DigiMode Maya version 1.0.2 buffer overflow proof of concept exploits that create malicious .m3u and .m3l files.
9fded6864bf39fef94324ce2a9cd002f72d035214e4da8bc54907e363a2e2484
Draugr is a simple tool to play with /dev/(k)mem or a file memory dump. It can find kernel symbols (pattern matching in a XML file or with EXPORT_SYMBOL), processes (informations and sections) (by the kernel linked list or bruteforce) and disassemble/dump the memory.
7f05f91291f17eb7ad2ce990693d584328ad80612bd8147b2363c55411cb34d1
HP Security Bulletin - A potential security vulnerability has been identified with HP Data Protector Express 3.x and 4.x and HP Data Protector Express Single Server Edition (SSE) 3.x and 4.x running on supported Microsoft Windows, Linux, and NetWare versions. The vulnerability could be exploited locally to create a Denial of Service (DoS) or to execute arbitrary code.
515b356c4e38454bebb49b561962adab56b86c9ec1103c0113a1f14346c31745
httpsScanner is a Java program that will scan a web server to test the strength of the SSL connections. Binary and source zip files are included.
6912fc430b3b60273ac939828532b00e59d9c32062f5921081aed870ce4d1fa5
Jieqi CMS versions 1.5 and below remote code execution exploit.
d5847651c52d2261c3129e5510d1060dec39b7a6639040858aa40a6513c55221
Max CMS version 2.0 suffers from a remote SQL injection vulnerability.
4ce241f5ff3608ec7dd85ff07f64a5b6d821bb6e606b77773247f7623550cab1
My Game Script version 2.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
10e4226bfab498f46df02c2c2d74ef65614190a26a0560694a6f1e3bacda647b
Ascad Networks 5 products suffer from an insecure cookie handling vulnerability.
ad8ee8e55fac0c29f18f6a8bb6b2c3e56a867df01a854604633ffa2caeca451f
Mandriva Linux Security Advisory 2009-112 - racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denial of service (crash) via crafted fragmented packets without a payload, which triggers a NULL pointer dereference. Updated packages are available that brings ipsec-tools to version 0.7.2 for Mandriva Linux 2008.1/2009.0/2009.1 which provides numerous bugfixes over the previous 0.7.1 version, and also corrects this issue. ipsec-tools for Mandriva Linux Corporate Server 4 has been patched to address this issue. Additionally the flex package required for building ipsec-tools has been fixed due to ipsec-tools build problems and is also available with this update.
3b07ace111f8299d944f9b2ec9a4c4bf7962ec01959c2eaefdeedb07d8f0fb3a
ratproxy is a semi-automated, largely passive Web application security audit tool optimized for accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex Web 2.0 environments.
2142d5643305713d9be7fcc82a244048076190851e697b645c49b549a7ae0725
Miffat version 2.1 suffers from an insecure cookie handling vulnerability.
6d83bd0368bbd5faed09cc130e333943e445be89936daa62d4bb020eb5a18502
Technical Cyber Security Alert TA09-133B - Adobe has released Security Bulletin APSB09-06, which describes Adobe Reader and Acrobat updates for two JavaScript vulnerabilities that could allow a remote attacker to execute arbitrary code.
7f2f1de10aa3d087d295e27bbfe4754ad97ddd92769a504d7c2d21ca6bfedc89
Technical Cyber Security Alert TA09-133A - Apple has released multiple Security Updates, 2009-002 / Mac OS X version 10.5.7 and Safari 3.2.3, to correct multiple vulnerabilities affecting Apple Mac OS X , Mac OS X Server, and the Safari web browser. Attackers could exploit these vulnerabilities to execute arbitrary code, gain access to sensitive information, or cause a denial of service.
1d756560284e1af511f9dd3a16c6d3980ebc06840219fc29dec69496aa965fa4
Linux 2.6 kernel ptrace_attach local privilege escalation exploit.
84abdda6dd10c3e7a0c2006896e09b20607f4acd4defbe7266dd0d14dbece13e
A flaw in the D-Link CAPTCHA authentication system allows an attacker to glean your WiFi WPA pass phrase from the router with only user-level access, and without properly solving the CAPTCHA.
446a25a6e3ae5e8895a02a32fcd8eae9a42930cdb5137b83a5bf09350bf97a6a