phpComasy CMS versions 0.7.9 pre and below suffer from multiple cross site scripting issues.
c678493d4996d14d7be9b48b55c16d03412f61b7c102493618177735ff5be26c
Gentoo Linux Security Advisory GLSA 200611-02 - An integer overflow flaw has been found in the pixmap handling of Qt. Versions less than 4.1.4-r2 are affected.
811400c1386615c0242a53472abf4f7ed07a1e7467b6597704efea66877c81bd
This VulnDisco Packet for Metasploit 2.7 has the following zero day exploits: vd_ldapinfo.pm - [0day] Query info from LDAP server, vd_xlink.pm - [0day] Omni-NFS Enterprise remote exploit, vd_openldap.pm - [0day] OpenLDAP denial of service exploit.
bf1ddad6f404b81910e06f6d100945a2cbfe7b3a7306053e77c44e423bfaf932
@cid stats version 2.3 suffers from a remote file inclusion vulnerability.
2818aa304b15a3953e303690b5f8a60299a2fab84aa133ba1f1cc40baf1cde82
The SCARF system from a person at Stanford suffers from a failure to verify administrative access.
a2937cb5802f5f7ccd02769e8a7d461c76c6dfd46d760a66afbf8f14e49dc234
PayPal.com suffered from a cross site scripting vulnerability.
22d98d91409ede316d23ed907459afbc3116834d535af7e20e9bc825d40944de
Advanced Guestbook version 2.3.1 suffers from a remote file inclusion vulnerability in Admin.php.
209fc6296bd2a108ab00b092d8563b64da3177da09da3b2d37fe71372110095c
Hotmail and Windows Live Mail suffer from a cross site scripting vulnerability.
5f48c2896446171c4769baad66e13e1b448d7f013d714a10ee529ea29207362d
MWChat Pro version 7.0 is susceptible to a remote file inclusion vulnerability.
2f0692f9cdb1efd9b4d135f166cfaf926a22b8d0f15b285fee674cef72be8b3e
Armorize Technologies Security Advisory Armorize-ADV-2006-0009 - ZendFramework Preview version 0.2.0 is susceptible to a cross site scripting vulnerability.
634d1ab8583771f7d0e0dc023fd1f7060ae1ef993418123e8af64ad518c89d8b
Secunia Security Advisory - A vulnerability has been reported in Hyper NIKKI System, which can be exploited by malicious people to conduct cross-site scripting attacks.
03cd0fb4da8f82ce605b6414b570e358c1c57580dc83b93e8c29cc4d5caf86f4
Secunia Security Advisory - LMH has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
669e1b7a39a73d04f340c3f76b14c801e32070684d779e750d441f39f93c5d44
Secunia Security Advisory - SlimTim10 has reported some vulnerabilities in Creasito E-Commerce Content Manager, which can be exploited by malicious people to bypass certain security restriction.
5129b3077b843f24381af70e139cd56398239b9fed43e2365aae68f8b547c673
SinFP is a new approach to OS fingerprinting, which bypasses limitations that nmap has. It only requires one open TCP port, sends only fully standard TCP packets, and limits the number of tests to 2 or 3.
1369b428d4cce63274879980954dcc11f87c7f42167155c8cb8327a0832eb682
PIKT is a cross-platform, multi-functional toolkit for monitoring systems, reporting and fixing problems, security management, and updating system configurations. PIKT comprises an embedded scripting language with unique, labor-saving features. Binaries available here.
a6c35e1c0cb59a0e8b1336b2bb3d01a3a6182bada0c16ed93fd98b805f410f01
fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.
ff771ee9498fde005fdae01e8fe2f1a0ea0658aed9248a72ad4d0ad91be23dc0
33 byte execve(/bin/sh) linux/86-64 shellcode.
b215b1814e47e43730a926339987e2eef24065326742a8373fb28dc8f0420d22
This shellcode allows you to download an ELF executable straight off a standard HTTP server and launch it. It will be saved locally to a filename called 'A' in the current directory. linux/x86 and 111 bytes.
4a909ca87606bf57f755b2c8322fb4fa6ee45728619e7f9d3db8fc7ea441cce8
Small utility designed for generating HTTP/1.x requests for shellcodes.
1c5e4b2c58884668e99c7345778c7905c9db49401533dd861cc9e4d916255aa3
EFS Easy Address Book web server versions 1.2 and below remote file stream exploit.
d4914cf7bc4dd032087a23c8e5cc6f15f2b3d5407d2fb1331b5ae13379345bb4
Novell eDirectory versions 9.0 and below DHost remote buffer overflow exploit.
1acfa7a13ca13f316e5a4c8f1d11e2f197cda1019616c5dc3401e0d70f57d958
Easy File Sharing Web Server version 4 remote information stealing exploit.
42057b99e0d7bd1d1a5e5921f9a6ebd7d935abd7b44d1fbc81a317569e084cbb
This Metasploit module exploits a buffer overflow in the ADMCREG.EXE used in the PrivateWire Online Registration Facility version 3.7.
a5ec652464b0f067411e97ad1d8e3280db7564bcfd84b1c5fde1f0ead9835c19
Novell eDirectory 8.8 NDS server remote stack overflow exploit.
e13f49ce4c2215c79089e171a73e05cce1ddb0e13f341bc663e386832f5d8667
iWare Pro versions 5.0.4 and below suffer from a remote code execution vulnerability in chat_panel.php.
4ea3d795c83c5b9d7ef944a32e2123eadcea880804a62298d5a74cbbce57b5c2