Digit-Labs Security Advisory DLA-25-06-2002 - Microsoft Internet Information Server 5.0 Administration Web Site redirect proof of concept exploit.
e40dcfcc6dabff8f35bea63000df3a5800f306c939003f143fe14a75edeb7bc2
Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.
b0a88b449253c7c50702f211df80b74c34cf121804e38f475ff70a2f9b099870
Miscutils is a set of commands useful to the program and/or system administrator. Current included programs are: acct, confstr, getrlimit, pathconf, sysconf, crypt, gettimeofday, readlink and stat.
4eff31112372b52527653fa098e18db1ad246feacd7cf1644768431690f142f6
Logdump is a set of commands that dump the contents of the standard Unix log files: utmp, wtmp, utmpx, wtmpx, lastlog & acct. With logdump you may discover zapped/patched log entries; something you cannot do with who(1) and last(1).
75a475c87285aaee6e2424c3f56753ce23e75a8dcc4d13f2eba8a2683b0e5b2b
The Examiner is a tool to analyze foreign binary executables. The goal of is to be able to get output similar to strace without executing the binary in question. Uses the objdump command to disassemble and comment binaries. This tool was designed for forensic purposes but could be used for basic reverse-engineering goals as well.
535c72a78282386f1909287a9812a255bac983a1a3e4e05c9e270bd9eee4ff47
Argosoft Mail Server v1.8.1.5 Plus/Pro Webmail reverse directory traversal exploit which allows an attacker to retrieve any file on the disk readable by the mail server. The freeware edition of Argosoft Mail Server is not vulnerable. Fix available here.
dbf5946533d5cfe25aafbdf397ec1795b580feaef652930b1102653a65a17aa0
Linux Security Auditing Tool (LSAT) is a post install security auditing tool. It is modular in design, so new features can be added quickly. It checks inetd entries and looks for unneeded RPM packages. It is being expanded to work with Linux distributions other than Red Hat, and checks for kernel versions.
df6c5da01311f6ce04a77020915f17d478370abd4a2d4a104b376602caf28e26
NetBIOS Enumeration Utility v3.0 is a utility for Windows which can be used to enumerate NetBIOS information from one host or a range of hosts. The information that is enumerated includes the account lockout threshold, local groups and users, global groups and users, shares, and more. This utility will also perform password checking with the use of a dictionary file. Runs on Windows NT 4.0/2000/XP.
de8ff8ab4c95ae4c131c913d85312898cf8c8c45d8907c6d1c0f34c00d86f22d
NGSSoftware Security Advisory - Microsoft's Commerce Server 2000 and 2002 contains several remotely exploitable buffer overruns in the Profile Service and a CGI executable that allows the execution of arbitrary commands.
5f49c7b4916d833e0dce23ac8eb20f45b61dfa9a25d2ab7df12e6438d85ed78c
SunPCi II v2.3 comes with a modified VNC which allows an attacker to discover the password if he can sniff the traffic between client and server. Decoding program tested on Linux and Solaris.
83f20fd636916e33e4f70baf6cf2af906377f38df67863364a556367ebab2ae2