MyServer 0.7.1 crashes causing a denial of service upon receiving an excess of 512 bytes when a POST request is processed.
60e3fb0e12ed4609a480db067d765c02
Both aspWebCalendar and aspWebAlbum are susceptible to SQL injection attacks.
07b2490102b9e85da521cac1613b0434
Proof of concept exploit ActivePost Standard versions 3.1 and below that makes use of a denial of service flaw.
81fde4a9ca937dcd9ff4d85f145b658f
ActivePost Standard versions 3.1 and below suffer from a denial of service flaw, a directory traversal attack, and conference password and path disclosure vulnerabilities.
32e48c6d6045ac6267a3a3b58cc4fef0
Os-sim attempts to unify network monitoring, security, correlation, and qualification in one single tool. It combines Snort, Acid, MRTG, NTOP, OpenNMS, nmap, nessus, and rrdtool to provide the user with full control over every aspect of networking or security. Supported platform is Linux.
0f3ee2e02fc74f19b4acf2608a3a485a
raddump interprets captured RADIUS packets to print a timestamp, packet length, RADIUS packet type, source and destination hosts and ports, and included attribute names and values for each packet.
2cf390e061784528d3a517a39b2b97b1
Sandbox for Grids (s4g) is a Linux user-mode sandbox. It offers a secure execution environment for suspicious applications. Written in C, it tries to solve some typical problems of quarantine applications: efficiency and security.
9ef8e7704925ec4920c74f9615d5715f
Secunia Security Advisory - A security issue has been reported in Apache, which may allow malicious people to bypass configured access controls. The problem is reportedly caused due to an error within the merging of the Satisfy directive. The issue only affects version 2.0.51.
f00ab660fd1a342444fd45a66f48111a
Red Hat Security Advisory RHSA-2004:434 - A security issue in redhat-config-nfs allows users access to more resources than should normally be allowed.
414e8a2018ecf8aad9ec13de483a13f8
Local root exploit that makes use of a buffer overflow in the Software Distributor utilities for HP-UX.
bf7861c01af82d7529cd185de3d067c3
Local format string exploit for /usr/sbin/ping under HP-UX.
7e1d1355b210a0d35793c8ab4027be3e
Local format string exploit for /usr/bin/cu under HP-UX.
b748cf28bffa5f4f981fde36ce42112c
The firmware of Motorola's wireless WR850G router has a flaw that enables an attacker to log into the router's web interface without knowing username or password and the ability to gain knowledge of the router's username and password after logging in.
712aa3955a9b39ddb0a41c94a1f45939
Three high-risk vulnerabilities have been identified in the Symantec Enterprise Firewall products and two in the Gateway products. All are remotely exploitable and allow an attacker to perform a denial of service attack against the firewall, identify active services in the WAN interface and exploit one of these services to collect and alter the firewall or gateway's configuration.
50c5e3743abfc8f856b6c722d3a6e502
GDI+ JPEG remote exploit that is a modified version of the FoToZ exploit that has reverse connect-back functionality as well as a bind feature that will work with all NT based OSes. This even-moreso enhanced version also has the ability add a user to the administrative group and can perform a file download.
f7f34642b20f482a8ce7f619bb239501
Microsoft Windows JPEG GDI+ Overflow Download Shellcoded exploit.
aa804f40ffe756a77f4906e51432550e
GDI+ JPEG remote exploit that is a modified version of the FoToZ exploit that has reverse connect-back functionality as well as a bind feature that will work with all NT based OSes.
f782b4f39d2b36dae9a9c07dd5d1f11e
Microsoft Windows proof of concept JPEG GDI+ overflow shellcoded exploit that launches a local cmd.exe.
fbed06712fd1e70c91a66c5074f84768
Amusing yet obnoxious play on terminology in the industry and how it is or could be used to make references to drug and sexual instances. If you are easily offended, do not bother reading this.
9cd8a2797e2aff5242efc275eee609dd
iDEFENSE Security Advisory 09.22.04 - Remote exploitation of a design vulnerability in version 1.00 of Sophos Plc.'s Small Business Suite allows malicious code to evade detection.
70fbe0a3ec66de9cd22a3189dfbab4f3
Debian Security Advisory DSA 552-1 - A heap overflow in imlib2 can be utilized by an attacker to execute arbitrary code on the victims machine.
8202028cda0dd34facc9caa3493b8612
White paper from NGS Software that covers the technologies and security flaws Phishers exploit to conduct their attacks, and provides detailed vendor-neutral advice on what organizations can do to prevent future attacks. Security professionals and customers can use this comprehensive analysis to arm themselves against the next phishing scam to reach their in-tray.
a3c1e7f414792b50d74d556ad87b3d53
GNU sharutils versions 4.2.1 and below local format string vulnerability proof of concept exploit.
9ecf1cbfab55330974d86f8b8bb291ea
Secunia Security Advisory - A vulnerability has been reported in VP-ASP, which can be exploited by malicious users to cause a DoS (Denial of Service).
f67c086e31516814224e945c94111fae
Denial of service exploit for PopMessenger versions 1.60 that makes use of a flaw when handling dialog boxes in relation to illegal characters.
fa8e6ccb5da245d2006d941cb65672f3