phpBB 2.0.15 exploit that makes use of the flaw in viewtopic.php and retrieves all details related to the database.
d1eefd763f27f54396a23466eaece8ec980dad5696cf5d6f6a85022eaa9efc91
Nokia Affix btftp remote client exploit that affect versions below 3.2.0.
4777fa13b8ddade7061084db8c5d1d768933891c69aa232e4eab34ab153cc7a3
Microsoft Internet Explorer javaprxy.dll COM object exploit that binds a shell to port 28876. Tested on Internet Explorer 6 on Microsoft Windows XP SP1 and SP2.
6c551ef5ab44c97b388f40233250eaa133f2ee1d74c10cb507d45d4bd01988be
php 2.0.15 remote command execution exploit for viewtopic.php. Written in Python.
85149f4b26a8a704dff6d70dabd7614094a6712f06c67d1fdfee0b72b2c51b13
Pear XML-RPC Library 1.3.0 remote PHP code execution exploit.
3d26eb02b57c9a6718c5e4a92e7999018d71a70b03601a471f95bacc49c3ad81
SnortSMS is a highly configurable sensor management system that provides the ability to remotely administer Snort [and Barnyard] based Intrusion Detection Systems (IDS), push configuration files, add/edit rules, and monitor system health and statistics, all from a simple and clean Web interface console. Whether you have one or multiple Snort sensors, it can help unify and synchronize all sensor configurations.
97776a0c25288cbd52344531eece22241414e9dd0be697af28698971c053a970
VisualRoute is a traceroute tool which displays a map of the path to the destination server by looking up the geographical location of each traceroute hop. The network service provider is identified for each hop, and instant domain and network whois information enable quick problem or abuse reporting.
c39e995f5dc2478ad8a0c7851aa01c3382b0f694edf74b506b3e4c40229dec64
Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.
95771c01b986f36b5fc1d7d8c43de9b4baa24471d2e0c879d4381d8c680f1670
PIKT is a cross-platform, multi-functional toolkit for monitoring systems, reporting and fixing problems, security management, and updating system configurations. PIKT comprises an embedded scripting language with unique, labor-saving features. Binaries available here.
41f6e35ae073b99ec0b1e1d4c11a5d33976b8da0b26382e3f29a3effb3c1f1c3
NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.
18c0c0af1e0fe02d19c3d73670686ca1131e15736c8abe47291d7fea5fca40e6
Integcheck is a system integrity checker. It checks the integrity of exposed systems by getting a list of MD5 hashes of any important file via SSH, keeps a master list of these on a relatively secure system, and compares this list daily with the current list. As long as the system considered safe is not compromised, it should inform administrators of any changes on the exposed systems.
e7c9434bfdb6058ebab0cbdd8b06624e1cf036583741951558862dbf8c66302f
GrokEVT is a collection of scripts for reading Windows event log files. The scripts work together on one or more mounted Windows partitions to extract all information needed (registry entries, message templates, and log files) to convert the logs to a human-readable format.
57e49ae767a0e0e8ed567f09d3e5bf0234bf97dbe8e2e04e099887408bb57895
Nmap Parser is a Perl module that simplifies the process of developing scripts and collecting information from the XML nmap scan data, which can be obtained by using nmap's -oX switch or from the file handle of a pipe to an nmap process. It uses the XML twig library for parsing, and supports filters.
7bb2e4baa261fb401c6973fa8a84f97e5b723f49fdc30b94d255fc3920860dde
Secunia Security Advisory - Some vulnerabilities has been identified in Gossamer Threads Links, allowing malicious people to conduct script insertion attacks.
181f18123778f3c4567e940dea828af8f0d23695231aa9e09e4a6088c11f6a89
Secunia Security Advisory - Eric Romang has reported a vulnerability in ekg, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
840c02a3c5ee450195992a5e1ee84eed679509774bf550c5ede64350dbd5767f
Secunia Security Advisory - Mafia_Boy has reported a vulnerability in EasyPHPCalendar, which can be exploited by malicious people to compromise a vulnerable system.
a3c08d527de7a1018d85382d90f58cbbc6eeb055c33bfeadcf4806ac5c89c9d0
Secunia Security Advisory - Eric Romang has reported a vulnerability in log4sh, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
4daaa31c8458dad1f554df6e2548858909c4879ec73c2dfaf905c279636ab760
Secunia Security Advisory - Seth Alan Woolley has discovered a vulnerability in Quick & Dirty PHPSource Printer, which can be exploited by malicious people to gain knowledge of sensitive information.
22487f4204cfcb90392a7685759b3b6a483503e647248e5e05fd912d433be6a1
Secunia Security Advisory - A vulnerability has been reported in Courier Mail Server, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).
5899baa455a342933b6e5c1647e033e73abe52d89981727fa8294cf80943c5af
Secunia Security Advisory - V4mu has discovered a vulnerability in nabopoll, which can be exploited by malicious people to compromise a vulnerable system.
650fdccf31444727584945ed278fe4004c914a845502bf0944a984ae9264242d
Secunia Security Advisory - Eric Romang has reported a vulnerability in Kpopper, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
e8e9b306ab7b8155ff83dec7becfdea0e557958d5c125305da0909f98ce33839
Secunia Security Advisory - Eric Romang has reported a vulnerability in Centreicq, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
3e056c81c9d805d1cbe2347495444841b64a332917cd992f1a7e6eb477c5d2a5
Secunia Security Advisory - Stefan Esser has reported a vulnerability in Geeklog, which can be exploited by malicious people to conduct SQL injection attacks.
2cc5b343356a91cbb07681e9152cf549fba5f910a695b2e2d9154998fcacf74a
Secunia Security Advisory - edisan and foster have discovered a vulnerability in osTicket, which can be exploited by malicious people to conduct SQL injection attacks.
79c7a5567424d0925573babc0c1abf05cb87769c92a24d445d0c8884ede121e2
Secunia Security Advisory - Trustix has issued various updated packages. These fix some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), to overwrite arbitrary files, to compromise a vulnerable system, or by malicious users to gain knowledge of sensitive information.
43b252aa639ff1077ccbcaaa4519657a6c5adf3a5420237c1cec985e0388e080