GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.
bff01b00a04b4f8d246cef236da44a4b42ee12eab2af28f943e5c55dfca9f9ce
Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
b550fa0e8a230d9853f83957883cc98734340423e2d3c98de6b1321a7684d903
This application is used to test SSL ciphers/protocols. It has some specific functionality for sip, ftps, pop3 and smtp and also tests for renegotiation. The binaries (in the debug-folder) ships with OpenSSL 1.0c dlls for win32. A separate test-tool enables testing for all possible ciphers allowed by protocols (not just OpenSSL-recognized-ciphers). Now there are also some tests for the Microsoft PCT protocol.
3f5edc67e2bf1a610ff4effe46bd02077cc82f2e9d60bb223f1800495451b920
Debian Linux Security Advisory 2237-1 - A flaw was found in the APR library, which could be exploited through Apache HTTPD's mod_autoindex. If a directory indexed by mod_autoindex contained files with sufficiently long names, a remote attacker could send a carefully crafted request which would cause excessive CPU usage. This could be used in a denial of service attack.
c23f7d122bf00732fd57c168870b2d9b88cfca00ec85f779d9841ab56b4fcd1f
PG Auto Pro Classifieds Software suffers from a remote shell upload vulnerability.
aa6136a0296c7b892f169c6178c036c8b7ddb207e47aeaf93a1bd3b0291f8e0e
The Joomla CBContact component suffers from a remote SQL injection vulnerability.
4a9ec2cd447451887801fcb8aaf995601129061efceb26504ba594e3378d40da
The Joomla Docman component suffers from a remote SQL injection vulnerability.
6d3744813146629dc5c7499a9365630f57394de9c64ef224f03c922e8c1fe5ec
Cetera eCommerce versions 15.0 and below suffer from remote SQL injection, path disclosure, abuse of functionality, and insufficient anti-automation vulnerabilities.
46559a0a5ad8a70d0e362aca830096f05e532325c2a19d31c4f45fafd294a481
osCommerce version 2.3.1 suffers from a shell upload vulnerability.
6f77547245e4435487ff50cceecb12db25a0c48462dd2c5fb75464bdad739078
Winamp version 5.61 suffers from an in_midi component heap overflow vulnerability. Crash proof of concept included.
4e587b2065afe9000d5eadcffc9ee680db5536ffe5b1558ebc5d6f888035f8f8
The Joomla Question component suffers from a remote SQL injection vulnerability.
6dd418f0a740678b728f1f1f691bc57f817b982b0d5d0a21edb1a6c1ba886caf
Frame-Oshop suffers from a remote SQL injection vulnerability.
e5e6c29ea045432ad5571a6978aa271ee56254dfa2c0de21dbffb97f733bcd80
Whitepaper called Linux exploit development part 4 - ASCII armor bypass + return-to-plt.
c0d19856fa4074f5a2b533a159aa2d90413ff00bcab1ec6123d510643abeef1a
Digital Whisper Electronic Magazine issue 20. Written in Hebrew.
4ae0a3dc6d4aeaab537a68c42badc5f5465c2bed0d047ca82af08c00db1501f5
Digital Whisper Electronic Magazine issue 19. Written in Hebrew.
55e15149cda5efd4e4ef70a0f7d5295c84f6ad59153e55ef499d69d896971a94
Digital Whisper Electronic Magazine issue 18. Written in Hebrew.
a4f55476ff54ae05baec1d55c57bcac9871057750b76960f118ea512aa095739
Secunia Security Advisory - Multiple vulnerabilities have been reported in Mahara, which can be exploited by malicious users to bypass certain security restrictions and conduct script insertion attacks and by malicious people to conduct cross-site request forgery attacks.
b2ad523a660855320a4dfdf5b04377613d8c4625f9d162a180bbb1677c597d31
Secunia Security Advisory - Multiple vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to disclose potentially sensitive information and compromise a user's system.
47bf67b8f1cc9f9f88a4e8929bef53d141c7024127e4763a96ea6328aa133a21
Secunia Security Advisory - Two vulnerabilities have been reported in Adobe Flash Media Server, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
1246e71c199ef6254cb6eb1932a1b86d821d08abbed5efa1a19718290fea0b79
Secunia Security Advisory - SUSE has issued an update for cronie. This fixes a weakness, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges.
ed89b3a17da394ba6be0347df3f71c87f42af94e3eb8da2f8ad009aeef7ac6d8
Secunia Security Advisory - Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to disclose potentially sensitive information and compromise a user's system.
cf6ec5bfc49434bf8d8afe191e3c698b9a879a3883d14c9bab6eb21576dadba3
Secunia Security Advisory - Some vulnerabilities have been reported in Adobe Audition, which can be exploited by malicious people to compromise a user's system.
6e68983d7be1dc70baadaf10de89f8ffdb7e16066c0bab556dbc349b3101f1cd
Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in Open Classifieds, which can be exploited by malicious people to conduct cross-site request forgery attacks.
d5adbdad308e46ae770c86d37e83b782a3c5e7dcac79a8599da0c75df4462633
AVS Ringtone Maker version 1.6.1 heap and SEH overflow proof of concept exploits.
22e08a7b1836b4f2fa7a55be2978d9933d002788361eff106426a7eb8c690824