NavBoard version 2.6.0 remote code execution exploit.
d3bddb1ef1269c02ed7550c96e90d98c361648ebd2ebf4574bb697d762190f11
Web Directory / Search Engine version 2.0 suffers from a direct database download vulnerability.
1cd093c1762c0046a49ccfa2ec5cda30891844921a44dda3908c8340a541b2bc
A remotely exploitable vulnerability has been found in the file parsing engine of ALWIL avast! antivirus software versions prior to 4.7.700 when parsing .SIS files.
2313fed88bcebca1435d3bf9ba6d323db34b780284f88572119fd79452425bd2
LeadTools Raster OCR document object library memory corruption exploit.
5b1e0f751b7858f676f42235590d25859642cb1134b8f99b424fb9f275c53c82
LeadTools Raster ISIS Object LTRIS14e.DLL version 14.5.0.44 remote buffer overflow exploit.
fe8b792a1e891192c66c7e4825a7528916a0b6a11a6627efe04b0e4d2ebd9a62
EDraw Office Viewer component (edrawofficeviewer.ocx version 4.0.5.20) denial of service exploit.
64c39b059868109c395136a99bfecc1dc37e9dcf1edb57374a232027d67a9697
pam_usb is a PAM module that enables authentication using a USB storage device through DSA private/public keys. It can also work with floppy disks, CD-ROMs, or any kind of mountable device.
1c3efbb41ff6d97db6b9ac18664d36ca3b11689156be76baf0382e09aa94ea04
strongSwan is a complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels. It interoperates with most other IPsec-based VPN products. It is a descendant of the discontinued FreeS/WAN project. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A unique feature is the use of X.509 attribute certificates to implement advanced access control schemes based on group memberships.
3eae9ca2de63e253284852c44ec65a42752e592be7e77d29b2fe502bb9428eb5
Advchk (Advisory Check) reads security advisories so you do not have to. Advchk gathers security advisories using RSS feeds, compares them to a list of known services, and alerts you if you are vulnerable. Since adding hosts and services by hand would be quite a boring task, advchk leverages nmap for automatic service and version discovery.
186f0d224f55d01c322c57d5b1a2a031e46c197c0159c26148058abbd1c22230
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
bc23e6f826f1f736e9d5e56ba79195099882aef2029a63dd667915bc1eb836a6
GTP 3G suffers from a cross site scripting vulnerability in mods.php.
80fcfdf27538c58452a9804d41f56c2121815607a35b82693cc00739806c197b
Ubuntu Security Notice 464-1 - Multiple vulnerabilities have been patched against in the Linux kernel. Philipp Richter discovered that the AppleTalk protocol handler did not sufficiently verify the length of packets. By sending a crafted AppleTalk packet, a remote attacker could exploit this to crash the kernel. Gabriel Campana discovered that the do_ipv6_setsockopt() function did not sufficiently verify option values for IPV6_RTHDR. A local attacker could exploit this to trigger a kernel crash. A Denial of Service vulnerability was discovered in the nfnetlink_log() netfilter function. A remote attacker could exploit this to trigger a kernel crash. The connection tracking module for IPv6 did not properly handle the status field when reassembling fragmented packets, so that the final packet always had the 'established' state. A remote attacker could exploit this to bypass intended firewall rules. Masayuki Nakagawa discovered an error in the flowlabel handling of IPv6 network sockets. A local attacker could exploit this to crash the kernel. The do_dccp_getsockopt() function did not sufficiently verify the optlen argument. A local attacker could exploit this to read kernel memory (which might expose sensitive data) or cause a kernel crash. This only affects Ubuntu 7.04. The IPv4 and DECnet network protocol handlers incorrectly declared an array variable so that it became smaller than intended. By sending crafted packets over a netlink socket, a local attacker could exploit this to crash the kernel.
5ce50556e7095fc936bee41e30d6ea94c9ff6bd833408e463221176b94a11444
iDefense Security Advisory 05.24.07 - Local exploitation of a privilege escalation vulnerability in Apple Computer Inc.'s Mac OS X pppd could allow an attacker to gain root privileges. The vulnerability exists due to insufficient access validation when processing the "plugin" command line option. The application does not properly verify that the requesting user has root privileges and allows any user to load plug-ins. When checking to see if the executing user has root privileges, a check is made to see if the stdin file descriptor is owned by root. Passing this check is trivial and allows the attacker to load arbitrary plug-ins resulting in arbitrary code execution with root privileges. iDefense has confirmed the existence of this vulnerability in version 10.4.8 of Mac OS X. Other versions may also be affected.
634bba22f8a207551b2f6e77a3f4f876eb75758fd2276f366d53faf2a799b3d4
Internet Explorer 6 / Dart Communications PowerTCP Service Control (DartService.dll version 3.1.3.3) remote buffer overflow exploit.
dee10e75708f6d6aba27cce67511ebfa236444258c5d8453e823251677745ebd
Debian Security Advisory 1297-1 - Bernhard R. Link discovered that the CVS browsing interface of Gforge, a collaborative development tool, performs insufficient escaping of URLs, which allows the execution of arbitrary shell commands with the privileges of the www-data user.
45ab5403d0eafdc6db0f802dd07bd4297ec136f7c5aee171cc4d7f4b748a3193
A serious security flaw is present in Credant Mobile Guardian Shield for Windows versions 5.2.1.105 and prior. Several instances of the users Windows Domain name, Domain username, and password are stored in plain text within the memory (RAM) of the mobile device. This risk is compounded by the fact that the Windows paging file is not encrypted per default settings. The unencrypted paging file would likely contain the plain text Windows Domain credentials as well.
4ba07238377e61b952cbd51c2fd985569222c22f0b7ef03e19498b13296cb2a0
A remotely exploitable vulnerability has been found in the file parsing engine of ALWIL avast! antivirus software versions prior to 4.7.700.
56fbe28fc027be7f11fbf2a6b92d601f549857871e3238f353f07a3ff36d352d
WIYS version 1.0 suffers from a cross site scripting vulnerability.
fdda265f9c7a581d51333e07dab011b966ba6f2469d8f122914ba59bd1bbf406
OpenPKG Security Advisory - A vulnerability caused by an integer signedness error was found by Victor Stinner in the font rendering library Freetype, versions up to and including 2.3.4. The vulnerability might allow remote attackers to execute arbitrary code via a specially crafted TrueType Font (TTF) file with a negative "n_points" value, which leads to an integer overflow and heap-based buffer overflow.
20e3597f4528c3bf943c842d2c4a790a8846089007afb586832a34877de6bcb1
Script that will perform test queries to check for the existence of files in a webroot.
c8be207d45fef0ba6ed8b95d81fe2e2afe59313cace686c44a99afe37363cbf4
Simple Skype password cracker written in Perl.
93375516e003779e0ae962ac7fa61e9e4a247f89cee30c4743b1f8d768ee3d68
Simple tool to grab results from Google and stick them in a file. Has a feature to restrict by domain.
57dc189500c14bbce4e8eeb05b395c90b095135b46b473dd691271aa63115529
Simple tool to grab results from Google and stick the links in a file.
7ff2cac119f1b31580a740c5284ccf8857ea72824b1719d50d69e1e8ccf5d1e9
Mandriva Linux Security Advisory - A number of bugs were discovered in the NDR parsing support in Samba that is used to decode MS-RPC requests. A remote attacker could send a carefully crafted request that would cause a heap overflow, possibly leading to the ability to execute arbitrary code on the server. A remote authenticated user could trigger a flaw where unescaped user input parameters were being passed as arguments to /bin/sh. Finally, on Samba 3.0.23d and higher, when Samba translated SID to/from name using the Samba local list of user and group accounts, a logic error in smbd's internal security stack could result in a transition to the root user id rather than the non-root user.
86de3c706857ded99d56047efb47ebe3e745af47ea791c8e0aae3aed6d2adbc6
Mandriva Linux Security Advisory - Buffer overflow in the gdImageStringFTEx function in gdft.c in the GD Graphics Library 2.0.33 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font. Tetex 3.x uses an embedded copy of the gd source and may also be affected by this issue. A buffer overflow in the open_sty function for makeindex in Tetex could allow user-assisted remote attackers to overwrite files and possibly execute arbitrary code via a long filename.
09ea777e2263077052ec7d39b6ca87039f3fa15d2bd7cc692d25712c6cdfb3c5