A vulnerability allows remote attackers to download any existing document in the APPS.FND_DOCUMENTS table on vulnerable installations of Oracle E-Business Suite. Authentication is not required to exploit this vulnerability. The specific flaw exists in the ADI_BINARY component of the E-Business Suite. The component exposes a parameter that can also be passed to ADI_DISPLAY_REPORT to allow an attacker to view any document in the APPS.FND_DOCUMENTS table. An attacker can cycle through all document IDs to display each document that exists.
7695b29a5b73a990141587afaad7025ba20336a322848f36046e521d84262f61
A vulnerability allows remote attackers to delete any existing Document Management node on vulnerable installations of Oracle E-Business Suite. Authentication is not required to exploit this vulnerability. The specific flaw exists in the APPLSYS.FND_DM_NODES package. The procedure to delete nodes does not check for a valid session thereby allowing an attacker to arbitrarily delete any node registered, including the root node.
a56905b28f18536776787ff58703784ae3030dd3b225c7e8a7e6187e035b3646
Oracle 10g SYS.DBMS_CDC_IMPDP.BUMP_SEQUENCE PL SQL injection exploit.
ff6fb0134cfc47331035b5f15c58c56826677223f77908b27cd35cbb99a246e5
Oracle 10g SYS.KUPW$WORKER.MAIN PL SQL injection exploit.
8beaa06d01b567da971ba185e7339af52a5064fb0a7948237f40db6c321bfd9a
Oracle 10g SYS.KUPV$FT.ATTACH_JOB PL SQL injection exploit.
ed9f5b91026cb15dc943ab62c9204654d1437846a3973ebd51b5c69cb614ffde
Proof of concept exploit for a buffer overflow in HP printers version 2.4.5.
69f9673d5776cf059960d159011db90e25de5744eec07788625ef0371546d631
Proof of concept exploit for a buffer overflow in HP printers version 2.4.
878780372ce18dd4260343d191ceacba34ff580b3d2b0ce26ea978001aec6871
Both versions 2.4 and 2.4.5 of HP printers suffer from a buffer overflow in the LIST and NLST commands.
c0555302454477845e84832de73ceee3aeb92620f0510868fafbf487aed0ddab
Two fuzzers written in Python. One is for PostgreSQL and one is for Informix.
af75ebb6e79ccd3bd1ad92b298d15a7e2ac9de795241f8cfa6b826f5bf9a6938
Oracle Database PL/SQL fuzzing tool.
d4ba0ce4454a94e3b86f4914ee4e6dbc5be062e4b669e80ff3b6fd13d319f285
A buffer overflow with possible remote code execution was found in the APPE command in WFTPD Pro Server 3.23.
e4b4062f5ad90277ec1a6b2d1f2baeefcee5740cc88394073e839fee3c4d61e3
WFTPD Pro Server 3.23.1.1 Buffer Overflow DoS exploit.
bfbf22cd46872e87711eb954baa7a523f59a932329b8cfc3c2888f8406eeabb3
WarFTPd 1.82.00-RC11 remote DoS exploit.
865dd114b3ecfdc2d56df01f27ec81005aea3ebc621237a9c7b0fc034d0884a4
WarFTPd 1.82.00-RC11 is vulnerable to a DOS condition when passing a long string to various commands.
1df9b1c1eca21cf463f97b6b5cadb92de12718cdb5f1f451b6e1b233a251823f
POC for a memory corruption vulnerability in the "drmstor.dll" library which is part of the DRM (Digital Rights Management) software supplied with MS Windows.
2cbde388cbdb99ce63dfa813a707d4b197d88ee064f57afa7715e9847ad592ea
Write up discussing Oracle database IDS evasion techniques for SQL*Net.
64438722e11b55e629becc5c145742b7146f0ec202c91870108b9aec9564fdad
Various antivirus software, including Panda, ClamWin, Norman Virus Control, and AVG Antivirus are all susceptible to a bypass vulnerability.
c76c390286fcb06d013752562c0285f7c4b1f845c3c50d9b7b0af3a425999224
It appears that Panda Antivirus and ClamAV may be susceptible to bypass for the "I Love You" virus when a simple variable is changed.
2af94d1600d05886722bf0eeb3dad39133549907d1afe1b06819c4fa835cf1f6
A buffer overflow and installation script error in firebird 1.5.3 could lead to system compromise.
6f73336e46aae3d245c51d99b29e87b451e578c58987b15299903772928e5ac6
Mantis Bugtracker exploit scanner that looks for versions less than 1.0.0RC2 and greater than 0.18.3 which are vulnerable to XSS and variable poisoning attacks if register_globals is enabled.
846b7601bdc63c621b48e9ed66d2964760dbc83607dfabd16ba2ee2080eb9cd3
Mantis Bugtracker versions less than 1.0.0RC2 and greater than 0.18.3 are vulnerable to XSS and variable poisoning attacks if register_globals is enabled.
85dcfcb51f4250c4f8e9ac0aa699db2ed494373073674e22eaf7e532476d42ed
Kojoney is an easy of use, secure, robust, and powerful Honeypot for the SSH service. It includes other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log files.
6b1d9bedc27dd5c8d8d4633a436d52e8204bf8823bff29873c1485d25a42c5c0
Kojoney is an easy of use, secure, robust, and powerful Honeypot for the SSH service. It includes other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log files.
61e278bee046efeb6f01069affa61dbb3a1cf5a31e8b6652a1c32e48e36aaef2
Kojoney is an easy of use, secure, robust, and powerful Honeypot for the SSH service. It includes other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log files.
b788fd70ea3dfe1cfec3631d3c75d30809641b7f1dee6fadd8579804f2bd52e9
GForge version 4.5 is susceptible to multiple cross site scripting vulnerabilities.
6987e8c48a8ad981bda89e0d53df9752dac35da750af19821ff0c0234304f477