fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.
1e6c3e28b8679bb9a5c15fa9668268056d2e47050ed2da83b24ea5d18ccfae08
Microsoft Access ActiveX related remote exploit that makes use of Snapview.ocx version 10.0.5529.0.
b418fa673cc55dfcf90f4e9dfce2c5f05a6ce9565e0807ae39e50cd98b56534f
WordPress Download Manager plugin version 0.2 arbitrary file upload exploit.
f4352352dfbb061a6b9c4b27cd3ef159302071642949194c968b4379e83842c2
ibase versions 2.03 and below suffer from a remote file disclosure vulnerability in download.php.
db39df7e1f419eaccc0f82839b14415f00ce90376e4d077e6c3b90eb5522626a
Atom PhotoBlog version 1.1.5b1 suffers from a remote SQL injection vulnerability.
9e334ad64124c312d55d19b3d62af703bdda22131d6982507917448dd468e5e2
Secunia Security Advisory - Fedora has issued an update for asterisk. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to conduct DoS attacks.
62b43822cff1aaa9d9d06bbec5a1d641a5d85e41a4ab03ffc0182a862577e7bc
Debian Security Advisory 1616-1 - Damian Put discovered a vulnerability in the ClamAV anti-virus toolkit's parsing of Petite-packed Win32 executables. The weakness leads to an invalid memory access, and could enable an attacker to crash clamav by supplying a maliciously crafted Petite-compressed binary for scanning. In some configurations, such as when clamav is used in combination with mail servers, this could cause a system to "fail open," facilitating a follow-on viral attack.
53d2d5e8934a297dfc89e1f10ffc3e070c9fb65df9d21b132165a4b8f84908d5
This exploit targets a fairly ubiquitous flaw in DNS implementations which allow the insertion of malicious DNS records into the cache of the target nameserver. This exploit caches a single malicious nameserver entry into the target nameserver which replaces the legitimate nameservers for the target domain. By causing the target nameserver to query for random hostnames at the target domain, the attacker can spoof a response to the target server including an answer for the query, an authority server record, and an additional record for that server, causing target nameserver to insert the additional record into the cache. This insertion completely replaces the original nameserver records for the target domain.
59998e85046f16a5c63dc45a0b65a8c3c0309d28215b39b9b32e8e980b05bf05
ipt_pkd is an iptables extension implementing port knock detection. This project provides 3 parts: the kernel module ipt_pkd, the iptables user space module libipt_pkd.so, and a user space client knock program. For the knock packet, it uses a UDP packet sent to a random port that contains a SHA-256 of a timestamp, small header, random bytes, and a shared key. ipt_pkd checks the time window of the packet and does the SHA-256 to verify the packet. The shared key is never sent.
0f0c06e263787d03042d6443165bafefd95087367bf0f3981ba44546668d2060
This exploit targets a fairly ubiquitous flaw in DNS implementations which allow the insertion of malicious DNS records into the cache of the target nameserver. This exploit caches a single malicious host entry into the target nameserver. By causing the target nameserver to query for random hostnames at the target domain, the attacker can spoof a response to the target server including an answer for the query, an authority server record, and an additional record for that server, causing target nameserver to insert the additional record into the cache.
11e910b2fd7ce8685913d022a8c861ee68b58c8de15e6ff4788583be2137f4aa