Exploit that makes use of the mod_userdir vulnerability in various Apache 1.3 and 2.x servers.
8675f32c6af2043f644707d59bb74ae4eaf2e430aa1fb582122c2f9c86d7012a
Application Mapper is a next-generation scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!
85cc4c2281d795a7b27631f775a592828561823a3d15c1fe7e7cc969a0414e31
Secunia Security Advisory - Lostmon has reported a weakness in I-Cafe client, allowing malicious users to by disable the software.
80b75d5f1b4a5f89d1ee0cdc8fe71be78001681f051ca500c5b7314b6e886d0d
Secunia Security Advisory - PunBB 1.x, Nucleus 3.x, and BLOG:CMS 3.x all suffer from a flaw where system access can be gained due to a lack of input validation.
457f046835019de8732a58b41bcae39662b69a04597c072414a80d8faa282e1e
SCO Security Advisory - Multiple vulnerabilities have been found in the MMDF binaries included with SCO Openserver versions 5.0.6 and 5.0.7. These include buffer overflows, null dereferences, and core dumps.
f78bc63931e13a59fb61612fe42904a3de9bc9c717ed7cd53c2d6e79a6eb8a55
Unreal Decloak Toolkit version 0.1 illustrates the weak hashing system vulnerability in Unreal ircd 3.2 and previous versions.
b9f87a775c864e80c21ef6545cc72dbd0c4a0132cffc171c5d13262d8058894b
IEXPLORE.EXE file version 6.0.2800.1106 and MSHTML.DLL file version 6.00.2800.1400 are both susceptible to cross site/zone scripting flaws.
adf292c1753dbb9a45642cd37fcc3a60abe2952a1004a4a51d48cb8e38659b95