This PDF document holds a single paged scan of an internally distributed mail from German telecommunications company T-Systems (Deutsche Telekom), revealing over two dozen secret IP address ranges in use by the German intelligence service Bundesnachrichtendienst (BND).
03c3e672c0942d58f1aaae14a3c9c00f0aa19a2e39f16d279dd7f8bebcda21f2
SmbRelay3 is a proof of concept tool that is able to replay NTLM authentication from several protocols like SMB/HTTP/IMAP/etc.
c4576fe3ee7ac39a0393e9a737fca78376593895664fc89134376ec2cb90c4a2
Secunia Security Advisory - Fedora has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.
e684c549557dc301a72d6b8fafec108e5621bf83b62c5551fd37207a29811050
Technical Cyber Security Alert TA08-319A - New versions of Firefox, Thunderbird, and SeaMonkey address several vulnerabilities, the most severe of which could allow a remote attacker to execute arbitrary code on an affected system.
eff64d781642086ba6a55ca8ce9f01d3a040e4133cd4f93bc24caa0f86fe7823
Small shell script to brute force MD5 hashes.
f87813eabb4710f5991a4f961e02c2c5687de3355ab0e7d9075d5a4268c8e7f9
Small shell script to brute force MD5 hashes on VBulletin.
275dfa67d86676db598d6f5791f4b698a8b065d26ee6f82118668e13f1177b12
Invision Power Board Cracker version 1.0. This tool bruteforces md5 hashes and was written for use on FreeBSD.
3d99cd304a1fff660b0713de817ddfc3a7619ff26cb6fff92bdf0ca2e8ece2d0
Portcullis Security Advisory - An information disclosure vulnerability exists in the manner that Microsoft LDAP server responds when binding to the LDAP server. In the case when an invalid password is provided, the server will respond with result code 49 (invalidCredentials) and an error message. A different error message is returned if an invalid username is provided.
10233417213d8d65b5b5a8767722479605da8d41d2277ed5635cd913f03bc3e7
Portcullis Security Advisory - By sending crafted packets to ports on the Checkpoint VPN-1 which are mapped by port address translation (PAT) to ports on internal devices, information about the internal network may be disclosed in the resulting ICMP error packets.
51a82eb1b4c5f4d3532a75bb76489bb144459f7cdb950cf9b248f0ab003575f5
Discuz! versions 6.x and 7.x remote code execution exploit.
d1d95a78a88cf219026eae5595d35023fdc55e313f2101bd8a25ec0af146f7de
Pardus Linux Security Advisory 2008-71 -ClamAV contains an off-by-one heap overflow vulnerability in the code responsible for parsing VBA project files. Successful exploitation could allow an attacker to execute arbitrary code with the privileges of the 'clamd' process by sending an email with a prepared attachment.
930f71b9add142ea985cb6e2db72995a5489fb4d104b8caa4ec7c49cf5342b5f
Pardus Linux Security Advisory 2008-70 -A vulnerability has been reported in GnuTLS, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to an error when validating the X.509 certificate chain and can be exploited to spoof arbitrary names e.g. during a Man-in-the-Middle (MitM) attack.
3c2662b7e460287e9cc145ea7d0b9487ff84e81276c0932011ff5059ef43322b
Bankoi Webhost Panel version 1.20 suffers from a SQL injection vulnerability that allows for authentication bypass.
bfebed5c27e2ec25c6966f61930016594c22bc2f11619e0b17204b9ecd67684b
SlimCMS versions 1.0.0 and below remote SQL injection exploit that makes use of edit.php.
99e7fb9852ffb8d77ab8bfc3ad1ff2b7a214f6e94edd12a18848a1264d108b78
Mandriva Linux Security Advisory - Security vulnerabilities have been discovered and corrected in the latest Mozilla Firefox 2.x, version 2.0.0.18.
1fc998809fc853d4ec354eccd0d4b35d156ad52fd46b64972d48908e0ba6e2c3
AlstraSoft Web Host Directory version 1.2 suffers from remote SQL injection, insecure cookie, and arbitrary database backup vulnerabilities.
832723afefda1d572e5c2f81f3b29198c81c060e5c3d6671f853179d34fa1da7
turnkeyforms Text Link Sales suffers from an authentication bypass vulnerability.
0337540a36b17ca83de252c5f244b5f35b311f1386a367aa6f2c4a7f2c13a2c8
MemHT Portal version 4.0.1 remote SQL injection code execution exploit.
1e15027d5f8a49fd870d6ae26a104bdc9f1e5b1a4c795a63cc3022809ea7dd3a
Ubuntu Security Notice USN-670-1 -Mathias Gug discovered that vm-builder improperly set the root password when creating virtual machines. An attacker could exploit this to gain root privileges to the virtual machine by using a predictable password.
09a5701fb09f20a60f175927e582848d6bf8079c9529addac1a74ce6c50f3690
Secunia Security Advisory - StAkeR has reported a vulnerability in the Small ShoutBox module for phpBB, which can be exploited by malicious people to conduct SQL injection attacks.
6d9e8d857de53f9b3868183177dfae7278bc097beacc6e527b535e603e374c76
Secunia Security Advisory - A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
3afd6f80f3571d03a8f5e9282665d20bd7af3413315b6604223471802171b137
Secunia Security Advisory - colt7r has discovered a vulnerability in OTManager CMS, which can be exploited by malicious users to compromise a vulnerable system.
3595ba2bf88e3bc2811db09ad40849f6a094e74d92a29856ab8457e290da5af4
Secunia Security Advisory - Fedora has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or compromise a user's system.
6c15e2059b07a7aec23cb604462cc0d736f93adebe9a3b870e651693fbf7bab8
Secunia Security Advisory - Fedora has issued an update for quassel. This fixes a vulnerability, which can be exploited by malicious people to hijack IRC connections.
f05cac343d75464d65115347b4d48c8d280cbfc8a402ba5a8ab5b4548ad08add
Secunia Security Advisory - Red Hat has issued an update for flash-plugin. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, conduct cross-site scripting attacks, or disclose sensitive information.
a85cd9e3952f0479304c3397a9a5afd49958901cf38ff4d12859333480b1245e