Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.
64dade5f69626c9a40b0bef33636014bc6dfe2cf79dc2c8d8f19a52d4409b6ca
Network Weathermap version 0.97a suffers from a persistent cross site scripting vulnerability.
9a671f005f7a3dff3254c803710370f5bcb545dfafa7a6e10e2984207f901161
Ruby Gem ldoce version 0.0.2 suffers from a command execution vulnerability.
e0a0c481b47cda56119e30048f9a0ff4309520aaeab8de2c5a98a5ae1b099cd8
WordPress FuneralPress version 1.1.6 suffers from a stored cross site scripting vulnerability.
5853b8990594bb643bf640d93b7628969ecd9e6229bc5b39fab083a5a3f511d0
Aspen version 0.8 suffers from a directory traversal vulnerability.
edad4d3501ef0b65f5acc83e69509b77165fd3e908011c928cf93cdb59380234
HP Security Bulletin HPSBUX02860 SSRT101146 - Potential security vulnerabilities have been identified with HP-UX Apache running Tomcat Servlet Engine. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS) or to perform an access restriction bypass, unauthorized modification, and other vulnerabilities. Revision 1 of this advisory.
3a2ec4c66b8a63342dc058e636fe5628f6ab4c3fd27f829156c41caf8a44c2d1
224 bytes small Linux/x86 command download and execute shellcode.
b2ab122f0b624df2a06e2a514763a338a1196329e54bf5d63bb09d88b6e87f48
This archive contains all of the 164 exploits added to Packet Storm in March, 2013.
cc9b59131cd6d24c186284b4f01e36d1751f2d3a101e4330d56f247f9c0fca94
Pollen CMS versions 0.6 and below suffer from a file disclosure vulnerability.
739d1fe0380adfd67ff26dc437e14b677aede4417d6c91df9ccc83bd5a31ad86
TinyWeb version 1.93 remote denial of service exploit.
242e36e9ce450ee2d014a6cc29e51d1b091945a978d90246115388bd0ba9453a