BitchX dos exploit - joins a channel with %s in the name, and invites target nick.
454c258db3817f6310a5b53eef7dcb95058960cff7c6b95c5c1b94c2b3b38f0e
Secure BitchX - Patches and instructions which allow you to run BitchX in a chrooted environment.
32ff28b7d431ce94eb1c3848887b9989495b40566b22a017b01c222e880561b8
Narrow Security Scanner 2000 (unix / perl) searches for 540 remote vulnerabilities. Updated frequently for the newest vulnerabilities. Tested on Redhat, FreeBSD, and OpenBSD, Slackware, and SuSE.
2e968f6ead89fb781fbb3e5a5a7a1244f9245940518fb8f4e3a6f5afaa8e53c5
Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 330 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them.
5dff0bb140d17bfbeb0a40f4a94324810e1494585b8a00cb94e6a6a2f23c0095
Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins.
999e3273856fb4e005f4240706718af9c516c2852f29baf05e938b5cb6d63791
motion uses a video4linux device as a motion detector. It will make snapshots of the movement it sees, making it usable as an observation or security system. It can send out email, SMS messages, or invoke an external command when detecting motion.
099c118e412f48386af1a185831146fed5aea9bf9d004b56dc7f73a28a43f0d9
FreeBSD-SA-00:32 - The bitchx client incorrectly parses string-formatting operators included as part of channel invitation messages sent by remote IRC users. This can cause the local client to crash, and may possibly present the ability to execute arbitrary code as the local user.
e7981774cffd17fc53074acbfb424642e5071b74f399e53d90d11f29736a246f
FreeBSD-SA-00:30 - OpenSSH UseLogin directive permits remote root access. OpenSSH has a configuration option, not enabled by default ("UseLogin") which fails to drop privileges when it executes commands, meaning that remote users without root access can execute commands on the local system as root.
cb82b177655948ab3564d4e7aec566508e4686e4196abfb36f05bd8ab77f7c7d
FreeBSD-SA-00:28 - Majordomo is not safe to run on multi-user machines.
d6c024647b5da1bc20ff1d6711780141bfc6dbff7a1dab4b3c31e88768ea05c1
FreeBSD-SA-00:27 - XFree86 4.0 contains a local root vulnerability in the XFree86 server binary, due to incorrect bounds checking of command-line arguments. The server binary is setuid root, in contrast to previous versions which had a small setuid wrapper which performed (among other things) argument sanitizing.
59a4505dfbaf3da8b36c51a1a3d230d3e4eed4e5b3cc4ad6e30ba5d98b30573f
FreeBSD-SA-00:24 - libedit incorrectly reads an ".editrc" file in the current directory if it exists, in order to specify configurable program behaviour. However it does not check for ownership of the file, so an attacker can cause a libedit application to execute arbitrary key rebindings and exercise terminal capabilities by creating an .editrc file in a directory from which another user executes a libedit binary (e.g. root running ftp(1) from /tmp). This can be used to fool the user into unknowingly executing program commands which may compromise system security. For example, ftp(1) includes the ability to escape to a shell and execute a command, which can be done under libedit control.
cccd003b6e1f91c431307ed76b55bc71a35b0a2ac22b441ba48fb52895eb0b7a