Majordomo2 versions 20110121 and below suffer from a directory traversal vulnerability.
a03c592e69350b16a93f9e9d471931b2f2bb19ca8569287d69b3f7af51ae46c6
Android versions 1.x and 2.x HTC Wildfire local root proof of concept exploit.
78ef0091db1824dfcac9f2a8ae3fae06f3a253b40c67aef082c50db985850f19
Android versions 1.x and 2.x local root proof of concept exploit.
e2b7ff25e6720105511d3e30120475d0893b2f4f40ff0d682dad8ca94aae206b
Betsy version 4.0 suffers from a local file inclusion vulnerability.
3ee7d8ecac43de6de62998ffbcd7d6e8fede151a38268e89cdbd70b8a8a04e49
Guardog is a simple but powerful intrusion detection system (IDS) that works by inspecting messages from log files, network packets, and other sources. It uses Perl regular expressions to check for any bad messages.
7196d2631c904b42e0d0b4097dc865c0c78597da6a59b71e880fdab2f262e9ff
httpforge is a set of shell tools that let you manipulate, send, receive, and analyze HTTP messages. These tools can be used to test, discover, and assert the security of Web servers, apps, and sites. An accompanying Python library is available for extensions.
cc8a7d86176bb2389b1e9439ab558812e3c1b7256bdeb64090bc66e6a16ce985
Ubuntu Security Notice 1056-1 - Multiple vulnerabilities have been addressed in OpenOffice. Charlie Miller discovered several heap overflows in PPT processing. Marc Schoenefeld discovered that directory traversal was not correctly handled in XSLT, OXT, JAR, or ZIP files. Dan Rosenberg discovered multiple heap overflows in RTF and DOC processing. Dmitri Gribenko discovered that OpenOffice.org did not correctly handle LD_LIBRARY_PATH in various tools. Marc Schoenefeld discovered that OpenOffice.org did not correctly process PNG images. It was discovered that OpenOffice.org did not correctly process TGA images.
50eb46cf159f0892b4e0f1a13297f0cba0eccd9720498b69622e0deb87bd11af
Zero Day Initiative Advisory 11-038 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application performs a transformation on an image sample using the sprite handler. When performing the transformation, the application will scale the sprite outside the bounds of the original buffer. This can cause memory corruption which can lead to code execution within the context of the application.
27061e8d6b706df0c1bdf5ee4f0e335bbfc1ceee0ed817effeb5aed260b6cb8b
Malmon is a real-time exploit/backdoor detection tool for Linux that audits the integrity of files in a given directory.
b44bd8cc65e7ed8c1749175d09228644839ff1029e6d7827c30f82a2877767af
pycryptopp provides a few useful cryptography algorithms for Python programmers, based on the excellent Crypto++ library (which is written in C++).
d504775b73d30fb05a3237f83c4e9e1ff3312cbba90a4a23e6cbb7d32219502b
Raja Natarajan Guestbook version 1.0 suffers from a local file inclusion vulnerability.
df2ad506d4cb25f63d07b8f32f9724be54c78728a08208483d2552036e17a374
Terminal Server Client denial of service exploit that creates a malicious .rdp file.
d857699b16f5ec4c39e143b5884dbd9906f3c40528d651e0211042a4d470a457
Pluck CMS version 4.6.4 suffers from path disclosure vulnerabilities.
633be2cfd0910b9f8a7304961e74b3c13fefae2f2370ec4aa1350462fb9b8dbb
D-LINK DIR-280 router allows for an unauthenticated direct access administrative password changing vulnerability.
50a92d0ee3378b8021ffdc21994e9c7d01dfc808b43830056e81bf6ed5e61ce0
Razor CMS version 1.1 suffers from a path disclosure vulnerability.
041f1af07b649ffe86972321af827170d9bb61164aa74860346be99a79a6f58c
Secunia Security Advisory - Ubuntu has issued an update for openjdk-6. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security features.
9d90f43c39597ef05c304aa39308fa53ae40ecd97ab299dfc5fbc2cb15fd516d
Secunia Security Advisory - A vulnerability has been reported in TIBCO Enterprise Message Service, which can be exploited by malicious, local users to gain escalated privileges.
b9856eaf21e911f1a0fb0b52f66d8faf4a7024636191967f2e503a2e93035374
Secunia Security Advisory - A vulnerability has been discovered in PMB Services, which can be exploited by malicious people to conduct SQL injection attacks.
04dc5944bfdcb3cdb896142c35f6674780cc32718de0e1174c2f4a0f9b2a2dcc
Secunia Security Advisory - A vulnerability has been reported in Plone, which can be exploited by malicious people to bypass certain security restrictions.
98d9151586e8b22ecdc43d37846ab67f9e08de4c6c8b5f97de290302826f4f2e
Secunia Security Advisory - A vulnerability has been reported in TIBCO Rendezvous, which can be exploited by malicious, local users to gain escalated privileges.
d7addbdcdf644b0a662879fe18b17f5dae22fa64e271ec4cd285f8eb0c5ec885
Secunia Security Advisory - Ubuntu has issued an update for subversion. This fixes a security issue and two vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service).
2253392096cb3c8df26ef6b9316ea33ba798ad9b660c2bf2da30e14a489c717f
Secunia Security Advisory - Ubuntu has issued an update for linux and linux-ec2. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
7e1ed7f5744c65b998201a199b89a4bc4f6830a90e53121171faf44daa28f3f2
Secunia Security Advisory - A vulnerability has been discovered in Zikula Application Framework, which can be exploited by malicious people to conduct cross-site request forgery attacks.
2124d5119ba94deb3ec7375fd60280cdbea3be095145128c6ccc1f2153e9d04f
Secunia Security Advisory - A vulnerability has been discovered in TCExam, which can be exploited by malicious people to conduct cross-site scripting attacks.
a22ef922cdc615f25513c0f8699b24dd98d0cdcc1830466e96af5e8583ec813d
Secunia Security Advisory - Blue Coat has acknowledged a vulnerability in Blue Coat ProxyAV, which can be exploited by malicious people to bypass certain security restrictions.
5e31ee1a014d0670188aeae82a42de2cedff5352d2d0f2dbe44c84553ce04f7c