A.R.C.S., or the Angelo Rosiello and Roberto Carrrozzo Stream 256 bit cipher, is an algorithm registered with the S.I.A.E. that the authors have allowed this site sole rights to host and distribute. The algorithm's theory utilizes Vernam's cipher, respecting Shannon's principles, and is based on MD5. The authors hope that someone will try to break this cipher and welcome all attempts and added research. Be forewarned, commercial use of this algorithm is forbidden without the Authors' consent. If you successfully crack this file that was encrypted with A.R.C.S., Packet Storm will send you a free t-shirt with the classic shellcode on the front of it. Supplies are limited, but we are not extremely worried. Thanks to all that help further the research and development of strong crypto.
6436c9950463b20a49248c7880067dabc09f043214835d7de2a41f3a947cb7ec
WordPress Cafelog is vulnerable to a number of SQL injection attacks that allow a local attacker with access to the same filesystem as the database to exploit.
74b75135b16d5c546fca3aaed5d5aa888b0f45c7d26468f13f0b98bff599dfbb
Multiple web-based mail systems, when browsed through Internet Explorer, may allow for arbitrary Javascript execution.
a34a778bae5158f0d6f80286e755627144609ff52df498c4a83f33efc899ac8d
SNAP Innovation's PrimeBase Database 4.2 employs a poor use of file creation and default file permissions that could allow a local attacker to gain administrative privileges.
126d4fc6faa462a7f475dbaf8949f35c75b0233ca041cf7689ed0d082e73ec95
Exploit that brute forces Microsoft's Active Directory authentication used in conjunction with the Cisco LEAP authentication on Cisco wireless access points.
5c87ee16dceaedfff86ef27f5cf5d747efa9ad7350b93a83fb929b17843d3b02
Writing describing the short comings of Cisco's LEAP authentication used on their wireless access points and how to score root on them.
f69cb36da7ce0751074bc9234b215e5226463cd4f861e903270e34911dae734e
Fortigate firewall pre 2.50 maintenance release 4 has multiple vulnerabilities that allow a remote attacker to gain a username and password of the system.
95f4fdeaee40230c69c9cea9ca94971a53173dfd647a8898779d5907ae087821
FreeBSD Security Advisory FreeBSD-SA-03:17.procfs - A malicious local user could arrange to use a negative or extremely large offset when reading from a procfs "file", causing a system crash, or causing the kernel to return a large portion of kernel memory.
95e6035f8a0720cdbb5f1dc7e6f3eaec332fcab7abca4a91304f917dc8a2abd8
Pine Digital Security Advisory PINE-CERT-20030902 - An integer overflow condition in all versions of FreeBSD could lead to disclosure of kernel memory.
19e199ebba5f002b2f5b355c5a5d6960f5ecfe97e20fc885c026a346d1f05c8f
Pine Digital Security Advisory PINE-CERT-20030901 - An integer overflow condition that is exploitable under FreeBSD versions 4.3 to present allows for a denial of service and/or privilege escalation.
f754c8aed03b7474ca466d0f22cdec167687afafce591d4700b55c4268ac9b84