MyServer 0.7.1 crashes causing a denial of service upon receiving an excess of 512 bytes when a POST request is processed.
3970118156662026bd49f6e6a61e51bf925a2866ed8da13d136b86a489a5707a
Both aspWebCalendar and aspWebAlbum are susceptible to SQL injection attacks.
cbcdae728a34d30d596efd851faa6388885c4df0b771d740a69f3bbb6f577ee3
Proof of concept exploit ActivePost Standard versions 3.1 and below that makes use of a denial of service flaw.
bbb17d24cb628e3c1334d55dbe2e4753e2e988da7fdef7ec2ee6a29831cb6c23
ActivePost Standard versions 3.1 and below suffer from a denial of service flaw, a directory traversal attack, and conference password and path disclosure vulnerabilities.
1432731b3eb7446a8ac35202a9125cafb6659efb65593ba0e763e81fea42951f
Os-sim attempts to unify network monitoring, security, correlation, and qualification in one single tool. It combines Snort, Acid, MRTG, NTOP, OpenNMS, nmap, nessus, and rrdtool to provide the user with full control over every aspect of networking or security. Supported platform is Linux.
67176979034f6c3674d2dae6ae08e5a293a318b04472a798193d4d172f0628f2
raddump interprets captured RADIUS packets to print a timestamp, packet length, RADIUS packet type, source and destination hosts and ports, and included attribute names and values for each packet.
ef61496fe3ec089978c461bd9761c207ea52f137e54e6af37680701e0fd2da3a
Sandbox for Grids (s4g) is a Linux user-mode sandbox. It offers a secure execution environment for suspicious applications. Written in C, it tries to solve some typical problems of quarantine applications: efficiency and security.
a0b907e179bf3667087bd35eb6544487da098af910ae525ea71b65698a3011b3
Secunia Security Advisory - A security issue has been reported in Apache, which may allow malicious people to bypass configured access controls. The problem is reportedly caused due to an error within the merging of the Satisfy directive. The issue only affects version 2.0.51.
eaa5628461f9e9070a795e0e68747d06d36db7e5fc346ebf6f7fd8df93cf63b8
Red Hat Security Advisory RHSA-2004:434 - A security issue in redhat-config-nfs allows users access to more resources than should normally be allowed.
a216fbb70192426543801e3c4ee267bdb2045ebcec96889a88c7c5a311a684bc
Local root exploit that makes use of a buffer overflow in the Software Distributor utilities for HP-UX.
82d65b407a37a3ab39bc7d992bea154fb467c37350dce76f824a999dd2d53d19
Local format string exploit for /usr/sbin/ping under HP-UX.
61a2363dd060c8177bf52b47dc06b4540cf1587f6845ea99052c44d06cb31e22
Local format string exploit for /usr/bin/cu under HP-UX.
57206e7293d7bca0cb7d8d4291c67d84cf2cb6040f246ba4f663fc0056f390d1
The firmware of Motorola's wireless WR850G router has a flaw that enables an attacker to log into the router's web interface without knowing username or password and the ability to gain knowledge of the router's username and password after logging in.
53a21852c0242beeb54ba7eefa07e509f4a3ca8e3fb4efdc7230f7b036ceeeb4
Three high-risk vulnerabilities have been identified in the Symantec Enterprise Firewall products and two in the Gateway products. All are remotely exploitable and allow an attacker to perform a denial of service attack against the firewall, identify active services in the WAN interface and exploit one of these services to collect and alter the firewall or gateway's configuration.
48b3960d1be3e73919fc5e9e3fa627af4ba13039020e803d57e3dc2958cfdd93
GDI+ JPEG remote exploit that is a modified version of the FoToZ exploit that has reverse connect-back functionality as well as a bind feature that will work with all NT based OSes. This even-moreso enhanced version also has the ability add a user to the administrative group and can perform a file download.
20c93c78772b0990144751c09236f2b8c235714fcc01bac6f35dc0c88f2dc37a
Microsoft Windows JPEG GDI+ Overflow Download Shellcoded exploit.
ee65d8dd1061332d648503cf739eedf5b2c3f57d9cb1c8df57fffbc1fef368b6
GDI+ JPEG remote exploit that is a modified version of the FoToZ exploit that has reverse connect-back functionality as well as a bind feature that will work with all NT based OSes.
d8355ee0ee39e0020db08761e80e8dc97cb432c9a970c1cd4a0d88cdb50b417c
Microsoft Windows proof of concept JPEG GDI+ overflow shellcoded exploit that launches a local cmd.exe.
68ec3cf6594190766b5c1153c0e82bb34d0d0cf6f04eb6a95d05d317b7e06753
Amusing yet obnoxious play on terminology in the industry and how it is or could be used to make references to drug and sexual instances. If you are easily offended, do not bother reading this.
55800c95af5e0cadc9ac9ea6fb1d5f41a213fbf01ad6b95eba8fc1320cd4c8ca
iDEFENSE Security Advisory 09.22.04 - Remote exploitation of a design vulnerability in version 1.00 of Sophos Plc.'s Small Business Suite allows malicious code to evade detection.
1492e0bde6d3a8289918a6dcd69214b9d08f83ccb4e5d288c26fd1d43ed88c74
Debian Security Advisory DSA 552-1 - A heap overflow in imlib2 can be utilized by an attacker to execute arbitrary code on the victims machine.
ea5e41386bc1bc155b689ea6a09f084de69efe715343e3db8c31092ff03fcb2c
White paper from NGS Software that covers the technologies and security flaws Phishers exploit to conduct their attacks, and provides detailed vendor-neutral advice on what organizations can do to prevent future attacks. Security professionals and customers can use this comprehensive analysis to arm themselves against the next phishing scam to reach their in-tray.
6a8bb1037838fd20da9753a4b17817d78de7a39a7eb9c8bab70ab301084599f3
GNU sharutils versions 4.2.1 and below local format string vulnerability proof of concept exploit.
77348517a311c4d33a71d136d2a86f87228102b1b0790917f34f7f55a44d78b2
Secunia Security Advisory - A vulnerability has been reported in VP-ASP, which can be exploited by malicious users to cause a DoS (Denial of Service).
11ad83172f449a7a8e71d3840387c8b8b8cc3d188dbffe6f5ed1819e5d62e589
Denial of service exploit for PopMessenger versions 1.60 that makes use of a flaw when handling dialog boxes in relation to illegal characters.
ffa5592f64a45d81de279146b0206c3db5db1d01f749e11b7ca335bdb9de2e7d