cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up.
3b9f430856a088743b45c08a37529dd85ef28408ced3ae049c90acab7eef4c20
Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference.
82994e60f8543e2e639ab39fcb39f7bbb34f273279accf594fe73ae3c43cd693
GrokEVT is a collection of scripts for reading Windows event log files on Unix. The scripts work together on one or more mounted Windows partitions to extract all information needed (registry entries, message templates, and log files) to convert the logs to a human-readable format.
a9e74aee34e5e451e2940487fc84fcd51ac0c986e96b1681ec9218bf74a94829
XnView version 1.98 proof of concept denial of service exploit.
fa100ee8b79f5fb0993035b6b1c6a7e65a6470c5a1875b1e5858ec2c67f26a4c
Debian Linux Security Advisory 2265-1 - Mark Martinec discovered that Perl incorrectly clears the tainted flag on values returned by case conversion functions such as "lc". This may expose preexisting vulnerabilities in applications which use these functions while processing untrusted input. No such applications are known at this stage. Such applications will cease to work when this security update is applied because taint checks are designed to prevent such unsafe use of untrusted input data.
936acc717b39671752c0a06f022af819d1b92f44ab2bdd841c8a9d8727d438ab
WordPress WPtouch plugin version 1.9.27 suffers from a URL redirection vulnerability.
f8562a4052d763ce8f06be98cb6f666931c4d1ca5979a972efdf6d7356ddd647
Netclues Script suffers from a remote SQL injection vulnerability.
7466898a8173b4a6fb7bde676af273b9ffb156a034decea427209d212c0f256a
RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later.
c9123786bc1be1a714c59e2fabae693d434698ce4d3fc44847cb847bff26b686
WiRouter KeyRec is a powerful and platform independent piece of software that recovers the default WPA passphrases of the supported router's models (Telecom Italia Alice AGPF, Fastweb Pirelli, Fastweb Tesley).
36f93ac3a131f953870015412cb9611a98d9181131b667fa35f04db3fa5d501c
This Metasploit module allows remote attackers to place arbitrary files on a users file system by abusing the "DownloadImageFileURL" method in the Black Ice BIImgFrm.ocx ActiveX Control (BIImgFrm.ocx 12.0.0.0).
865b5dfcca02d2a6aa7a695fab5ecd9bed1fd762899a653cfbd3f158ed37c831
Black Ice Fax Voice SDK version 12.6 remote code execution exploit.
b74e8d9fa16afc7c5be868647ea87134dbc15594a5e17358904cc7728f7d2012
Sites design and developed by Websitesforless suffer from a remote SQL injection vulnerability.
704b2ff619fb0ca688b25b26b38ee4879707069293e87386769068946eea8a6c
KievShina Designs suffers from a remote SQL injection vulnerability.
25451833c3581be1ba00d7a08b2a6337c53b0df11201d10314d6f5a2b6323977
It seems that sites owned by Time Warner all seem to suffer from the same remote SQL injection vulnerability.
7d0cd865ece7e4f89ead8ca54d236b8177481b0c9e9babfeb8374961805c5119
EssentialSoft Sales Force Automation Systems suffers from a remote SQL injection vulnerability that allows for authentication bypass.
27ce6d8c26ec03e95b0df00e1d7092bc44217f3c5d9e27a494d26594ab3df74b
The Joomla Calc Builder component suffers from a remote blind SQL injection vulnerability.
894b0658c7f47e2e0258edefacac3c85c72658fc65534900d84d5918400e728e
The Joomla Team component suffers from a remote SQL injection vulnerability.
914183e3951f0fedf6fcb1806827dc1c07637e171430a35ef07b1aa13e43d6d0
Burning Board version 3.1.5 suffers from a path disclosure vulnerability.
b07ba24f9d56896f63bb3b4f677c0fd0102785b950e543532d00b446dbdeaa15
This Metasploit module finds saved login credentials for the SmartFTP FTP client for windows.
97b107bd7fae0d3b8837548d34dcb302caadedc2441c45782f6a0584dc945b8b
This Metasploit module exploits a vulnerability found in DATAC Control International RealWin SCADA Server 2.1 and below. By supplying a specially crafted On_FC_BINFILE_FCS_*FILE packet via port 910, RealWin will try to create a file (which would be saved to C:\Program Files\DATAC\Real Win\RW-version\filename) by first copying the user-supplied filename with a inline memcpy routine without proper bounds checking, which results a stack-based buffer overflow, allowing arbitrary remote code execution. Tested version: 2.0 (Build 6.1.8.10).
03bf98284439d992c47fe1e2bec66c01c8f4a83ae33e20afd12558dba1c061a7
Secunia Security Advisory - A vulnerability has been reported in Sunway pNetPower, which can be exploited by malicious people to compromise a vulnerable system.
0838e7e8bedb338bf1b2ba787f72b9d2d27099e1f3e1cb7bfec7f1de06a81796
Secunia Security Advisory - SUSE has issued an update for SUSE Manager. This fixes a weakness and a vulnerability, which can be exploited by malicious people to conduct spoofing and cross-site request forgery attacks.
0ac7a0d548db8471f68498e5655195b4aba26dc2a4489cd420e495888e5228ff
Secunia Security Advisory - 5up3rh3i has discovered a vulnerability in the Firebug extension for Mozilla Firefox, which can be exploited by malicious people to compromise a user's system.
3330cf8efee150fa3cfe7b62b90002d2c3c279a5037bcf24a86608cf7e2135b6
Secunia Security Advisory - SUSE has issued an update for unixODBC. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library.
8078fc631d4c913dc1027dd985ad823a768ec355ebc2a840d31811edab65a251
Secunia Security Advisory - A vulnerability has been reported in the vBExperience module for vBulletin, which can be exploited by malicious people to conduct cross-site scripting attacks.
a7611a2483ddcfcbd19f5211af2cdc12a05437bcaaf735d11e0a8c4fdf48d986