BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a Web frontend to query and analyze the alerts coming from a Snort IDS.
d861520edf1e90488b1d049837fa31a1ff3c760e45b251e23ed9f54afb7e720f
Exploit for the Atari800 atari emulator. Allows for local privilege escalation to root six different ways.
760cd8cf8696f135ffda0b2089c0d717801c12d775ac0adf04bfd86a5a846d7a
Another MSIE flaw that allows for a nest sort loop to cause an exception.
f9e3153a835e256b97c1f3cb90599d1eddf85c9d3a051a20d07215e32baf0dfe
Various insite products suffer from cross site scripting attacks.
76cc065c82a79805d65af12dc4c69c4fe67bd61a7beddcef561f43757a0f1a70
Multiple vulnerabilities were found in CMailServer's Web Mail service including buffer overflow, SQL Injection and Cross-Site Scripting (XSS) flaws. CMailServer version 5.2 on English Win2K IIS 5.0 was tested.
84acf4cfdf663c21738923ba8986aefd2a8b5f25680f5eee678407da36243638
Tool that can encode shellcode in various ways. Released by the author of the InternetExploiter exploit. Documentation for this tool available here.
66588988e27151588f35c1d98e2e115206867e3150312b3abbf669ddfdcc4681
Remote test exploit for Star Wars Battlefront versions 1.11 and below that checks for buffer overflow and memory access flaws.
98ba6099180ba4bd950aa9286836fab845e0408239a0283b9977828da8575ced
Star Wars Battlefront versions 1.11 and below suffer from buffer overflow and arbitrary memory access flaws.
0fbf70d892669a01d6f60b8cceecbb26c47cae659aa6c94955c70b1cec19ffe1
Anything with the capabilities of changing a screen saver under Windows XP theoretically can execute with anything with SYSTEM privileges.
3929a31b29a483ac37970f44e7cee88e8b662438ad1bf45c11ab5352809908b2
Secunia Security Advisory - Cassiopeia has reported a security issue in RediCart and S-Mart Shopping Cart Script, allowing malicious people to view the configuration file.
b5a5bca50aba1f64eba5c97e91f0951d57a2a93056e21c63c123f76c73432c69
Proof of concept exploit for a buffer overflow vulnerability that exists in Open Dc Hub version 0.7.14.
8258ae931f345dbb3993fba33e50fa99806a19f8996a9b591ba1f150a0fb65d9
A buffer overflow exists in the Open Dc Hub program that allows for arbitrary code execution. Version 0.7.14 is affected.
5d7728d7a1361bced3f0c6e6bc6738ad15502e921eb3164f0124e62d24c94b98
Secunia Security Advisory - Joey Hess has reported a vulnerability in wmFrog, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
58c4f2471d1ffcfc28b853c966617d4a21863ff102ffcdf925b3060552fc2244
Exploit for the Winamp vulnerability existing in versions 5.06 and below making use of the IN_CDDA.dll remote buffer overflow.
25fbcbea1f6cb52583688142fc6827f1aab748a864da9963e4213633a0d1f4bd
Secunia Security Advisory - A vulnerability has been reported in PHPNews, which can be exploited by malicious people to conduct SQL injection attacks.
1fde5eb063b0ab2d60c93249cb38fc823033b838f98a5858ec12af11c3b392e9
Gentoo Linux Security Advisory GLSA 200411-33 - A bug in the TWiki search function allows an attacker to execute arbitrary commands with the permissions of the user running TWiki.
a20264063d4371fb1c37003e5f0ee38741b0d5c5712d6caa182cbf15b5b2e86e
Gentoo Linux Security Advisory GLSA 200411-32 - phpBB contains a vulnerability which allows a remote attacker to execute arbitrary commands with the rights of the web server user.
bdda845cd63dca557ca59044b643747acc8e5fc8f327c3b384c5b354162310f2
There is a remote buffer overflow in the C2S module of Jabberd 2.x which allows attackers to crash the Jabberd sever and possibly execute arbitrary code.
05b173b611cbd832f73a3b1665a217260fa88bd37a0284261b450f8f07c205ac
STG Security Advisory: Due to an input validation flaw, Zwiki is vulnerable to cross site scripting attacks.
65b7e075dc354dda1b68af47357e8245716561c8adb622f8769142ea94fc9d0f
STG Security Advisory: Due to an input validation flaw, JSPWiki is vulnerable to cross site scripting attacks.
ecd38f592043061846aa7d65232f39d632ae3aa0e137fb49d4c2e1f914db517d
STG Security Advisory: KorWeblog suffers from a directory traversal vulnerability that malicious attackers can get file lists of arbitrary directories.
71700686df5b1678bd4503f868982180d543ec54e0c9d59cc2e37c275e95716e
STG Security Advisory: cscope is vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files with the right of the user running them, which could be root.
22aff0b7a3b9fece18550c0a926a047f9299775940d5a1168595ac6a867ae897
Remote proof of concept exploit for Soldier of Fortune II versions 1.0.3 gold and below that suffer from a typical sprintf() overflow.
8c1f38ba19234cca1350bb97214735995b65a3407cba5859c48514f728863627
Soldier of Fortune II versions 1.0.3 gold and below suffers from a typical sprintf() overflow that allows for remote code execution.
d83f55dcd409bc26440cb9e929f2bd8973ce0e861117f3b1e57032b9795e006d
Gentoo Linux Security Advisory GLSA 200411-31 - ProZilla contains several buffer overflow vulnerabilities that can be exploited by a malicious server to execute arbitrary code with the rights of the user running ProZilla.
6d361676085f0c3f1fa8acaa10a42be8b7c731c3173bf012d1b074d1b2abcc17