GuppY versions 2.4p1 and below are susceptible to cross site scripting attacks.
d9b975da70fae430922d7527eeb5c876
CERT Advisory notice that clarifies the slew of recent vulnerabilities in OpenSSH. It covers the buffer management errors, PAM challenge authentication failures, and the PAM conversion stack corruption.
902f66495c6bec7e8a9822254d048fd1
Simple tone generator script that will play the 2600Hz blue box tone on an HP39G graphical calculator.
d228321d2321dc6a43c908c8c454b154
kses is an HTML/XHTML filter written in PHP. It removes all unwanted HTML elements and attributes, no matter how malformed HTML input you give it. It also does several checks on attribute values. kses can be used to avoid Cross-Site Scripting (XSS), Buffer Overflows and Denial of Service attacks, among other things.
d13edb1630ed39dbda47b125e8546620
Nikto 1.31 is a PERL, open source web server scanner which supports SSL. Nikto checks for (and if possible attempts to exploit) over 2000 remote web server vulnerabilities and misconfigurations. It also looks for outdated software and modules, warns of any version specific problems, supports scans through proxies (with authentication), host Basic authentication and more. Data is kept in CSV format databases for easy maintenance, and supports the ability to automatically update local databases with current versions on the Nikto web site.
cb6719d7e0fd4659cb826f821f01cd64
Stegtunnel is a tool written to hide data within TCP/IP header fields. It was designed to be undetectable, even by people familiar with the tool. It can hide the data underneath real TCP connections, using real, unmodified clients and servers to provide the TCP conversation. In this way, detection of odd-looking sessions is avoided. It provides covert channels in the sequence numbers and IPIDs of TCP connections.
80c70d10da7721c3ded5b931a18f9e03
Packet Purgatory is a library the provides a portable API for intercepting, rewriting, and otherwise mangling flows of packets. It provides multiple mechanisms through the same interface for tweaking these packets, all without the local host's kernel being aware, or requiring any kernel modules. It enables odd packets to be modified in arbitrary streams without requiring the use of specialized client software.
3095b395329d4489a3549d78453a40e0
Debian Security Advisory DSA 392-1 - webfs has been found vulnerable to buffer overflows and multiple directory traversal attacks.
594440944622894635b9d3e601e21be9
Version three of this paper discussing more shatter attacks that are possible using progress bars. Related information available here.
1135794bd92aa08169c33e449387a87c
Geeklog versions 2.x and below are susceptible to cross site scripting vulnerabilities and various SQL injection attacks.
5e292ac0ff2be42ecabd916e479a3305
Remote exploit for Cfengine versions 2.-2.0.3 that makes use of a stack overflow discussed here. Binds a shell to port 26112. Tested against RedHat.
cc32ba54fe67a178fcd9b423342f3643
Contest ELF binary of arcs
682d04789bcfb445a70b722dcc9a7125
Contest file that has been encrypted with A.R.C.S. This file has a special message inside. Once cracked, utilize the instructions to redeem a free t-shirt.
04e33771caa9c31d42facdde52ddc5c3
Local root exploit for IBM DB2 Universal Database version 7.2 for Linux/s390 which makes use of the db2licm binary that is setuid by default.
66f6d20f27d150e451308763e3f84b2f
Backdoored version of OpenSSH 3.7.1p2 that uses a magic password referenced via an md5 hash in a file, logs logins and passwords to a specified file, and can run without the backdoors being active.
008690b0235471672d814b9db06d94f4
SGI Security Advisory 20030902-01-P - It has been reported that certain Microsoft RPC scanning can cause the DCE daemon dced to abort, causing a denial of service vulnerability.
a72c97334ef625ae17f2020de747904a
Exploit that causes a denial of service against the SMC2404WBR BarricadeT Turbo 11/22 Mbps wireless cable/dsl broadband router by sending random UDP packets to multiple ports.
cd13536a95ff8f037417abe72891e053
MPlayer versions 0.90pre to 1.0pre1 are susceptible to a remotely exploitable buffer overflow vulnerability. A malicious host can craft a harmful ASX header, and trick MPlayer into executing arbitrary code upon parsing that header.
edd046118752e03e9d2712cdc196fbc4
Remote exploit for Cfengine versions 2.-2.0.3 that makes use of a stack overflow discussed here. Tested against FreeBSD 4.8-RELEASE. Binds a shell to port 45295.
bec7a5ae73b4eb63bb76d5151e18f80b
Remote exploit for atphttpd version 0.4b and below on Linux x86 that binds a shell to port 65535. Tested against Debian 3.0 and RedHat 8.0.
12201535f967d9970d38c353615b22a4
MyServer 0.4.3 is susceptible to a directory traversal attack that allows access to files and directories outside of the web root.
b0cc267b208678ec8492add73805049f
The cfservd daemon in Cfengine 2.x prior to version 2.08 has an exploitable stack overflow in the network I/O code used.
2a07b5b43930873626586fb1305d5015
sbox version 1.04, the CGI wrapper that allows for safer execution of scripts, has a path disclosure vulnerability.
3b51d9073cab3e83dd79fb1c7efe05d8
Remote MIRC proof of concept exploit that makes use of an overflow in the USERHOST reply to the mirc-client.
0c6308f424c2487217ea6a89f381c512
Vomit, or voice over misconfigured internet telephones, is a utility that converts a Cisco IP phone conversation into a wave file that can be played with ordinary sound players. Vomit requires a tcpdump output file.
c81cd977ade651d9050f98326879dea0