Support Incident Tracker versions 3.65 and below remote code execution exploit that leverages translate.php.
7ffa1156de49d88784954d7cb69a66baecd33c27f096acddfdbe8fc423368721
ARASTAR suffers from a remote SQL injection vulnerability.
dc12599283621325cb714093b93b59d602c5361717808e4fb4f37cc5e0f8f30a
Digital Attic suffers from a remote SQL injection vulnerability.
70394b8ab202643cf6d047b51fa41a4d3558a6cef4ca6dba23d0455999412c7a
The WordPress Jetpack plugin suffers from a remote SQL injection vulnerability.
d000017c326513bd43fc0da1283f6f2b07d76a93d548cf37b41525864890a150
This Metasploit modules exploits a vulnerability in Wireshark 1.6 or less. When opening a pcap file, Wireshark will actually check if there's a 'console.lua' file in the same directory, and then parse/execute the script if found. Versions affected by this vulnerability: 1.6.0 to 1.6.1, 1.4.0 to 1.4.8
c7b86f510e7897dd9923514fbd475d9ec025e6ea543ad22525475f3d82ace5ef
Stack-based buffer overflow in the MOVIEPLAYER.MoviePlayerCtrl.1 ActiveX control in MoviePlayer.ocx 6.8.0.0 in Viscom Software Movie Player Pro SDK ActiveX 6.8 allows remote attackers to execute arbitrary code via a long strFontName parameter to the DrawText method. The victim will first be required to trust the publisher Viscom Software. This Metasploit module has been designed to bypass DEP and ASLR under XP IE8, Vista and Win7 with Java support.
902c4d348e0eb89f02c1aff016e36bb2f309e424dad941285a19cf704212a739
Sites powered by CareerBuilder suffer from a cross site scripting vulnerability.
9d7b6dbe930d644e2ab47535610458db70fe572c54f27cfdbe7669bf99e51032
YSD Web Design suffers from a remote SQL injection vulnerability.
6edf8fc65414a9538a833e32d7e3de32ab92e2430f71b30040abecf9b7b40463
Whitepaper called Social Engineering - The Human Factor. It documents suggested phases of the social engineering lifecycle and associated techniques for implementation.
461544be2738e4d8abf609851dadb8d3da3588cb53e8c180e81e7d7b8e0989c9