Kismet is an 802.11 layer 2 wireless network sniffer. It can sniff 802.11b, 802.11a, and 802.11g traffic. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Besides Linux, Kismet also supports FreeBSD, OpenBSD and Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. Kismet also includes a tool called gpsmap that can be used to create maps from logged GPS data.
a298d44f8a6ec977021cd492a720987ded81b5c4baf5f68b36f1282a23c9f7d3
Nebula is a data analysis tool that automatically generates intrusion signatures from attack traces. It runs as a daemon that processes data submitted from honeypots. New signatures are published as Snort rules and can be used to defend a network from future intrusion attempts.
a72605776c17e6c7038972b6fcfa0d17f63a693b21e21701518d5f1e328aa4ed
Now SMS/MMS Gateway version 5.5 remote buffer overflow exploit that binds a shell to port 4444.
fb10833a3ceda64288a1c504ea3f32181e19fd5494a383d7ac1447d494118766
Remote SQL injection exploit for the Mambo mambads component version 1.0 RC1 Beta and 1.0 RC1.
1371c22c9ff1adf3da246d12be00f789787487914587e621e5db10042902baf5
HiveMaker Professional versions 1.0.2 and below suffer from a remote SQL injection vulnerability.
edecf2cabc9140694b7fe0545b10328ec7fe6f5e9483e279b9184bae6e318ab9
Apple Mail versions 3.1 and 3.2 suffer from a denial of service vulnerability when reading a specially crafted e-mail.
ee6c6052c1a8464b7f929eea3c3351ac59de5b64c5f6f924225eee4a43f255de
Dot Net Nuke versions 4.8.3 and below suffer from a cross site scripting vulnerability.
86cd5f32cd7cd1c3674ce7d617eff9c9047049a44b5d05f092d43848ff71e81a
PHP Booking Calendar version 10d arbitrary file upload exploit.
933684b5cca85e8930bf073739a60881ae9474d8a0eca85e813a587ee77c5b2b
CMS from Scratch versions 1.1.3 and below suffer from a directory traversal vulnerability in image.php.
3f4831f4fdb0ddc7de6a97e23e86dec24c92e7b468890d059ed9452891c221d8
PHP Booking Calendar version 10d remote SQL injection exploit that retrieves the administrator login and password hash.
262259f83a4516baf4c9357afa3f71292f7b19b03e75adcd312d3bc801df029a
ASUS DPC proxy versions 2.0.0.16 and 2.0.0.19 remote buffer overflow exploit that binds a shell to port 4444.
95ad9e971e97b7a96c4d56b03b003adcba794f0811d9d05a78b73dd5d0e1c8ef
Secunia Security Advisory - A vulnerability has been discovered in RockN Audio, which can be exploited by malicious people to compromise a user's system.
31bbed62d079085c932940b06b0727c26fad8c80a5e8b277b816edbe81b6fe56
Secunia Security Advisory - Fedora has issued an update for kvm. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions or cause a DoS (Denial of Service).
d65453f648ee2aab6c67431b793b4e19b09ff7a25c6ce05500ae782f3861199c
Secunia Security Advisory - A vulnerability has been reported in cbrPager, which can be exploited by malicious people to compromise a user's system.
24213dc66f50daf5f65733572602a764735d35fd4b52c987bd7c8e731ff991c6
Secunia Security Advisory - rPath has issued an update for evolution. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.
dafb1543e61b3a1f40a74b4739a670722c03112e39f88520a5e796d243fc650d
Secunia Security Advisory - A vulnerability has been discovered in Gold Wave Editor, which can be exploited by malicious people to compromise a user's system.
2947d335e991d9e3e2957d1c9814bf761bf9f8127ac37c4430099438d50444d2
Secunia Security Advisory - A vulnerability has been discovered in various HiFi products, which can be exploited by malicious people to compromise a user's system.
894b9968873837b644432f9ac1fd927a52429f99bbfa9eca5fd803b33c4ad8c2
Secunia Security Advisory - A vulnerability has been discovered in various Color7 Technology products, which can be exploited by malicious people to compromise a user's system.
740ab8393f2b72a0afb7e2247b30e656cbeeba69587095d2fab42dbf23ac3248