Red Hat Security Advisory RHSA-2001:007-03 - Several security problems have been found in the bind 8.2.2 series - Upgrade to 8.23! Official ISC Bind security document here.
b90668b65b8d69987023eab5f6a619fb41798252be294d436ee538efb74a81f1
FreeBSD Security Advisory FreeBSD-SA-01:13 - Sort(1), a program to sort text, can be caused to stop working by local users if they guess the next tempfile name it will attempt to use. This failure mode could be used to hide the reporting of malicious activity which would otherwise be detected by a management script.
f27123c1c0d7f9965ffff38440fd54b4765fb3f9ce14c6f3405e7df2e5c553d0
FreeBSD Security Advisory FreeBSD-SA-01:12 - Periodic, a program to run periodic system functions, uses tempfiles insecurely. This allows a malicious local user to cause arbitrary files on the system to be corrupted. In a default state, periodic is normally called by cron for daily, weekly, and monthly maintenance. Because these scripts run as root, an attacker may potentially corrupt any file on the system.
cb1de316c63cb25e3c459dc1c739fa6f0a501909fda822bda9a9102eb8664fe2
Tunnel.pl tunnels IRC connections over SSH.
5e02d92d2f78463c5953db94bd23fd126cb10b22b24ec16a7485a866edaab724
A shell for Mircforce.
193646b8c238a03013c261aa4704ac9dbfcc2d5d5d9749407c40e940d66fcf8e
Debian Security Advisory DSA-026-1 - BIND 8 suffered from several buffer overflows which affect Debian distributions. It is possible to construct an inverse query that allows the stack to be read remotely exposing environment variables.
edc3a701bb6e3fb3d949b6d62366c9e6cb09f54bc5ff555a59a9039b7daddee0
CERT Advisory CA-2001-02 - Multiple Vulnerabilities in BIND. Remote bugs have been found in v4.9.x prior to v4.9.8 and v8.2.x prior to v8.2.3 which allow remote attackers to run code as root.
1bdea8eb7f341f28ca1b262aeb53a6023cec0fb45299e0f94f11faeca3235226
The Analogx simpleserver v1.08 contains the time honored \con\con vulnerability.
1ca90637f564026a3e6fba6fc89c5ea16c388bebb4b02bab63aab4ca229652b6
Debian Security Advisory DSA-024-1 - The FreeBSD team has found a bug in the way new crontabs were handled which allowed malicious users to display arbitrary crontab files on the local system. This only affects valid crontab files so can't be used to get access to /etc/shadow or anything.
0333d7714403a655ed674a6dc0f33b98f6beb2d48a04d9dc97440ff8a235063e
Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.
e607da0550e48bdf45904e328db25621b1c6eb816890e7cb34f4189287a83fcb
Debian Security Advisory DSA-023-1 - Inn2 uses insecure tempfiles in several places.
47ebb08be8b414a47f8129763f20f3e4f847d9f55f1cecfbcbb87223c640df2e
Arp-scan is a tool which scans for alive hosts in a subnet with ARP packets. Requires Libnet.
28c562e5cbad1f9489f9d8c114ab0220748ebf9e7eecc5a27b18e60e628a663c
Sw-mitm v0.2 is a 'Man in the Middle' tool for level2 switches which can redirect traffic between two hosts on a LAN.
5ca7ef503342401d5e8a70ea5935208b29a868d841419f931f716a1bbbbecc21
The Progress Database Server v8.x and 9.x for Unix has several locally exploitable buffer overflows which can allow arbitrary code to run as root. Proof of concept exploit attached.
a635658fc0bc7d92809e5bd3b82d802d3fc6657301cb85549dad95844ff23350