ShellTer is an iptables-based firewall. What sets it apart from the rest is that it has built-in SSH brute force protection. It is easy to configure and has an interactive CLI installer.
57b65bc44ca1669af5ad8ede10cae47a84ccf709703180479007e36ff276485c
WiredRed EPOP WebConference server version 4.1.0.755 is susceptible to cross site scripting attacks.
f3e8e0574ab17e4c3f798104da79baf6a7b5c08a39a3ee1660311c042a69f832
Remote denial of service exploit for Half-Life engines that cause it to fall in an infinite loop and stop processing requests.
47b10922cc1fe2a7499cae6d2e6022254c20339cfd77789cfe63b9f4c6ee69da
PHP iCalendar versions 2.0.1, 2.1, and 2.2 suffer from a file inclusion vulnerability.
f639ed07e231474ff50ebb23381c5826750e7ec8e5b2288800689478e498282a
Whitepaper entitled "The Role of Modeling and Simulation in Information Security".
5f8856fb2b9965e4af48075871fdccda90ef3461fa0ec709beca8292fca13122
SPIP versions 1.8.2g and below remote command execution exploit that makes use of an arbitrary local inclusion flaw and SQL injection.
59a62d80b8dadeee1215c4be9c2ad51fb3504482b5aa036653d700829a4ef5c1
CPGNuke Dragonfly version 9.0.6.1 remote command execution exploit that makes use of an arbitrary local inclusion flaw.
e65fc321596ba35cd34f5b98312c94811bbc295ab5ad13a5d76973b326457761
Whomp Real Estate Manager XP 2005 is susceptible to SQL injection attacks.
8d8fb7f863cb04a9b261a2efc763e7afd8dbf0a312752295af01fa6115b66215
Raw Covert is a program that initiates a covert channel over IEEE 802.11 networks thanks to wireless raw injection. It aims at encoding a covert channel in valid ACK frames in the RA address field. This program is a basic proof-of-concept code.
c5841ce4e81f8eb059f35f0253eb832ea09516d507b38ba7301dd6b8f12bd765
Raw Glue AP is a program that catches wireless stations searching for preferred SSIDs. This tool catches probe requests, send back appropriate probe responses and then tries to catch authentication and association requests. This is a kind of Glue AP which purpose is to catch clients that are actively scanning for any SSID. All this stuff is done in monitor mode and uses raw injection which seems to be required if this method may be implemented in a Wireless IDS (that usually perform detection in monitor mode). This program is a basic proof-of-concept code.
13cce714959056d41627ec9442342d46072f9d72ef57554b9d03ebfb353ed2d1
Raw Fake AP is a program that emulates IEEE 802.11 access points thanks to wireless raw injection. It aims at creating/injecting both beacon and probe response frames in order to emulate valid IEEE 802.11 access points. This program is a basic proof-of-concept code.
4e5f63d8488b0fbd1a709429feb797c8c679de48f47ef93ab4741f8506830667
Secunia Security Advisory - 3APA3A has discovered a weakness in The Bat!, which can be exploited by malicious people to conduct spoofing attacks.
c06ae4eb6925c46d812d2fd38ec917d9b14fde36faf34bd8e3d872e4039ffd7f
Secunia Security Advisory - Kevin Finisterre has reported a vulnerability in Lexmark X1100 Series, which can be exploited by malicious, local users to gain escalated privileges.
59109ed7a3ccc402646346d24bb0c7395c8961560ee0a8d819ef2585fa9ef169
Secunia Security Advisory - A vulnerability has been reported in Internet Explorer, which can be exploited by malicious people to compromise a user's system.
931be7c3c224cd192f2e7716da7c34662c53650a399e2be1324ab39cc342d77c
Secunia Security Advisory - Pierre Betouin has reported a vulnerability in hcidump, which can be exploited by malicious people to cause a DoS (Denial of Service).
d7debdb296be998c651044e5aa477efa9175407e52f6ba7669c7ed37f0e701bf
Secunia Security Advisory - Peter Winter-Smith of NGSSoftware has reported a vulnerability in the LexBce Server Service included with various Lexmark printers, which can be exploited by malicious people to compromise a user's system.
b2cfca0c56bd61be4474a085d46621610415c466e0cdc072433184e08c82d192
Secunia Security Advisory - Pierre Betouin has discovered a vulnerability in various Sony Ericsson cell phones, which can be exploited by malicious people to cause a DoS (Denial of Service).
fbefb9f69cbc4273a9894d7eac91d2fe3026d36d46e0de85f2f2a37b0a92406e
Secunia Security Advisory - Multiple vulnerabilities have been reported in QNX Neutrino RTOS, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges.
8cd90bffb754f5b010d943fed4b567347be58a0ffb37def27d6cd6d2785ff393
Secunia Security Advisory - imei addmimistrator has discovered a vulnerability in MyBB, which can be exploited by malicious users to conduct SQL injection attacks.
c4d0858942468fc62984cfa39a1d2b04a192f9950e0e04af471a589dbc8b18c9
Secunia Security Advisory - Sudhakar Govindavajhala and Andrew W. Appel have reported some security issues in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.
efb4280f570a25d41ba764a078fb25a6bbb06ab017995fff96e93bc6c508f60c
Secunia Security Advisory - Aliaksandr Hartsuyeu has discovered some vulnerabilities in phphg Guestbook, which can be exploited by malicious people to conduct script insertion and SQL injection attacks, and bypass certain security restrictions.
a25d167ac20d322e9c398d86146e242ecb28906f131775fc9bebbce43aaf6f19
Secunia Security Advisory - Aliaksandr Hartsuyeu has discovered two vulnerabilities in Unknown Domain Shoutbox, which can be exploited by malicious people to conduct script insertion and SQL injection attacks.
e8895802924ce7fe8154d0711cd1bdf73ea68d70bb84c9b2eba1f9538d3d0a11
Secunia Security Advisory - Aliaksandr Hartsuyeu has reported two vulnerabilities in GuestBookHost, which can be exploited by malicious people to conduct SQL injection attacks.
9b2df2d609dce85e389ec7fa218fc55a226a50f0ad2583abb00beb040562af30
Secunia Security Advisory - Mandriva has issued an update for php. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.
6f057f501b4f87884bf4f1453936b51f020c74b37aaf2f46c143a194fefce15e
Secunia Security Advisory - A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service).
af72b17195bc60ac7b46f51c65468cecccf5cdc8a4479fbb2078fec027506125