Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.
1eb6ebef1bf8d3b85f10a542c3380392bd5a089bd210a52758f642269fe9ce8b
PHP Form Mail script versions 2.3 and below arbitrary file inclusion proof of concept exploit.
74887d87414b0b882092ef323375919772a64f21ed7760f16cd8de8df7f06a4d
php-fusion is susceptible to a cross site scripting attack. Detailed exploitation explained.
1de35e908ee7e75d08f3ca9f6c4bd4fb8c2929c3adc0e037042e4201a1e21ec4
Gentoo Linux Security Advisory GLSA 200503-12 - Tavis Ormandy of the Gentoo Linux Security Audit Team identified a flaw in the Hashcash utility that an attacker could expose by specifying a malformed reply address. Versions less than 1.16-r1 are affected.
9f80d033c782f80eac4f1770b8acfe254fc526fd21c84cd7dab8e5ce157bf5f5
Gentoo Linux Security Advisory GLSA 200503-11 - Tavis Ormandy of the Gentoo Linux Security Audit Team has identified a flaw in the handling of filenames by the ImageMagick utilities. Versions less than 6.2.0.4 are affected.
7d6665ff2f2845ca2517126f0459d14719bfab947bb7634864a033a98c3f7bfe
This exploit takes advantage of a stack overflow vulnerability in the CA License Server network service. Versions 1.61 and below are susceptible.
7d2cf16bb7713ea7d275c701f1c25126c9a157166b80c35eb4d2bbdd5353043e
Forum-Aztek version 4.0 myadmin.php remote database dumping exploit.
e71d21fc1a132c411cf07a2793966649633c03cc90cebb36877ce133423e0b1d
Windows Server 2003 and XP SP2 remote denial of service exploit. Tested under OpenBSD 3.6 at WinXP SP 2.
0e93f099021b10239134c2069b579ace5acbb9a94e5480cc2cbbe1cad668a9b6
PaX has a flaw that allows unprivileged users to execute arbitrary code with the privileges of a binary that executes setuid or setgid.
7e39dbcce3e6135a21aa20176ace9d0c41dc2f78632fcaf5c8e3f1d7ea79cf4e
phpBB 2.0.12 session handling exploit that allows for administrative compromise.
8142b72c22b6629166d0585d515d339b725b68c6888afca57777e9af981784dd