Pytroj is a tool for infecting .pyc files with arbitrary code that spreads out to infect all other .pyc files. Pytroj is a proof of concept attack against .pyc files. It searches for other .pyc files and injects itself into them. The injected code can be any python code (in this case it prints "You have been exploited").
d44ca1c93ee2388f67a815c8034747a43a8ba7d4a3399ef8aea6d9162f241d59
Secunia Security Advisory - Miroslav Stampar has discovered a vulnerability in the Mingle Forum plugin for WordPress, which can be exploited by malicious users and malicious people to conduct SQL injection attacks.
d8f81a0789e4ca28b7cd79d6bf66a15eff867809ecb5546d86584fd666878f47
Secunia Security Advisory - A vulnerability has been reported in the dev/null robots.txt extension for TYPO3, which can be exploited by malicious people to conduct SQL injection attacks.
55bc71641d76016718fe5bdbf198cee1694cadab35ae8f8cd0a16200044c851d
Secunia Security Advisory - A vulnerability has been reported in the RTG Files extension for TYPO3, which can be exploited by malicious people to conduct SQL injection attacks.
70b45ba3dc9b892c6a4bdf93bdbfb9314d270e4e4c6ddaf9f0a06907b5d2b186
Secunia Security Advisory - A vulnerability has been reported in FreeBSD, which can be exploited by malicious, local users to gain escalated privileges.
f8f06b97f280ca51f59c4b7dea136f9417a6272ce19073709791ca6a659df316
This is the language pack for Zed Attack Proxy (ZAP). Languages supported include English, Brazilian Portuguese, Chinese, Danish, French, German, Greek, Indonesian, Japanese, Polish, and Spanish.
6183ff2dcbca1d90de8be214492f2c35ec55b93ada75f15714619cc720a1aaa9
This is the client API for the Zed Attack Proxy (ZAP).
6d7cff323c60e89b38a9a849a33616a16931393cd68b4f5494c52abb8537b820
Secunia Research has discovered a vulnerability in Novell GroupWise, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. The vulnerability is caused by a boundary error in GroupWise Internet Agent (gwia.exe) within the HTTP interface (port 9850/tcp) when handling requests for certain .css resources. This can be exploited to cause a limited stack-based buffer overflow via a specially crafted, overly long request.
0a0e3b9755408f3ac4d24cfc5ddaa02db84cde579ed5eb0e2b98699b9e5ace5f
Secunia Research has discovered a vulnerability in Novell GroupWise, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused by an integer truncation error in NgwiCalVTimeZoneBody::ParseSelf() within gwwww1.dll when GroupWise Internet Agent parses "TZNAME" variables in VCALENDAR data. This can be exploited to cause a heap-based buffer overflow via a specially crafted e-mail containing an overly long "TZNAME" property value. Successful exploitation may allow execution of arbitrary code.
098e587acb10c0083b88ba844ed01cfbf1ec6d61bdeb69e7e6a4f2b9e4413126
Whitepaper called Process Hollowing. Process hollowing is yet another tool in the kit of those who seek to hide the presence of a process. The idea is rather straight forward: a bootstrap application creates a seemingly innocent process in a suspended state. The legitimate image is then unmapped and replaced with the image that is to be hidden. If the preferred image base of the new image does not match that of the old image, the new image must be rebased. Once the new image is loaded in memory the EAX register of the suspended thread is set to the entry point. The process is then resumed and the entry point of the new image is executed.
7f7a85ecfeef6b9feb94c08d5e3cb1f087e2f5240b64d76d49bde14d9a26bc7b
ServersCheck Monitoring version 8.8.6 suffers from cross site request forgery, cross site scripting, and session hijacking vulnerabilities.
a4580aa1b7b69c5fa20a1b2be64aa2e2234207839e8d100a27b6253627c6b167
Ubuntu Security Notice 1216-1 - Dan Rosenberg discovered that multiple terminal ioctls did not correctly initialize structure memory. A local attacker could exploit this to read portions of kernel stack memory, leading to a loss of privacy. Alex Shi and Eric Dumazet discovered that the network stack did not correctly handle packet backlogs. A remote attacker could exploit this by sending a large amount of network traffic to cause the system to run out of memory, leading to a denial of service. Various other issues were also addressed.
632b7c41843d8b08abd09aa566debae12f62d2202a245defc954e205b756668d
DNS Spider is a multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.
39ad27d6d5242990a8105766614da17511aa4ebe6dcac490096e88bd2c6734bf
sshtrix is a very fast multithreaded SSH login cracker. It supports SSHv1 and SSHv2. sshtrix was designed to automate rapid bruteforce attacks against SSH authentification screens. Unlike other public tools, the aim is to keep it simple, stable, fast and modular. With its clean code design, it is easy to extend the code to a framework or to fork it against protocols of your choice.
dc90a8b2fbb62689d1b59333413b56a370a0715c38bf0792f517ed6f9763f5df
Adobe ColdFusion versions 7 and below suffer from cross site scripting and path disclosure vulnerabilities.
2ccd4259b49d3c5a585be5893ffc080df3ab2abf68b634f4feb4cf7bb5aaa8f4
Vanira CMS suffers from a remote SQL injection vulnerability.
5230d0cf5ee4ae6bd741326bd6d5eec8a61024b254926f0606b90cf20c2c2d83
Red Hat Security Advisory 2011-1338-01 - NetworkManager is a network link manager that attempts to keep a wired or wireless network connection active at all times. The ifcfg-rh NetworkManager plug-in is used in Red Hat Enterprise Linux distributions to read and write configuration information from the /etc/sysconfig/network-scripts/ifcfg-* files. An input sanitization flaw was found in the way the ifcfg-rh NetworkManager plug-in escaped network connection names containing special characters. If PolicyKit was configured to allow local, unprivileged users to create and save new network connections, they could create a connection with a specially-crafted name, leading to the escalation of their privileges. Note: By default, PolicyKit prevents unprivileged users from creating and saving network connections.
be9493f6e2a725ca503b1c5b73120f328fb6b45e04abacae69d233701bd2021a
Multiple CMS systems from Flynax, such as General Classifieds Software version 3.2, Auto Classifieds Script version 3.2, and Real Estate Classifieds version 3.2 suffer from a remote SQL injection vulnerability.
837f7c1ded65757aead3d96e47f5b805e6aaf61d31d40e2f5c64c06f0f811788
Apache Tomcat suffers from multiple weaknesses in HTTP Digest authentication. It suffers from replay attacks, lack of value checking, and more. Tomcat versions 7.0.0 to 7.0.11, 6.0.0 to 6.0.32, and 5.5.0 to 5.5.33 are affected.
ef0d4c069ff5eff4da4c340335c5058fa7ef92b1e2389cb6c9849ef1c1a08c00
Muse Music All-In-One version 1.5.0.001 PLS file buffer overflow exploit with DEP bypass.
81d4a367229cb243e631bb2b737374d8133a968bdd78c62a56e44a7a1569c9f4
The Joomla Biitatemplateshop component suffers from a remote SQL injection vulnerability.
52bb9485d37a1a44d3eb97b2c195061f55ea3d332b38ebc3eb88c7124742b21d
Omnidocs suffers from privilege escalation and direct object access vulnerabilities.
4a968f909bc19bc7562831edc70d325f6daecc4a156a94725d3e2a39c099a7cb
Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86 version.
2595aac00e1f1fd00aa17d72ec16288194319b32e89f5084e31499759a88cf98
Sterling Trader versions 7.0.2 and below suffer from an integer overflow vulnerability.
be6fbbd5c1406751e12672870cb02440d8217601e35a328d93b875ae0e05adfd
GMER version 1.0.15.15641 suffers from a MFT overwrite vulnerability.
ee4886d4cad0348e9f67676e3c325111fdf822b98d5dd2a11fb1a7d102325098