Microsoft Windows Metafile (WMF) remote exploit which takes advantage of the bug known as ms05-053. This program creates a special .wmf file which crashes IE by overflowing the "mtNoObjects" header.
380f01f84a68f99123f0eaeefe547cc1
Lsof is an extremely powerful unix diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system. It is useful for pinpointing which process is using each network socket. FAQ available here.
886e72980ad3504c305ead9792e4d528
Counter Strike 2D denial of service exploit that affects versions 0.1.0.1 and below.
d87083992aad727560be35d101326126
This Metasploit module exploits an arbitrary command execution vulnerability in the HP OpenView connectedNodes.ovpl CGI application. The results of the command will not be displayed to the screen.
ae5ae0d62af26ea683bce8a720fc56eb
This Metasploit module exploits a stack overflow in the authorization code of the Oracle 9i HTTP XDB service.
3904180db4222415f801532251f226a4
Proof of concept exploit for Firefox 1.0.4 for the InstallVersion.compareTo() vulnerability. Needs functional shellcode to work.
a7b9197c7c69f746d4d5c68ef60627c1
Technical Cyber Security Alert TA05-347A - Microsoft has released updates that address critical vulnerabilities in Internet Explorer (IE). A remote, unauthenticated attacker could exploit these vulnerabilities to execute arbitrary code or cause a denial of service on an affected system.
54d0359c312168a33ac3ae8b14332e6b
ADP Forum versions 2.0 through 2.0.3 suffers from a direct download flaw that discloses users' password hashes.
3a4537af165b9812a28f6030875fd239
Secunia Research has discovered a vulnerability in Internet Explorer, which can be exploited by malicious people to trick users into downloading and executing arbitrary programs on a user's system. A design error in the processing of mouse clicks in new browser windows and the predictability of the position of the File Download dialog box can be exploited to trick the user into clicking on the Run button of the dialog box.
4deb6f1ff04696a98d0b46a51e0d492b
Secunia Research has discovered a vulnerability in Microsoft Internet Explorer 6.0, which can be exploited by malicious people to trick users into executing malicious files. The vulnerability is caused due to a design error in the processing of keyboard shortcuts for certain security dialogs.
a0ce996e36ae3b5006f4606974677172
eEye Security Advisory - eEye Digital Security has discovered a local privilege escalation vulnerability in the Windows kernel that could allow any code executing on a Windows NT 4.0 or Windows 2000 system to elevate itself to the highest possible local privilege level (kernel).
204c949d2587d64927b34183a6cb0b46
CALL FOR PARTICIPATION for the 2nd International Conference on Distributed Computing (ICDCIT 2005).
45e08097f6e483f5fd24a1b42ef081a7
Universal BIOS password dumping utility.
cc234126293a91eefc7cca531f64ad4f
BIOS password physical memory reading utility that displays to the screen.
575529ce3bb0beffda17885ca0ccc47c
BIOS password physical memory reading utility that writes to a file.
ec564ed639b91a385df4135aecbb72f0
Whitepaper discussing information leakage and password extraction from a BIOS.
484b3c11908948f9c7311f87b66bf5e1
PhpCOIN version 1.2.2 blind SQL injection and remote code execution exploit.
4e5c4c0841e7cf1d1c5715cd43bc271a
PhpCOIN version 1.2.2 remote code execution exploit.
8daca9cd0eaad6f3477b12ed9e24d536
PhpCOIN version 1.2.2 is susceptible to arbitrary file inclusion, blind SQL injection, and path disclosure attacks.
06e0f015908740a626e9fcdad2aa017a
iDEFENSE Security Advisory 12.12.05 - Local exploitation of a buffer overflow vulnerability in the uidadmin binary included in multiple versions of The SCO Group Inc.'s Unixware allows attackers to gain root privileges. iDefense has confirmed the existence of this vulnerability in SCO Unixware versions 7.1.3 and 7.1.4. All previous versions of SCO Unixware are suspected to be vulnerable.
996a690d22da6ca2e5833755caecbcfb
Gentoo Linux Security Advisory GLSA 200512-04 - The Oulu University Secure Programming Group (OUSPG) discovered that various ISAKMP implementations, including Openswan and racoon (included in the IPsec-Tools package), behave in an anomalous way when they receive and handle ISAKMP Phase 1 packets with invalid or abnormal contents. Versions less than 2.4.4 are affected.
36b8d66694532b2b1376a9a1fe488446
The BTGrup Admin WebController script is susceptible to a SQL injection attack.
b077a1a5be54dbc0ddd5f2155b17801d
Direct download access of the setting.php file in IMOEL CMS allows for disclosure of the SQL password.
c3cf39d735cdc657ca8f40d348f2d188
Marc Ruef found an old fashioned denial of service flaw in the NetGear RP114 device.
3324c8625d16b293772c9133758ac086
SEC-CONSULT Security Advisory 20051212-0 - Due to insufficient input validation within the Nortel SSL VPN appliance's web interface, it is possible for an attacker to supply his victim with a malicious link that results in code execution on the victim's client. The problem has been reproduced with version 4.2.1.6, however other versions might be vulnerable as well.
9ce0939ab0aaf717ddc6ba43d06ae7bd