Remote buffer overflow exploit for FileCOPA FTP server versions 1.01 and below that spawns a shell on tcp/4444.
e37152dd62f73e8c31017964528bea873eeadc9434cbfb75b054f2890a273f13
Microsoft SRV.SYS Mailslot Ring0 memory corruption denial of service exploit. Takes advantage of the vulnerability discussed in MS06-035.
ef948b25077f0bacfddf3f7571a4d02fcea7abd9f1ee34de56e347327398f209
Mam - Moodle is susceptible to a remote file inclusion vulnerability.
530b1e344e974fbba59dcf19888be2452a8966d16921326a146d701dee547542
Gentoo Linux Security Advisory GLSA 200607-08 - Henning Makholm discovered that the xcf_load_vector() function is vulnerable to a buffer overflow when loading a XCF file with a large num_axes value. Versions less than 1.2.12 are affected.
58f78dd070c382aca47c1a95c60e3f359e1168297a0668ead51b3f316a9324b5
snmpcheck is a tool to get information via SNMP protocols for Windows, Linux, Cisco, HP-UX and SunOS platforms. Tested on GNU/Linux, *BSD and Windows (Cygwin and ActivePerl) systems. Distributed under the GPL license and based on Athena-2k script by jshaw.
d41ac4459a12ff293160ae66984f94115d1ebd6f8943ec46db4edaf82ce8645b
www.paypal.com suffers from another cross site scripting flaw.
07dd57fbd20d6fa3c6a318720fc44ef0b7cbf5533921de704423a242bdbab74f
Debian Security Advisory 1118-1 - A massive slew of vulnerabilities have been patched in mozilla-firefox for Debian.
74647171ac7c5a853d455aa5ae4c92c3a9a312ec6e66a93800ff635432cb6605
www.apexhali.com is susceptible to a cross site scripting vulnerability.
dc1625fea720a0e4f3a41e8396eddbe63777d9552d88d226f83402cb6e28e688
Debian Security Advisory 1119-1 - Akira Tanaka discovered a vulnerability in Hiki Wiki, a Wiki engine written in Ruby that allows remote attackers to cause a denial of service via high CPU consumption using by performing a diff between large and specially crafted Wiki pages.
2a894e852244070fbaf772d3bd1b7b99a4bda4ee88d98071dad1e875171c6891
Debian Security Advisory 1118-1 - A massive slew of vulnerabilities have been patched in Mozilla for Debian.
8ec484871d9ba82c219fcbc3be77b04af539817165b2623e4f6288b1e27d5d93
Nth Dimension Security Advisory (NDSA20060705) - The IPCalc CGI wrapper version 0.40 is vulnerable to Javascript injection within the request URL.
513ab8a7e34357e669b4f147dd257356d71af53e3132e6abbcdb05f40e3bba13
Fire-Mouse TopList versions 1.1 and below suffer from a cross site scripting flaw.
e05ec0a6191e1bed0d76d080acf9fdc00eced3bf1c3561ac89b33ee3d272ba08
Advanced Guestbook version 2.4 for phpBB suffers from SQL injection and cross site scripting flaws.
b67b1ed7ace90df14b07005282f1a53f186e99a81b64127332f7eafd4710d901
Microsoft Internet Explorer suffers from a denial of service flaw using the Content-Type directive.
c2fdf0cde366d0a30a24316551d5348f86524eb049a31de0b164b5283ca1db5b
All current available Outpost Firewall versions suffer from severe vulnerabilities that allow any local user to gain access to the LocalSystem account.
9f8073aa2da59bd44cac7addf49e490496ffab3e3b2d4cdf2c8ed4fc8dfa123a
MicroGuestBook suffers from a cross site scripting flaw.
8ed0dca4560aa0bc7dd5e706737062f3c99e5799c368920947cb7273e945cc24
com_trade suffers from a remote file inclusion vulnerability.
93a4116f51e330ceccb18230ff6f0e28ca382df080e859345d4620aa846b3b4f
Solaris SPARC TCP connect-back shellcode (with XNOR encoded session) and client SPARC assembly shellcode.
ccfa1025e78e6cf31639c2c3fdca096a5bee3f74253ad408d8a969eec363f2b8
Remote signal handling exploit for Sendmail versions 8.13.5 and below.
85f87239559b74cd612452fda856576a82c5d997226da3905198f846a9f1c48f
Functioning remote exploit for the Windows DHCP Client broadcast attack vulnerability as described in MS06-036.
5e033b168105689986e7b2df247c78c44f22d6ec22b3b955cc3445ba86a8d6aa
Functioning exploit for the MDAC code execution vulnerability in Internet Explorer as described in MS06-014.
65c29b0e50b075bd163514768c68b1d6980d3a22340dd9128eb836e280a1ad90
Functioning cyrus-imapd pop3d exploit that will bypass VA Randomization. Written in Ruby.
cacdc5be8bfaa3e014d1b725ab854c63f95de8e238d93ae9918354c38df1be94
iDefense Security Advisory 07.20.06 - Local exploitation of an integer overflow vulnerability in Sun Microsystems Inc. Solaris allows attackers to read kernel memory from a non-privileged userspace process.
c80f753407d82d3fae12e5ba2a1d0f296b79aba5954f3e91039b7809696474f1
SnortSMS is a highly configurable sensor management system that provides the ability to remotely administer Snort [and Barnyard] based Intrusion Detection Systems (IDS), push configuration files, add/edit rules, and monitor system health and statistics, all from a simple and clean Web interface console. Whether you have one or multiple Snort sensors, it can help unify and synchronize all sensor configurations.
d3a83f713ade520cf0b1155ee4ca4bb69cb9e90f77d33afe68a171aae1de98d8
Shade (Steganographically Hide and Analyze Data Entries) is a versatile and feature-rich program designed to analyze and manipulate the LSBs (least significant bits) of files. LSB manipulation is a form of steganography, the art or science of making the existence of information undetectable by normal means. This is achieved by writing the contents of a file to the LSBs of a separate and inconspicuous host file.
0b64f1fd8715d2328381199fc2be73f8da4369f50a8d913186ae591cc96b6931