bordersstores.com suffers from XSS in search.jsp.
6726791820184fd9fa2280b8797254349d0ad602f3934508885682ae85f411ae
Several US Government sites, including ic3.gov and house.gov suffer from XSS vulnerabilities.
a9daa06c8ab33ad1895a01cf09bbdbcbf4a3d36ea4a4bd058ff4f832135d5f6d
Bomberclone versions less than 0.11.6.2 remote exploit.
de7ebf09bae8d3533c40c6d55892e6d9cc4b1781559d10601d5383d129026681
Computer Terrorism (UK) :: Incident Response Centre :: Security Advisory :: CT22-03-2006 :: Microsoft Internet Explorer (mshtml.dll) - Remote Code Execution
a358559835b66bd7f11646de7b1079018a6c6a2b80441124809359a797721011
eVuln ID: EV0094 - PHP SimpleNEWS, PHP SimpleNEWS MySQL suffer from a weak authentication mechanism.
b19e0ccb3a4fc19fac1dc1984dfdb02af986d5df37585bb0ca39b1f0ff46b6fa
PHP Live! 3.0 suffers from XSS in status_image.php.
34e8bfbf37cc8f4b08ab9bbb61900ada026b59bdb97d451be810b4b8cc75abc3
WinHKI 1.6x Archive Extraction Directory traversal: Due to an input validation error when extracting files compressed with certain formats, it is possible to have files extracted to arbitrary locations on the filesystem.
acbbfa4624f22737b64996b5e1a76b98c6f58d897fb2102c680182f1b5d35763
cutenews 1.4.1 allows any user to access arbitrary files due to lack of sanitization of the "archive" parameter.
580b43b3832494e683fa4077eddfe17d7a2d38bf9778028fe8bed5571bda0330
It is possible to DOS the IIS Worker Process (w3wp) due to improper reference of STA COM components in ASP.NET. POC Exploit included.
08835ab51fb255d6fe3eb1745d1e532f650748175084efc2259cda056de558dc
Mini-Nuke versions less than or equal to 1.8.2 suffer from multiple sql injection vulnerabilities.
e946a381b5f09a41cdb0918cee4c675e9350f2ea376baca0fd531418b2957bf0
ASPPortal versions less than 3.1.1 Multiple Remote SQL Injection exploit.
70d81b25b7f53ba1155e66fe5919e491a9aa6a6d6dcd3aae4f8746a9eeddd3cd
Free Articles from 99articles.com suffers from a remote command execution vulnerability.
f1e6d5fc9b9b74dd1b7f17f05ff0d4cbedc98a488e598c576347b2b78d5bafc3
5 Firepass 4100 SSL VPN v. 5.4.2 suffers from XSS in in my.support.php3. This allows an attacker to submit a crafted link to users of the vulnerable Web application in order to abuse their trust and steal their authentication credentials or hijack their sessions.
ff4fd9822a3a5c3918ff9217ff53b087caf92737953fcd30bb6f7094615f0e29
Core Security Technologies Advisory ID: CORE-2006-0124 - Cross-Site Scripting in Verisigns haydn.exe CGI script: A cross-site scripting vulnerability found in Verisigns haydn.exe could allow an attacker to execute scripting code in the machine of a user within the user's web browser with the same trust level as that of the site hosting the haydn.exe file (this is usually a trusted site, since it is used to enroll, revoke or validate certificates).
63b5e84abe37e8304236a3e800985b05671f3353ac846c47ccff0b26cd403452
PhpOutsourcing Noah's Classified 1.3 and below suffers from XSS and full path disclosure vulnerabilities.
8a6bfe7a4bb5e8bfc061e5a2925ff874677a048c44500b4382d59da47e19b848
It is possible to bypass authentication in Microsoft Commerce Server pre SP2
896846e873ec1a1bb9b4e70032331be7942f1231cfd48459e53fb076624b6f45
FreeBSD-SA-06:13.sendmail - A remote attacker may be able to execute arbitrary code with the privileges of the user running sendmail, typically root.
a91ef9dc623f5dd7661ec2d7d573f0c4dd33cb89772efd81f6e9c2126ba5f627
FreeBSD-SA-06:12.opie - The opiepasswd(1) program uses getlogin(2) to identify the user calling opiepasswd(1). In some circumstances getlogin(2) will return "root" even when running as an unprivileged user. This causes opiepasswd(1) to allow an unpriviled user to configure OPIE authentication for the root user.
b8dfcfe244434389f0f712b62834e4493fac0d0f1ef27d66baf50780b738dc15
FreeBSD-SA-06:11.ipsec - An attacker able to to intercept IPSec packets can replay them. If higher level protocols which do not provide any protection against packet replays (e.g., UDP) are used, this may have a variety of effects.
cd1b96393a9af7c1a0e233745283261ae1a557fc3a12d765fbfe2e36128ea12b
Debian Security Advisory DSA 1013-1 - Will Aoki discovered that snmptrapfmt, a configurable snmp trap handler daemon for snmpd, does not prevent overwriting existing files when writing to a temporary log file.
30b891b9dec55ccf116bf3552c53a248b8cdf8e86770eac44ad6e5bb00033232
Technical Cyber Security Alert TA06-081A - Sendmail contains a race condition caused by the improper handling of asynchronous signals. In particular, by forcing the SMTP server to have an I/O timeout at exactly the correct instant, an attacker may be able to execute arbitrary code with the privileges of the Sendmail process.
2924cc76d4b0846acbf9b32a7c2f41d6311493dcad6c5af191f7f2f93aea9a03
Gentoo Linux Security Advisory GLSA 200603-21 - ISS discovered that Sendmail is vulnerable to a race condition in the handling of asynchronous signals. Versions less than 8.13.6 are affected.
8d039311aef14bd3b04305d5e94ff56ec5af366873df68414e559f2d5effd79b
SQLbrute is a multithreaded blind SQL injection exploitation tool (in Python) for enumerating information from Microsoft SQL and Oracle databases using error/no error techniques. It also supports time based error detection for SQL Server. Generates SQL injection exploit strings with no single quotes (unless you supply them), no + signs, and no || concatenations.
06963ac0be9ca07e8b5e79f1a92a691966732aff5b9203d2e7d3e162bfd5e4ec
Secunia Security Advisory - Secunia Research has discovered a vulnerability in Orion Application Server, which can be exploited by malicious people to disclose potentially sensitive information.
5db8b04f52a982a83977dadff6342d0f5d337031cb83caa607d412c96373471b
Secunia Security Advisory - A vulnerability has been reported in webcheck, which can be exploited by malicious people to conduct script insertion attacks.
e69676ec1984d0b79441815da80e405eac376d3407fee9d386aa924051c765c7