PTT Security Advisory - Sun Answerbook2 version 1.4.4 is susceptible to cross site scripting and administration attacks. Exploitation provided.
f84f8926bae5020beca593a0122297f5f39ac778c3820f5996098cd6a9e123be
iDEFENSE Security Advisory 03.28.05 - Remote exploitation of a buffer overflow vulnerability in multiple telnet clients could allow the execution of arbitrary code. The vulnerability specifically exists in the env_opt_add() function of telnet.c. iDEFENSE has confirmed the existance of the vulnerability in the telnet client included in the Kerberos V5 Release 1.3.6 package and the client included in the SUNWtnetc package of Solaris 5.9. It is suspected that most BSD based telnet clients are affected by this vulnerability.
de99e8ea1329dbc1f15a968b8c0756e881aa440162190742655fdb287e67ea1c
iDEFENSE Security Advisory 03.28.05 - Remote exploitation of an buffer overflow vulnerability error in multiple telnet clients may allow execution of arbitrary commands. The vulnerability specifically exists in the handling of the LINEMODE suboptions, in that there is no size check made on the output, which is stored in a fixed length buffer. iDEFENSE has confirmed the existence of the vulnerability in the telnet client included in the Kerberos V5 Release 1.3.6 package and the client included in the SUNWtnetc package of Solaris 5.9. It is suspected that most BSD based telnet clients are affected by this vulnerability.
9a3b7b73eb08fc8817b92e7dac30a75b72f3c015d5bbd074dbfb8f930414a6f2
Practical guide to advanced network attack and reconnaissance techniques using Python. Includes topics such as firewalking, port scanning, ARP poisoning, and DNS poisoning.
916232dd57df1886350cf72bfea0c2c2b0deabc436b2c432950fbf0ce8bdd015
Proof of concept exploit for a remotely exploitable buffer overflow in the Tincat network library used in various games.
59a3b89267c5dd0e34a3c1f1ddfd3867902e562a8c7054b2a8a2a37ea1878f70
The Tincat network library used in various games is susceptible to a remote buffer overflow in the code that logs players entering the server. This flaw allows for remote code execution.
c211634e8ceb1aabbd24adf99b61d5686e280b0581dced699b041982f50b4780
Gentoo Linux Security Advisory GLSA 200503-34 - A routine security audit of the mpg321 package revealed a known security issue remained unpatched. The vulnerability is a result of mpg321 printing embedded ID3 data to the console in an unsafe manner. Versions less than 0.2.10-r2 are affected.
e3b4a0926c6deb1e52dbd27635780082fa5bbda54ada9fec46a0718dc8882384
THai's Shoutbox is susceptible to a cross site scripting bug.
ed49a7e339d0891d132dc79e327caf12fabaf981cbcaf07676c4f8b3aa3c5658
The Bluetooth code in the Linux kernel has a flaw that allows for local privilege escalation. Versions affected are greater than or equal to 2.4.6, less than or equal to 2.4.30-rc1, and 2.6.x up to 2.6.11.5.
3af1e2b575930a55ef4b0186165f28931f8a985f60a7c3067e9481a97e6a86a3
Vladersoft Shopping Cart version 3.0 is susceptible to multiple cross site scripting and SQL injection vulnerabilities. Sample exploitation provided.
ff883a1159901250b604c992c505e6b30d38334d06fe39e24596c33f727d5e37
The LDAP service on an iSeries server can be used to enumerate the AS400 user profiles.
c2b8bdaf2439c1b48e6be48182c9ebeacfaefa836bef1783fbc6e7ad751c62b1
SMTP relay scanner checks for open relays and misconfigurations that allow spoofing via the tested mailserver or for internal mail to internal address from external nets. Supports plugins for additional tests. Approximately 20 different misconfigurations are checked for, using a total of around 150 different tests. Written in Perl and tested on Windows and Linux.
3669766cc3a5e54ff8da711f3496bc595261900c567146943c589828eff68dae
Secunia Security Advisory - mircia has reported a vulnerability in phpMyDirectory, which can be exploited by malicious people to conduct cross-site scripting attacks.
e8a6e19f1ef60fa7a111e1c9333d6f9481732db3cfd7e295faea8a9a6c45c852
Secunia Security Advisory - Gentoo has issued an update for ipsec-tools. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
04f78b9e0f3290e05eee71a01560c624a1f050960e2d99ff7159323f243b3c49
Secunia Security Advisory - Slackware has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited to bypass certain security restrictions, conduct spoofing and script insertion attacks, disclose various information, or compromise a user's system.
9dc034d44353294bf6fbe5904b11f53ce243451d423981aef7a1fbd5bf444060
Secunia Security Advisory - Diabolic Crab has reported some vulnerabilities in exoops, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
5a3f3b4985fa46f3baa0f538930c008b8890e365d6b62f428263eb4b01b6b1a4
Secunia Security Advisory - Aviv Raff has reported a vulnerability in Maxthon, which can be exploited by malicious people to disclose some potentially sensitive information.
87440c1dab3a4f2df2e1ad7124a012979bb9e82c5efc0d10443604666bdc6377
Secunia Security Advisory - Gentoo has issued an update for Thunderbird. This fixes four vulnerabilities, which can be exploited by malicious people to compromise a user's system.
3fe5b367857e0869dfa98f0b26c693163c74db4393ed4b4961689077c2ee878e
Secunia Security Advisory - Gerardo 'Astharot' Di Giacomo has reported some vulnerabilities in the Nuke Bookmarks module for PHP-Nuke, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
deaa338c13d08b2030eb64ce45b5ad57c433c9d138d36cd4008008d8d845448e
Easy Community Management System Forum (E-XOOPS) contains multiple SQL injection and cross-site scripting vulnerabilities. Some of these may not be exploitable depending on how PHP, Apache, and MySQL have been configured. Advisory contains proof-of-concept exploit URLs.
383b99f55a4400a2bec840c614876918516b6901632de122f0ebc7126617cb4f
Timbuktu Pro Remote Control user enumeration program. Wordlist-based bruteforce tool that checks whether a given username exists on the target server or not, which is possible due to a difference in the error message returned when the username is invalid versus when the password is invalid.
c1316cb0a42dbdc8c71076a0435e16160c2cbab2ffe04ba0757c56504e85b033
NukeBookmarks version 6 contains SQL injection, cross site scripting, and path-disclosure vulnerabilities. Advisory contains example exploit URLs.
aa04cadcaf0e6dc00925b0ece1251381dcb2058c48cddd82c5318bc21db41adc
Limewire directory traversal exploit. Exploits bug in versions 4.1.2 - 4.5.6, inclusive.
a0dfa08e39acd486c6491f79f378b661f19d8d1edb4b5a89ab50190a58682691
The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here..
91af27a0f4b60daaadc83e622e9e24685dddb3a546a59e4ea5e2177d5e1e6905
This IDC script will scan through an IDA database locating and marking the relevant RPC server data structures. It will then enumerate the dispatch routines from the DispatchTable. The script outputs the addresses of the discovered structs / functions and was designed to automate the otherwise tedious manual process of locating RPC routines to audit.
09a462953000492e97d310f1b0d80939c4d23e6a76122104321941414c268117