e5aeca4ad66f55586ac401d00d1c0fccd151a6fab63225619d970fb44f
Merak Media Player version 3.2 .m3u file local buffer overflow proof of concept exploit.
c3ed8408c1e1e6fdd9e99e7bcde13fb55675a30c4d535a1d9fb7e41e876ef34e
Graugon PHP Article Publisher version 1.0 suffers from remote SQL injection and insecure cookie handling vulnerabilities.
9e64a422a7ec75251330e7952ccfb94a8f0989be6fbd92c49e3ed5597aaa394b
Access2asp imageLibrary suffers from a remote shell upload vulnerability.
6ca25a9b46a8f8c76293f4488943e7232fd283080d978bb36402acc47569ab65
Afian Document Manager suffers from path disclosure and local file inclusion vulnerabilities.
8064ece9bccef24920b75bd32ac97f9458fed2418084df0a0b52589bc9b0bb98
Scannedonly is a samba VFS module that ensures that only files that have been scanned for viruses are visible and accessible to the end user. Scannedonly was developed because of scalability problems with samba-vscan. Scannedonly comes in two parts: a Samba VFS module and (one or more) daemons. The daemon scans files and marks them when they are known to be clean. The samba module simply filters out files that aren't marked clean.
d7321683ba9dc13f69b40c25ff050442c76e905d1544370951381ef698300613
Media Commands local heap overflow proof of concept exploit that can create malicious meu, m3l, txt, and lrc files.
16f0cecb44d9471d81ccd482d974ad47b4580a77d424d4550f8446d688dcbc3d
A remotely exploitable vulnerability has been discovered in the iMonitor component of Novell eDirectory. Specifically, the vulnerability is due to a boundary error when processing incoming HTTP requests and can lead to a buffer overflow condition. This boundary error can allow attackers to inject and execute arbitrary code on the target host with System or root privileges.
077aceb320e67ce659ef5fd16c675b9a733f6c13a16131a79e46761045a9364d
Novell eDirectory iMonitor Accept-Language request buffer overflow proof of concept exploit.
023720d0fdc680824cc4fc5d5fa8069b3d01a41f04ad6a09683461259503f79e
EZ-Blog version 1b suffers from post deletion and remote SQL injection vulnerabilities.
db159f9f362c30292914cfb010ceae933e7f34251329ffb658b711338ce3d112
BlogMan version 0.45 suffers from multiple SQL injection vulnerabilities that allow for privilege escalation and authentication bypass.
7782bc25bfc32ee55757646cf7ac06f1b0d8ee5a9786f562e226790e4fe3595b
Packet Storm new exploits for February, 2009.
d9e012424f8c22f55e33e8d8710e47dd322c50d3ee90db3e3d21dba05d3927a0
Joomla Digistore component remote blind SQL injection exploit.
c7d8dc5991bfbb4c715181773ada5a66f9d2126742fcc7fe12928d05f4b07c3a
Document Library version 1.0.1 suffers from an arbitrary change administrator vulnerability.
7a391b0957a78f12a695515bebb8ed6d91767b00a41975b65caffde35b027dcf
Digital Interchange Calendar version 5.7.13 suffers from a contents change vulnerability.
f271ae3d5ee259d7032e3ed58943d73a11537aeb07d98097329cb8b0eff8d6f7
Secunia Security Advisory - Debian has issued an update for dkim-milter. This fixes a vulnerability, which can be exploited by malicious people to conduct DoS (Denial of Service) attacks.
db8b8c8509d7c1b9d5c7579243d1327313421d98c93af428fe1026c41fac3b79