Local exploit for xv that makes use of the BMP parsing buffer overflow. Binds a shell to port 7000.
2ffb829c50939cf17884f3b925cf0be579f3073300e145927664d13eb2732456
White paper discussing the fact that many modern networks are extremely dependant on a centralized time resource and the negative aspects of a network not having one.
5002e772d9e24ac5abaeb58ec0059d55af71c592417b69d56aac8c3ecc92433d
iDEFENSE Security Advisory 08.18.04 - Remote exploitation of a format string vulnerability in Double Precision Inc.'s, Courier-IMAP daemon allows attackers to execute arbitrary code. The vulnerability specifically exists within the auth_debug() function defined in authlib/debug.c. Versions below 3.0.7 are affected.
3d3fdc3d44a017fba3df0c79a897dd07e115362f913118d14c5efc3edda387ee
phpmywebhosting 0.3.4 has a SQL injection vulnerability where an attacker can be authenticated as an admin by just using [usr= admin"-(] and [pass="asdf].
67cc62c3244f69dcb87dc12efe4c2bf6440d68205346aeb7abb433a015e46d7d
Aircrack is an 802.11 WEP cracking program that can recover a 40-bit or 104-bit WEP key once enough encrypted packets have been gathered. It implements the standard FMS attack along with some optimizations, thus making the attack much faster compared to other WEP cracking tools.
b7af7a2796654a86da1b95e2943d3002a2c2dece38520b396ce79f1c61b65e55
Libdisassembly is simply a python library for disassembling x86 opcodes. It has been made for Immunity's PDB Project (a vulnerability development focused debugger), and is partially based on mammon's libdisasm opcode list (https://www.eccentrix.com/members/mammon/). There is still a lot of work to do with the Metadata, but the library tries to return as much information it can get off of an opcode.
df2e29484e885c708a13b37d2a9a0b0208a7d6c07ee0177e8606dd634db7a283
qt version 3.3.2 has a heap overflow in its BMP parser.
a87464ce36d5b5cca9bf4c0ce0467eb6dfb66ef37ec4771fa65754ecf1be3997