A simple lightweight threaded portscanner. Version 1.1
016fe412f7e19872b98981da557d161c4e796dd774935614f03e247112aff64f
A simple lightweight threaded portscanner. Version 1.1
016fe412f7e19872b98981da557d161c4e796dd774935614f03e247112aff64f
RockLiffe MailSite wconsole.dll Denial of Service/Script Injection Vulnerability
8aff353399cd70e494ccd17f68e2fda160bdabc46209288131fb167e560b0511
RCBlog v1.0.3 suffers from several vulnerabilities which can be used to open arbitrary files and compromise the admin's md5 password hash.
9a5a943ec06cac59377d32cc75369eeea009157b6051a9fe080aa6c64a9651d4
TSNG is another excellent release from THC. It is just your normal plain text mode wardialer without a GUI, but with the ability to scan with as many modems as you want. The only limits are your bandwidth, RAM and CPU power. So in theory, up to 65000 modems can be used in parallel to scan a large range of numbers. The modems can be in any area of the world, as long as you have network connectivity to the systems to which the modems are connected.
507bafc71c2cda7abc5b5ef9e08d09c37dbfcfb1829b0270db30b21988eef784
Advisory ID: NS-012006-ASPNET-LDAP - IIS running with .Net Framework - Web Services running on the ASP.NET framework may disclose an internal LDAP filter query, if an exception is not handled properly in the source code.
ec6248ef459de61a425371c1fc96b7fbbc2b00bd8dfab9a89c71ab083cdc6d40
POC Exploit for the MSVC 6.0 run file bug.
8dc1ea0a87aeaf315faada5f0a3e56449a6ecd38e65005ebcc862f8b10894989
MSVC 6.0 run file bug - Generally authors offer code as a project with source, headers, and msvc project files if it is a fairly big project. Most users will simply open up the project.dsw file, ( especialy if it says to do so in a readme.txt or other compiler instructions ) which in turn loads the project.dsp files, which provides the compiler directives. A malicious attacker could embed commands to be executed in the project files, and execute any local code of his choosing.
6a5009f0e4aebe69416725cbeacce66fef04e21047c8e1e2cc4db50de6dbc0ff
SysChk is a tool to aid in monitoring file system integrity. Monitored changes include: User Ownership. Group Ownership. File Permissions. Modified Time. Md5 Hash.
8ea43a8ad579b3a6784a08d37afa13ede6500c73177fda62fca08121d3cbc32e
geoBlog MOD_1.0 suffers from an SQL injection vulnerability in the $tmpCategory variable.
5e189075c4e8d9d098ef84b254d707b696546daf79c178386d2b39d0ff50cf4a
FreeBSD-SA-06:07.pf - IP fragment handling panic in pf(4)
9cad705f66791abb1914cb7c4d59843f645a367a3c38014622cf3fcd703c2065
FreeBSD-SA-06:06.kmem - Local kernel memory disclosure.
fb76aefec08eb82b18ac140a8e8ca53cd6ad94e846b92bcf459f4446fbd59fd9
Debian Security Advisory DSA 955-1 - Two denial of service bugs were found in the mailman list server. In one, attachment filenames containing UTF8 strings were not properly parsed, which could cause the server to crash. In another, a message containing a bad date string could cause a server crash.
8ec7f72d923eb042d3554738dbf5d6037da2fc7bcd667c9dc7a461b9cab22929
Debian Security Advisory DSA 947-2 - A heap overflow has been discovered in ClamAV, a virus scanner, which could allow an attacker to execute arbitrary code by sending a carefully crafted UPX-encoded executable to a system runnig ClamAV. In addition, other potential overflows have been corrected.
43991b16e57384972b4cca0256d029353657c9ecaf2bb41d13278725fe8208c4
iDefense Security Advisory 01.23.06: Remote exploitation of an input validation error in Computer Associates, Inc.'s iTechnology allows remote attackers to execute arbitrary code.
955c1fecaab62091fd40c907f4f5c9742ddf2f8a12310be2b6fab7345ca7d65a
SUSE Security Announcement - Maksim Orlovich discovered a bug in the JavaScript interpreter used by Konqueror. UTF-8 encoded URLs could lead to a buffer overflow that causes the browser to crash or execute arbitrary code. Attackers could trick users into visiting specially crafted web sites that exploit this bug (CVE-2006-0019).
c28d6c9ffd4342fd4f859e8dacce3e1f2ad0b7d4b783c8275b49a9b1289f642e
Secunia Security Advisory - Secunia Research has discovered some vulnerabilities in various E-Post Mail Server products, which can be exploited by malicious users to bypass certain security restrictions, gain knowledge of certain system information, and cause a DoS (Denial of Service), or by malicious people to compromise a vulnerable system.
109a4a2103984810e961f65e76c58b8c22b2fccb39d08975bb094740656e425e
Secunia Security Advisory - Critical Security has discovered a vulnerability in Sami FTP Server, which can be exploited by malicious people to compromise a vulnerable system.
41cf5a2df969316e8957cc80cfaa1c19326e1ef6f9106e18adc4ed71b349ef06
Secunia Security Advisory - Debian has issued an update for wine. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.
bd4542116ad6905d9be81e4655424f38a1df2bdb6438db4cd0428ffe815e39be
Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya S87XX/S8500/S8300, which can be exploited by malicious people to compromise a user's system.
708bd11c8a1b26abe9f291b5e89ce26e4fc4dd32dda0617af2110ac7c6ff01b8
Secunia Security Advisory - Johnny Mast has reported a vulnerability in LibAST, which potentially can be exploited by malicious, local users to gain escalated privileges.
370033635f18881df96205a58224bd92c8751a5beecbec8ccf45e3e904f3b16c
Secunia Security Advisory - karmaguedon has reported a vulnerability in Claroline, which potentially can be exploited by malicious people to bypass certain security restrictions.
278db1c035c263888bc6629b7ac4d5ee29b957f12dec95d964f85c464331cef5
Secunia Security Advisory - A vulnerability has been reported in Kerio WinRoute Firewall, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).
215f29e5661cbac2b634533facfb6cde3153cd7fbdd74895da2dd6cc9426b0dd
Secunia Security Advisory - A vulnerability has been reported in WeBWorK, which can be exploited by malicious users to compromise a vulnerable system.
c1ad753c9f734095341ded90c5bdc813026d05f3ba68e9933912dac7f707bef3
Secunia Security Advisory - Two vulnerabilities have been reported in FreeBSD, which can be exploited to malicious, local users to gain knowledge of potentially sensitive information.
13bfcdabc97443e56e7eb5f9d96c0fc39b15483621c8099e78cad9d34156f8af