A Unicode buffer overflow exists in the handling of .mcw files in Microsoft Word.
bd6af65a00560736f607e17816c217de9f27ad59f1769adbd5fa1f8de4ff8e02
There are several buffer overflow vulnerabilities that can be triggered when loading a specially crafted profile into RUMBA Office 7.3.
ddc021caa5195851b76ce25e60084b865be505a0a82d133687d33b9815e75145
OmniCon WinShadow version 2.0 exploit that makes use of a buffer overflow in the client handling of hostnames in host files.
86813402c8fb4dfc3ce919ffaaa3d42a89d9a501b49144029fa04d5764e3e764
OmniCon WinShadow version 2.0 suffers from a buffer overflow in the client handling of hostnames in host files. A denial of service also exists whenever an excessively long username or password is used.
1ab3f35a2cae652c184347381e282940b2819ed0fa2fd143dfdca37f01511eb9
Re-Boot Design ASP Forum is vulnerable to a SQL injection attack that allows remote accessing of a user account without prior knowledge of their password.
e678d70617cc30fc5813f731c6760853903497a982dccceee63e02e782e18f04
Thread-ITSQL is susceptible to cross site scripting attacks in its Topic Title, Name and Message fields.
a8673828a2c183f9ff8049970d8dbf6c66a148d78e082ca0072c4acc741f989a
The Thread-IT Message board is vulnerable to cross site scripting injection via the Topic Title, Name and Message fields.
10e3db50f48b3886d5c8ae6c8e46cadf3fa8ec612cab4d818e88e79ee5f0385f
Comment Board is susceptible to cross site scripting attacks in the Topic Title, Name, and Message fields.
827dc62fdf35b1cc001920e7959315e067206ab13b453f97e6841f66fd718d36
The Plug and Play Web Server version 1.0002c is susceptible to multiple buffer overflow attacks that cause the server to crash.
2b68d648120147ab8417ee871e9d52d166dd19a55bd2cd64fc864ba5ce18e676
The Plug and Play Web Server version 1.0002c is susceptible to multiple directory traversal attacks allowing a remote attacker to gain access to internal system files.
08a1508555f21666773d5967a389f637ade7bd17986669a075b9984c763bda51