Haberx version 1.1 suffers from a SQL injection vulnerability.
41125b7c38881d9dbe9e0cf3a5a3afd4d8bbb28667326904d4c52cc4599a81e6
PHP DocWriter versions 0.3 and below remote file inclusion exploit.
8c9cdefd0810252b3fb6bcc265fefa95f6273dfa2ac74a6392b479565052320a
md5tables is a shell script that references a wordlist of md5 hashes and words for password auditing.
c9ba9acafe6babf9fadbb9d9c6394ac75654d69684da4c884029cedd12da9237
ReviewPost version 2.5 suffers from a remote file inclusion flaw in RP_PATH.
6bea4ea57f84a8a2b6494117f06a72fbd9484a7d5258cf3eed7a5317bea2aa81
Proof of concept exploit for Apple Quicktime versions 7.1 and below that are prone to a heap overflow vulnerability.
b6924fd8d23236869e71f67e91da66270a169683e2aefcecfc8cf47722b4f2f2
Apple Quicktime versions 7.1 and below are prone to a heap overflow vulnerability. This flaw could lead to a remote code execution if an attacker tricks the victim to visit a malicious webpage with a specially crafted .fli animation embedded.
1ee5211d786a1ec037a48775c13cf4a4da8d8e8aceaab35cd135b1d92de5fb0a
phpBB XS suffers from a remote file inclusion flaw in phpbb_root_path.
9e31daaf0663ca092a23c5ec5112cef49fc3350b0d34a6faddc0add52c3b3df7
Debian Security Advisory 1177-1 - Hendrik Weimer discovered that it is possible for a normal user to disable the login shell of the root account via usermin, a web-based administration tool.
b68001507b7777908f508eebc31fd47b3262dd03cbac031d4ca7b25fee50dba1
easypage.org version 7 is susceptible to a SQL injection attack.
6479c3c561edb20908a4aaa39f017e3f305dcd175cdcad211407b9a8c4864611
BolinOS version 4.5.5 suffers from a remote file inclusion vulnerability.
1f2836339350c669c1082c1977a5ec86128dc463039070e6bc8502cc9326b5b2
Testing program that checks for an insufficient validation flaw in the "SymEvent" driver input buffer in Norton Personal Firewall 2006 version 9.1.0.33.
6142c7d7e49020be09f24de4def0eb42eef262aec8d49a1d936f6dc8bbe73f7f
Norton insufficiently protects its driver '\Device\SymEvent' against manipulation from malicious applications and it fails to validate its input buffer.
6b85048dc98dd8c7e77dace699b1ca0ce1382f547a60a5f92c7709c883ccf21b
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.
07bd7ac7b645d1380ace65b33c064ed58d9dc21bd736b1f76bc575dc22e1a5e2
Advchk (Advisory Check) reads security advisories so you do not have to. Advchk gathers security advisories using RSS feeds, compares them to a list of known services, and alerts you if you are vulnerable. Since adding hosts and services by hand would be quite a boring task, advchk leverages nmap for automatic service and version discovery.
e35d5c1dc1a555251834e05e78af310b90c1f406a65c401623c817549bef03ce
phpQuiz suffers from a flaw that leaks sensitive information about the system.
09205ce1e9a97700b6765568130b3d61a5d9fb1caa21eecf4093a6326afe5a04
Gentoo Linux Security Advisory GLSA 200609-11 - Queries for SIG records will cause an assertion error if more than one SIG RRset is returned. Additionally, an INSIST failure can be triggered by sending multiple recursive queries if the response to the query arrives after all the clients looking for the response have left the recursion queue. Versions less than 9.3.2-r4 are affected.
07ea4a1dcb3d20f2b25899b79e578592fbbed0c77e281f587becabfe0901bdf7
Roller version 2.3 is susceptible to cross site scripting attacks.
6e7c8b2284046e0dcf15ef8f1a71e39d90134aaa33700badfb88aa9810b51ab1
Debian Security Advisory 1160-2 - The latest security updates of Mozilla introduced a regression that led to a disfunctional attachment panel which warrants a correction to fix this issue.
8d6b786145d2ff0f66fe2784b8d16a28b0bd3f0fd56781568664c160cd010322
ASP Auditor is a cool utility that helps identify vulnerable and weakly configured ASP.NET servers.
8c5a8da14dddd9a6ec816d308ef1e0adc080cc5af52ab4e9cd870adfe27796f6
MyBB suffers from full path disclosure and cross site scripting vulnerabilities.
b786ab0ae4e350c4571a4084fb9aece80d04e2ac7c9e008b4d661579642eb64c
The Jupiter CMS suffers from SQL injection, full path disclosure, and cross site scripting vulnerabilities.
14f38326a92f77da3ad6e2171702a182c136cb34437919df0954146718023047
mcLinksCounter version 1.1 suffers from remote file inclusion vulnerabilities.
eff67f37d1ab237612fe9181ef9bb80071c957dad6f1348e1bf74752a94b99c9
The call for papers is open for the Hackers to Hackers Conference being held in November, 2006.
55382a5bcdc4f88194115aa1e7d5f7c18732c40caa229cc5e4cdba265ecb05f0
HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running X.25. The vulnerability could be exploited by a local user to create a denial of service.
7c112aaf0512d775d14cca9e930421d006cd284407cda0854db3e6b1f791c784
ClickBlog! versions 2.0 and below suffer from a SQL injection vulnerability that allows for login bypass.
cf7533d49e3535f4a6fd852922e644ab836a8935d0126c7b898ade9b2bec450e