ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.
1d5686709012eccdc91372a8ff348b155216d91aa96311760778f9cabc551692
NMB Scanner scans the shares of a SMB network, using the NMB and SMB protocols. It is useful for acquiring information on a local area network for such purposes as security auditing. It can obtain such information as NMB/SMB/Windows hostname, IP address, IP hostname, ethernet MAC address, Windows username, NMB/SMB/Windows domain name, and master browser. It can discover all the NMB/SMB/Windows hosts on a local area network by using the hosts lists maintained by master browsers.
e32648c3c8a919ef90083e2abed3b1c1142a50833e50e6adcb0d26884d113c91
Network Security Policy Compiler (NetSPoC) is a tool for security management of large networks with different security domains. It generates configuration files for packet filters controlling the borders of security domains. It provides its own language for describing security policy and the topology of a network. The security policy is a set of rules that state which packets are allowed to pass the network and which are not. NetSPoC is topology aware - a rule for traffic from A to B is automatically applied to all managed packet filters on the path from A to B.
36ad93d22dd3d6d661363e790f450553658797d5d87590ad9c511dbb2bc6024e
RaidenHTTPD version 1.1.27 is susceptible to a directory traversal flaw where any file can be extracted from the disk partition where the httpd is installed.
269edca2c20fc62296721fc364efa750631965f3d26ff48a5c321679256841a2
Foxmail server version 2.0 is susceptible to a boundary error condition in the MAIL FROM: directive. Sample denial of service exploit provided.
12684f6fba7180492c27e286a2d4c1d83bb3e0a4bc6e225b01f207228fe4972e
Savant Web Server 3.1 remote buffer overflow exploit. Tested on Windows 2003 Server.
1ed148f916799f97a798ed6d48fe21c3a6acb343828fce74c7b209352c2ad419
Debian Security Advisory 667-1 - John Heasman and others discovered a bug in the PostgreSQL engine which would allow any user load an arbitrary local library into it.
f696d1c5dde19c70dacd77fe755a8a5a569a722860c5cbac6a77190dec6fb077
Debian Security Advisory 667-1 - Several vulnerabilities have been discovered in Squid, the internet object cache, the popular WWW proxy cache.
7023beefe31b1797e6948b6300209a9539dad7faa295d93627d952453c9cabf1
Remote proof of concept exploit for the buffer overflow vulnerability discovered in Exim 4.41 by iDEFENSE.
753d89e248ed9f5367270763d2d68d1468737e48ae16a35a50dcfe7aa88d72f4
Operator Shell (osh) 1.7-12 local root exploit.
fe3a929faff57858b299fc1c0d1660e3387d19c65452c581dd20e06aa4b548d6
Secunia Security Advisory - A vulnerability has been reported in PowerDNS, which can be exploited by malicious people to cause a DoS (Denial of Service).
89ffbcfbd320a38a644524620e99b0192a661b92e846344507fca482fa86021b
Apple's Safari web browser ignores the Content-type: sent by the web server. As a result, plain text is rendered as HTML. This is obviously undesirable; a text file could contain HTML and carry out a cross site scripting attack. Version 1.2.4 v125.12 found vulnerable.
10a5c6ef669523ad42fb93782a22e3c443ad92a6b20d36b351021365eba4dc92
Secunia Security Advisory - Yiannis Girod has reported a vulnerability in Claroline, which can be exploited by malicious users to conduct script insertion attacks.
22d0bba8ffbefa93290fec00a853f530f91ff4f03b1424c7e382b924cc02b184
Secunia Security Advisory - A vulnerability has been reported in MediaWiki, which can be exploited by malicious people to conduct cross-site scripting attacks.
b56a1c7813d446bb57fa19de8d821cbfdcd78d9e1d4576e864b38d1d0edbf976
Ubuntu Security Notice USN-74-1 - Jean-Samuel Reynaud noticed a programming error in the IPv6 handling code of Postfix when /proc/net/if_inet6 is not available (which is the case in Ubuntu since Postfix runs in a chroot).
1361e5043d319a56722b28e92124792fb0450d00828d4cc31f4b23ffd277ab33
LiteForum version 2.1.1 SQL injection exploit with one char bruteforce.
40746b70c57b6cd7eccff85b84ff592efd5ba6e911b74ca4c0dc26104e4c031b
Rstack Team Security Advisory RSTACK-200502-02 - The Rstack team has discovered a tiny denial of service flaw in the Linksys PSUS4.
6db78ee2d9d84a06d101ff9f74b37f48e2e5ae8c33cb2d2ee9511fb40234830d
Secunia Security Advisory - Niels Heinen has reported two vulnerabilities in newsgrab, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges, and potentially by malicious people to compromise a user's system.
039ef0ee1900a322e7f4fccaf765049b239e847939e757991873df428dc71c53
This presentation explores new methods in exploiting SQL injection vulnerabilities inherent in Oracle Database. It contains a presentation with 37 slides and various exploits that demonstrate examples of flaws.
40233cb1502c958361ff1184ec472b9a2194b8341030a7d5db67ad47bf88d951
An integer bug exists in the ipv6 implementation of the Linux 2.4.20 and 2.6.4 kernel series allowing for a local denial of service attack.
279a64da733a8c879cee20236c3ba675e4b6b495f93d75172880c96c37f4deae