FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand.
7e5f59e36fea86dee34f35054a38c3def77a7e649306f58a478ebb0b875aca8a
The Bastille Hardening System attempts to "harden" or "tighten" the Linux/Unix operating systems. It currently supports Red Hat and Mandrake systems, with support on the way for Debian, SuSE, TurboLinux and HP-UX. We attempt to provide the most secure, yet usable, system possible. Screenshot available here..
ebe4d9a3204ad599a3cdbe43f230345f48e5736d5746187f93756eac0728694c
Small application written to make life easier. It dumps C style opcodes between two provided offsets.
4e7b34bd72aa38097381c48faee3882bfff8bfafa9e16fcbd8a7d692399b7651
Codebug Labs Advisory 07 - MercuryBoard version 1.1.1 suffers from full path disclosure, cross site scripting, and SQL injection vulnerabilities.
a5dd346b2b76b8259b8056a173a7b0ddc02288d8e782620519e1e93d42cc7968
Apple QuickTime versions 6.5.2.10 and below suffer from a parsing error when attempting to view .qtif image files.
48ea82095007feda2f86f09f89aee84096b9f55c4146bd6b26bf75ad8f0e984e
Local proof of concept exploit for W32Dasm which suffers from a classic buffer overflow vulnerability when analyzing files.
a44335a5b4c70b0d99744758f3679185362ee6a37c83fd430730372e089ffbf8
W32Dasm suffers from a classic buffer overflow vulnerability when analyzing files.
3f6a94664240e9d8bbf43651feb3e5c53fc4ae4770c8ea40c482cce15361e873
Gentoo Linux Security Advisory GLSA 200501-35 - An overflow in the camel-lock-helper application can be exploited by an attacker to execute arbitrary code with elevated privileges.
3b68ef883df8baaaa42a0980b2702f7d70c0e2a3d3b5303c645dd93cae809857
Multiple applications that suffer from the fd_set overflow vulnerability can be exploited remotely.
98b5664dadec4af4304274a5d8ca405f190f86ac380dc5aa853abbe0b1aeb28f
iDEFENSE Security Advisory 01.24.05 - Exploitation of a buffer overflow vulnerability in DataRescue Inc.'s Interactive Disassembler Pro (IDA Pro) allows attackers to execute arbitrary code under the context of the logged on user.
55b803cfa439087d25f7b47235e3dc842c772a5b73bdfd06ab64bec6b861635e
The Spectrum Cash Receipting system suffers from a weak password protection vulnerability. All known versions are susceptible.
0a44374528890f045fe0d7c83d05b05dda03b7b5ec10f52e6f4d4c41c0cb3cdc
AwStats exploit that makes use of a remote command execution vulnerability in versions 6.2 and below.
810a1b6622168332504e360c7e6c6da2f9cba118f557e5e09ee9ec3f50f1bbdc
AwStats exploit that makes use of a remote command execution vulnerability in versions 6.2 and below.
be671afe2f640ea4ebc8399b59f577f8e679a509900ad185c46a6d313f3dc8f2
Funduc search and replace compressed file local buffer overflow exploit.
330ed4397d80f8d1f93106c532f481ba8da62d45bdc2be4fc9e1f89e233d4ba6
Secunia Security Advisory - Three vulnerabilities have been reported in SquirrelMail, which can be exploited by malicious people to gain knowledge of sensitive information or conduct cross-site scripting attacks.
5e427517a8087ebfcd6d23dbc8b8109b24c6436924418adea0aa4503c95db387
Secunia Security Advisory - A vulnerability has been reported in OpenH323 Gatekeeper, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.
0e00df695a2ee82d279b56ac317f5e9954f40bd95af5c03b911d6af414531115
Secunia Security Advisory - A vulnerability has been reported in Xerox WorkCentre Pro, which can be exploited by malicious users to gain knowledge of sensitive information.
96c3ddc90418aa194340dce6d44a650df57ab7b05842ebace5f946877323ef4a
Secunia Security Advisory - Ryu Connor has reported a vulnerability in nProtect Gameguard, which potentially can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
7682be8f2b90b5114329d536fdc8cfe4cf770e38f4f1a31f42253b59af5541c4
Two small flaws in the Nokia 60 OS can be used in conjunction with each other to allow for auto execution of files.
1777d35680fcdd177f244d2e801306c5bd6cb4a8056c03ad276d5346b707ffab
KSB26, Kernel Socks Bouncer for 2.6.x, is a Linux 2.6.x-kernel patch that redirects full tcp connections through a socks5 proxy. KSB26 uses a character device to pass socks5 and the target IPs the the Linux kernel. This is obviously quite useful if you want to transparently tunnel certain things through a given proxy to remain anonymous, or if you want to transparently be able to sniff certain network traffic.
8cbf2ef36c9823446a6c16d7c383ae2572fb0b0ab8641f0d6ea0f5b5aa8bc8d5
Siteman version 1.0.x remote perl exploit that adds an administrative account.
24250a5f88d11411275a9dc4ee3d5a05bf4833631d14b6dc2520a5c02db22cdb
Local root exploit for mRouter installed by iSync on Mac OS X 10.3.
9a814a90dbb6e5458ed265b55264c5bf185da8f2b4e2f51e6fe813505c80c98a
Proof of concept exploit for the Windows ANI File Parsing vulnerability that works against Microsoft Windows Server 2003, XP SP0/SP1, and all versions of Windows 2000.
91c664069aaf04eeb2fd8b56dc978ae1a85c97f8aebaa343b6a3a748475d770d
Golden FTP server exploit that binds a shell on port 4444 after making use of a buffer overflow using RNTO.
9724f97a1ecada3be15f4742b07636f26e97c99aca03c918c47480b86a0c9e10
This code calls a URL in the browser window but fails to update the address bar in Internet Explorer. It appears that the form submission is suspended with the interrupt of the 'window.alert' call.
5fa49406e32cc1f2292382225ac7d84a711606f41edf1a871c33e51865dd8cbc