annuaire netref version 4.2 is susceptible to a remote command execution flaw.
e5bbb9d2b62449c51f0599f113e3cd34afe9beab0a052bd9eef867c2f7d76b01
Vulnerabilities in rlpr version 2.x include a format string error and boundary error in the msg() function that can lead to remote arbitrary code execution.
909257fe013334eb749954d5e33494289bf97fdbac67301020845d045a82f68b
Debian Security Advisory DSA 521-1 - A format string vulnerability has been discovered in sup, a set of programs to synchronize collections of files across a number of machines, whereby a remote attacker could potentially cause arbitrary code to be executed with the privileges of the supfilesrv process.
c97c96287dc17e80c241ce806844485d5301d9292c2078a15e158a669306eb14
Gemitel versions 3.5 and below allow for malicious file inclusion in its affich.php script. This vulnerability allows an attacker to forcibly execute arbitrary scripts from remote resources on the server.
483f0f3f00299f5b8710d0ee6366376e76b18b0d54ae99b5df2b8b47f8dac39d
Mass domain name resolver that takes a file full of IP addresses as input.
1e7ebd83d4d2836ad207b8a6a69f7c1349b1863e7d37f837079afbcd63fb7cc9
iDEFENSE Security Advisory 09.30.200 - WN Server v1.18.2 through 2.0.0 are susceptible to remote exploitation of a buffer overflow that an attacker could cause arbitrary code execution under the privileges of the targeted server by issuing WN Server a long GET request. In order to successfully exploit this vulnerability, customized shell code is required to bypass the character filtering that WN Server imposes on the requested URI. Fix available here.
8772acabc5a220150fee7559f9a705826f25db74d9483f93096f2f63ce078d3e
iDEFENSE Security Advisory 09.16.2002 - The FreeBSD ports asmon, ascpu, bubblemon, wmmon, and wmnet2 can be locally manipulated to take advantage of open file descriptors /dev/mem and /dev/kmem to gain root privileges on a target host. These five programs are installed setgid kmem by default. Exploit information included.
7e94c4f007a31e6fd200b33983f4a6d729c2a8d77e98c69c2ccededfca5bc453
Nmap freak patch for FreeBSD 4.4 - Prevents OS fingerprinting, NULL scan, FIN scan, Xmas scan, Connect scan, and Stealth scan.
828f2070c9d8ae7cff691c13f071e967a44f0cd9f2304f977e178197a2a22cc0
This is a kernel patch to prevent stealth, fin, and rst scans. Also slows down the tcp connect scan. Tested on debian potato running 2.4.16. Tested with nmap and queso - Changes OS fingerprint.
34dc5fef83c2a347dc0f9e61a28b304f44dd7ead8a44a36b2bf875b32880c4a0