PHP-Nuke versions 6.x through 7.2 have a flaw that allows for administrator level authentication bypass.
e506b19ed8619a63fd70561c25235584398ff9dd2637205db300cc42e775de9e
PHP-Nuke versions 6.x through 7.2 have a flaw that allows for user level authentication bypass.
24b939d8a82382eed2da1caaffa8502f8d77754e47102fee8be0407d1a625590
Microsoft Internet Explorer 6.0 allows malicious Javascript to send documents to the printer without notifying the end user.
2c2171de70fe2e714e0da33b8bb2b0a81c2a7c66e84b62519324f0117db82e8d
Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix clone.
926446c2c104b8635df0371c77dac4f4eff5c0a9b76d63b44094f75ee97e3295
The Linux Intrusion Detection System (LIDS) is a patch which enhances the kernel's security by implementing a reference monitor and Mandatory Access Control (MAC). When it is in effect, chosen file access, all system/network administration operations, any capability use, raw device, memory, and I/O access can be made impossible even for root. You can define which programs may access specific files. It uses and extends the system capabilities bounding set to control the whole system and adds some network and filesystem security features to the kernel to enhance the security. You can finely tune the security protections online, hide sensitive processes, receive security alerts through the network, and more.
7c83e2106826ddae1fcf6233ad7941c4ac157d1a92eaa396f5a0b4a11c263470
Monit versions 4.2 and below remote exploit that makes use of a buffer overflow in the handling of basic authentication. Binds a shell to port 31337.
ba0446ecc2f07da2a2e4e121bf6475f2fd33ff6fdc434504fec164c267d88c3d