Stealfly is proof of concept perl code that illustrates the usage of port knocking. The server sits on a defined interface and listens for a certain amount of UDP packets to be sent from a chosen ip that will use a range of source ports for each packet. If the rules are satisfied then server will open it's port or connect back using netcat.
9b559d856cf19a59caa00955eca0de80d9ab917be989d8b0911d9f6f8de86843
Bugzilla versions 2.9 through 2.16.10 use a script called syncshadowdb to manually replicate data between a master database and a slave. The script uses temporary files in an unsafe way since it selects a name for the file based on PID and does not make any effort to determine if the file exists and if it is a symlink. A local user could use this to direct symlink attacks and overwrite files that Bugzilla has access to.
93790c5a8d3316a6d1d1db5a5d4d0009b19eff072c4ccee7b43fc98982b908f3
A Malicious user can cause a remote denial of service in Juniper NSM (NetScreen-Security Manager) by sending specially crafted and long strings to guiSrv(port 7800) and devSrv(port 7801).
797817f93ca63bd55c20e9ac4d6c679d95eeadee929cea0952179beb1d73a6e5
BpowerAMP Music Converter v11.5 and prior local buffer overflow exploit.
cf04f5bc0582b451c80de935838ac72f71728992af35d26522be7e7bdbfba831
Secunia Research has discovered some vulnerabilities in IceWarp Web Mail, which can be exploited by malicious users and by malicious people to disclose potentially sensitive information and to compromise a vulnerable system.
468316ce679c99742ba111c55cf9768dfd3f23c467d4ee76c196fe6c831eb720
Advanced Guestbook 2.2 and 2.3.1 and possibly other versions suffer from XSS
97fdbbe1eee5c91e2152c46da5323b175e5a48a306303940f269f788384a56c7
Cerberus Helpdesk suffers from multiple SQL injection vulnerabilities in cerberus-gui and support-center.
6c67e69bf43d9d62e135bbbb69e30ab523d5dcf792a7af2e1980e5ce02a2dc36
Simo Ben youssef has found that many translation websites are vulnerable to cross site scripting attacks. Poof of concept provided.
8f0c6e69d24b5d5fff6b5fa377b992d590cb87ddd32fe849a3a441a3affbf90b
BuHa Security-Advisory #6 - DoS - Null Pointer Dereference in Internet Explorer. POC code provided.
0f56804f1fe3912279272224abf49a61fbd758a6412a7ee682d35bea37787589
BuHa Security-Advisory #5 - DoS - Null Read Dereference in Internet Explorer. POC code provided.
adc3ad8dea999499e1161a4bb4a85fc5449eaffe3deeb8f55c311fb56f2895d4
BuHa Security-Advisory #4 - DoS - Null Pointer Dereference in Internet Explorer. POC code provided.
c256b95d508314bcb345b9e44201f19f3c7fb9e102b53ba115deab67e98c23a2
Airscanner Mobile Security Advisory #05083101 - Kiosk Engine allows an administrator to enter their passcode to gain full control over a PDA with the Kiosk Engine installed . This passcode is stored in the registry as plaintext and can be obtained several different ways (eg. remote registry access.)
f17d7447a363b29aee64bab6f4e548afeaf6030d0f0ca9994ac377e6d9af245b
Dev Web versions less than of equal to 1.5 'cat' SQL injection and admin MD5 password hash disclosure exploit.
6386c2a11ecb3fc31da5a8300471e2e749259809a7057c0b741d2963cb3616de
MyBB Versions PR2 Rev.686 and prior contain multiple SQL Injection vulnerabilities.
f14b861afdba28a4b669c3dac2d290c463a747fab9d50c2f75c7bf75d79098c4
Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, and has features such as Bluetooth address spoofing.
12ce045142c5b1982084ea31b13a719e9e073630450a049fd5d6f92e8726ba3b
Polytechnic University ISIS Security Advisory - Electric Sheep v2.6.3: Due to insufficient bounds checking, a lengthy window-id parameter can cause a stack based buffer overflow to occur allowing execution of arbitrary code with the privileges of the invoking user. This could potentially be used as a backdoor entry point.
fe535e672aca384ceba19535d79a547f40b9701c01707efbe397fa4f149d98c2
radmind is a suite of Unix command-line tools and a server designed to remotely administer the file systems of multiple Unix machines. Radmind operates as a tripwire which is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change.
25341041c0578263393b348ae88e4a856a2c28806aa1994949247da7cec50c78
Simpbook suffers from an HTML injection vulnerability in the guestbook HTML area. #
681b3414ac3067c1597530450adb7f44d2f5d742655d0d8b216bd889d04b062c
SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all developer related files.
3057fac128fb7230fb770d859e7dbc677729be42dcdbd3669b41b20e518775f0
Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.
0c7021635a0c2cc47be8758fd56fdeb7c33cac289d853d193f4cb38cdfb4f1fc
The MultiAdmin security framework kernel module provides a means to have multiple root users with unique UIDs. This bypasses collation order problems with NSCD, allows you to have files with unique owners, and allows you to track the quota usage for every real user. It also implements a sub-admin, a partially restricted root user who has full read-only access to most subsystems, but write rights only to a limited subset, for example writing to files or killing processes only of certain users.
edfa083298657fae0722de83c91b01baf9712a9cff9a739298a60b6c7aeaa86e
SEC Consult Security Advisory 20051223-1 - It is possible to read arbitrary files of the system such as the WEB-INF directory through the OracleAS discussion forum portlet. An attacker needs to know the file names.
775697c50859caa89bbb921a8a51d9bd892979eb7a28b8ba315d443a6c2d066a
Arri provides an interface for accessing arrays in a safe manner that means that it is impossible to cause an overflow and, if the array is set to hard (it normally is), truncation. In addition to simply providing an interface for handling arrays, it also provides interfaces for using the arrays such as an IO API.
15ea6a61c07655d09a0585cc3729145aac56ac5e0a5ca02b1d268af5c47fd466
SEC Consult Security Advisory 20051223-0 - OracleAS Discussion Forum Portlet suffers from multiple Cross Site Scripting vulnerabilities. E.g. it is possible to create relogin trojans, steal session cookies, alter the content of the site or hide articles which don't show up in the overview page.
d04346051912499b9c28f07d881f6390328e316d05d29a873a9d1b5b4f88b1a6