Weplab is a tool to review the security of WEP encryption in wireless networks from an educational point of view. Several attacks are available to help measure the effectiveness and minimum requirements necessary to succeed.
42d5989f57ee942d1bd3c438ee47364de76bfebe97fe94361ec2fb1d0da15409
Weplab is a tool to review the security of WEP encryption in wireless networks from an educational point of view. Several attacks are available to help measure the effectiveness and minimum requirements necessary to succeed.
279fe3bb04e4769085bcda7b7fc4c1992f6cb69d4c393a9d81053755f7a927f2
Vuurmuur is a middle-end and front-end for netfilter and iptables that is aimed at system administrators who need a decent firewall, but do not have netfilter specific knowledge. It converts human-readable rules into an iptables ruleset (or optional a bash script), makes netfilter logs readable, and includes an ncurses GUI.
20689b99b73bbfca4888268c3cf2302ea176ff476864d59ac8c8db5f8ab19b34
tcpick is a textmode sniffer that can track TCP streams and saves the data captured in files or displays them in the terminal. It is useful for picking files in a passive way. It can store all connections in different files, or it can display all the stream on the terminal with colors.
035afe2252ab36a476a0c07bc3c4843dcc58fa1272f7076c8ee98df734e080de
Gentoo Linux Security Advisory GLSA 200408-26 - zlib versions 1.2.1-r2 and below contain a bug in the handling of errors for the inflate() and inflateBack() functions, allowing for a denial of service attack.
5dd45523d1be0a0de8bc8b6b95ccd7dd19751763c9ebedbc759ab9feb8b48778
Secunia Security Advisory - An unspecified vulnerability with an unknown impact has been reported in SugarCRM versions below 1.1f.
3b6fcca2858d32edd7ea58e9934867af995faa4b3c5cdc17c154b7c15cb98faa
Secunia Security Advisory - Multiple vulnerabilities have been reported in iChain, which can be exploited by malicious people to bypass security restrictions and conduct cross-site scripting and DoS (Denial of Service) attacks.
9be23c6210d3b0740585b32e2b3e03963cf0d3c62fb6a2253fac624b9bd5e4e6
Cisco Security Advisory - A specifically crafted Transmission Control Protocol (TCP) connection to a telnet or reverse telnet port of a Cisco device running Internetwork Operating System (IOS) may block further telnet, reverse telnet, Remote Shell (RSH), Secure Shell (SSH), and in some cases Hypertext Transport Protocol (HTTP) access to the Cisco device. Telnet, reverse telnet, RSH and SSH sessions established prior to exploitation are not affected. This vulnerability affects all Cisco devices that permit access via telnet or reverse telnet and are running an unfixed version of IOS.
7d300bcc7b692206900f2d6cf794efe52fea14d569fa791d8f15d48c9d48615a
Proof of concept exploit that makes use of a denial of service vulnerability in Ground Control II: Operation Exodus versions 1.0.0.7 and below.
e8aa9484473e912c92775d9ed8add564dd5c5a28a448bce5558d7cc4763b42cd
Ground Control II: Operation Exodus versions 1.0.0.7 and below is susceptible to a denial of service attack when a packet larger than the maximum size supported is received.
3aab2fa60104cbc914e3b25a83dfbf616abc2459c64bcf9311460f3abb7b0b10
Gentoo Linux Security Advisory GLSA 200408-25 - MoinMoin contains a bug allowing anonymous users to bypass ACLs (Access Control Lists) and carry out operations that should be limited to authorized users. Versions 1.2.2 and below are affected.
f04d90526276aee3d8576f9c89847d5e6577fa51274d45240a9db2d0f707a810
Advisory addendum for the Winamp vulnerability where insufficient restrictions on Winamp skin zip files (.wsz) allow a malicious attacker to place and execute arbitrary programs.
d0b9121eb501f678eca87614f27cadf9bf2d44109ac70b814c9eb1b09cc86e2c
Secunia Security Advisory - A vulnerability exists in GNU a2ps 4.x that allows local users to escalate privileges due to insufficient validation of shell escape characters in filenames.
a91ad13fc587ee3bc2dc23d7e93b275415f289ba7a22246614c1ad045d189616
Keene Digital Media Server version 1.0.2 is susceptible to a directory traversal attack due to a lack of sufficient input validation.
c6b7b8ca66b7a19b5018608256d434a4b46c13eb06079a5fd72bcfa81b0bc030