Sun Java Web Server version 7.0 update 7 remote stack overflow exploit.
1d5f8ef617835a71a58262660e2ce215591ca0aad2cd8ed70a7c99368e4b3aec
Ziggurat Farsi CMS suffers from a remote SQL injection vulnerability.
73ee43e5162693e2efcc28ab1e23206eb3d2eb28928d6cba88951f35dfa0b23c
SweetRice versions prior to 0.6.4 suffer from an arbitrary remote file upload vulnerability.
b284aa1e09344153fe7294ffa26387907d7e0a8820af88b2469cabade86ba107
Whitepaper called How to create a polymorphic shellcode on ARM architecture.
75eb95ec667eb98c2f7e20e3120ee7b195b6bc9456d0cf48582135137e0d4fef
TEHTRI-Security has released advisories discussing a stack overflow inside the iPhone iOS4 CFNetwork API, a client-side attack for BlackBerry devices, a client-side attack for HTC Windows Mobile cellphones, a client-side attack for the iPad and security issues related to trains.
4b42d73c1aadeaf9de7a51b6a9001fd83e5cb88bb700f472dc1f03987ad68017
WhatWeb is a next generation web scanner that identifies what websites are running. Flexible plugin architecture with over 80 plugins so far. Passive plugins use information in the headers, cookies, HTML body and URL. Aggressive plugins can identify versions of Joomla, phpBB, etc by making extra requests to the webserver.
cdeb79db86c92b37ee6aef9f12f6a6178982e75ecd8468ae3754bfb915c35df1
A stack buffer overflow vulnerability exist in iscsitarget, an open implementation of iSCSI Enterprise Target. The vulnerability is caused by insufficient boundary checking while processing iSNS messages. A remote attacker can leverage this vulnerability to inject and execute arbitrary code on a vulnerable system.
6fcd69274daa390cb09aab03d6ff81c49f17f973d50117e842e0491b410fefbd
i-NetSolution Matrimonial Scripts version 2.0.3 suffers from a cross site scripting vulnerability.
7660d8695dc212b89cece866271ab5cbbf12c7abf1eed5aae4bd3834f997879c
78 bytes small polymorphic execve("/bin/sh", ["/bin/sh"], NULL); - XOR 88 encoded shellcode.
59e3979481a38f547de4a781bdb6aa800fb9a71fc50a3d868cd18cd9c6d62e2f
Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the source code release.
1dc61c4eaecd4c6a551681aba65e673b9a81b4b9641e995851602110eed82607
Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the windows binary release.
bd436eed319e11749300c699f484de570d3c1c39246a161e54f2302c431fcc28
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
d1e9299679f03859064e875909d4d65e4a526445d5d505a28bbc977b4ce6f679
ASX to MP3 Converter version 3.1.2.1 local buffer overflow exploit.
f2c41b9bf8cb603094c7ed876cd4278c023171085bf61ae9d861c60f817762d1
The getnnmdata.exe CGI in HP OpenView NNM suffers from an invalid hostname remote code execution vulnerability.
c6160b614bd30c506691655f57ba3799b71c58e54ef143c0304ac845e925ce87
The getnnmdata.exe CGI in HP OpenView NNM suffers from an invalid icount remote code execution vulnerability.
a571b3f43d5b54967615a025bbfff4b53fd0146fac0bf7d8b77afd569ade2144
The getnnmdata.exe CGI in HP OpenView NNM suffers from an invalid maxage remote code execution vulnerability.
99fff4ac99bab3b5e5300c6c5dbdf4f2e9414684b5c71f7898cb6c50ee81c184
SasCam WebCam Server version 2.6.5 active-x SEH overwrite exploit.
7682eed33084ff722efb279c14ba70f70770eb05739265590db53fd832d52e05
ISC DHCPd denial of service proof of concept exploit.
ec5a26a30b7f5e98d48fd12778150e4391fb5f83e31e50ce3ca3f8a3101056c2
MP3 Digitalbox version 2.7.2.0 local stack overflow proof of concept exploit.
3af56d9a7e957654b0868c9875730a2b131d0cdb727940b25e0f71adf393ddb4
Debian Linux Security Advisory 2067-1 - Several vulnerabilities were discovered in mahara, an electronic portfolio, weblog, and resume builder.
77865a442105ccf8254832bee625185ed02f8d7ee1d3b20d6b2bc7060ef3c970
Zoph versions prior to 0.8.0.3 and 0.8.1.1 suffer from cross site scripting vulnerabilities.
990527c729b04c8edb656822e7259ef8d0c7f9140c6abfd9612079b9cda777e5
Virtual Security Research, LLC. Security Advisory - VSR identified multiple weaknesses in the Cisco CSS 11500's handling of HTTP header interpretation and client-side SSL certificates.
a326af05d494ce329e501c8d31cb88ef5241ca54732e93cb94798f317f50e528
Cpanel version 11.25 suffers from a cross site request forgery vulnerability.
ab8131a9149ab5dd6f7e62030aa6895722509e8a8eb48eda202740b74797400d
Family Connections Who is Chatting add-on version 2.2.3 suffers from a remote file inclusion vulnerability.
dad4c904508619e83f790a09c477c1a6f959b12a06d7eb1b4651618dfb6fd96d
The Joomla Seyret component suffers from a local file inclusion vulnerability.
d62243dc03ca2523d2be1f64c8f82cf745fb7e6874b018d9a2aeee9fd3965d0a