libShellCodes is a library that can be included when writing linux/i386 exploits by providing functions that generate shellcode with user given parameters during runtime.
0f28982460de87d8f62063ea85d013e4d223262515b2f99aece144bbac5ce5a6
The SunONE application server on Windows 2000 suffers from multiple vulnerabilities. The server allows a remote attacker to view the source code of JSPs, only logs the first 4042 characters of a request URI which allows an attacker to hide their attempts in the last 54 characters, has a cross site scripting issue, and has the username and password to the administrative server kept in clear text in a world readable file.
8e810afd7ea6e1de914b7fc988eb5076641d865e4b488deebe6df42e66995334
OpenSSH 3.6p2 backdoor that logs all logins and passwords to a file. Original backdoor ported for 3.6p2 by ajax.
fc76952bae7a43cd39e265c73a1991f607bdef141017d52a421d6f5ade742d53
loaded version 0.21 is an IPv4 load balancer for Linux. It requires netfilter and the QUEUE target enabled in the kernel.
289bf4facdf46653729a2bdb276ddbe1c97e51adb9d403a39f2cd8e30e4643c6
guess-who version 0.44 is a password brute force utility for SSH2.
214fd24fdc31ce0ae27321085714876bb3c2d68ef8c3cd97400ae0dbb86f3d8a
Amusing addition to the vulnerability found in the Axis Network Camera HTTP server. Apparently the de-facto e-mail address for SMTP alerts is set to mail@somewhere.com and if this feature is enabled without changing the destination address, somewhere.com gets some very amusing insight as to what is being watched. Original vulnerability information is posted here.
225016262e5a5cb529003c7be0a202c691267391dccb9c88e1e937a94f4e7f81
Core Security Technologies Advisory ID: CORE-2003-0403 - The Axis Network Camera HTTP server is vulnerable to an authentication bypass when a double slash is put in front of the admin directory in the URL. This allows a remote attacker to modify the configuration as they see fit and allows the root password to be reset. Doing this in conjunction with enabling the telnet server allows for a complete server compromise.
4cec04e283e741382af7d9e0df4bd761c6f1056aebdaed02bb1f8e78709d07fe
Nikto 1.30 is a PERL, open source web server scanner which supports SSL. Nikto checks for (and if possible attempts to exploit) over 2000 remote web server vulnerabilities and misconfigurations. It also looks for outdated software and modules, warns of any version specific problems, supports scans through proxies (with authentication), host Basic authentication and more. Data is kept in CSV format databases for easy maintenance, and supports the ability to automatically update local databases with current versions on the Nikto web site.
9401d5ecd4143566eceebd085ced7e6cf9f66f2d489c0cc1739d4f948b8ed757
THC-RUT (aRe yoU There) is a local network discovery tool developed to brute force its way into wvlan access points. It offers arp-request on ip-ranges and identifies the vendor of the NIC, spoofed DHCP, BOOTP and RARP requests, icmp-address mask request and router discovery techniques. This tool should be 'your first knife' on a foreign network.
f41eda1909b90b1e54ab9977d800ab9eacb0016df82f2180d5a8da02b160d2b1
orbs, or Omniscient Remote Banner Scanner, is a fast and light-weight banner scanner with features like telnet negotiation and HTML output.
587587b93efbe2e955a8e2922e5771b538225af31eb2a6d241b989f651143547
Remote exploit for a buffer overflow in the Gnome Batalla Naval Game Server version 1.0.4. Gives user id of the account running the game server. Tested against Mandrake 9.0.
cde6233cf7588be614a0ea2f37489285004f595d61eea69313054f376fa2ca78
bnc version 2.6.2 and below suffers from a denial of service vulnerability. Armed with a valid login and password, a remote user can kill the daemon.
df9ba77e9a022c665d0476f11eddc0d54a32d3a4c2c210cd53987e9a5bed8326
S 2 1 S E C Advisory 017 - The Vignette Content Management and Application Portal software is vulnerable to a remote attacker accessing the SQL database without authentication by modifying a cookie. Affected versions: StoryServer 4 and 5 and Vignette V/5.
71e86e2b59d1310641859df7e5da7efd9c2cdd6dcc72e7971a5e708a03dbdc31
S 2 1 S E C Advisory 016 - Vignette Content Management and Application Portal software has a vulnerability that allows a remote attacker to inject a server side include that could lead to remote command execution. Affected versions include, but are not limited to, StoryServer 4 and 5 and Vignette V/5 and V/6.
6e683b01ef73501f7cca1af2773c0055d0e02e01749b77df85c5932c64cee74a
The AnalogX Proxy server suffers from a buffer overflow when handed a URL that is greater than 340 bytes in size. A specially crafted URL allows for remote execution of arbitrary code.
00acd9a86b5f532bc3c62df4b34c0948e2eab07919c6eb2747879cb3facc445d
Komahayown is a utility that makes use of the Syscall proxying idea using shellcodes. Instructions are in Spanish.
80398036a919ac30359581816ab62f59038ccbbc2ff56523db464c1d9f873c57
P-News versions 1.6 is vulnerable to a privilege escalation attack by allowing a remote attacker to populate strings with the | used for delimiting data stored about the account.
03e639c42ea8d778ec18f23eea9b43452efd029c4da46aeeeead26e57884221b