Apple has issued an updated version of Mac OS X, which fixes many unspecified vulnerabilities. An unspecified error reportedly exists within the NFS logging functionality when tracing system calls. Another unspecified error reportedly exists within LoginWindow when handling directory services lookups and console log files. Yet still another unspecified error exists within Packaging during package installation. Not to mention another unspecified error exists within the TCP/IP stack implementation when handling out-of-sequence TCP packets. Two more unspecified errors exist within AppleFileServer when using SSH and reporting errors and within Terminal when handling URLs.
7a043a061f9b9080e31cb3e101ae7ebe
OpenBSD has issued an update for xdm. This fixes a security issue, which potentially may allow malicious users to gain unintended access to a system. A CVS version of XFree86 xdm, which is included in some versions of OpenBSD, has an error that causes it to listen for queries on a random TCP socket, even though requestPort is set to 0 in the configuration file.
14b9c747284af8f4286f2b266ebb0c4a
Debian Security Advisory DSA 510-1 - jaguar discovered a format string vulnerability in jftpgw, an FTP proxy program, whereby a remote user could potentially cause arbitrary code to be executed with the privileges of the jftpgw server process, which runs as user nobody by default.
abeaaf252e7640c0ef709f46ea2e206f
Debian Security Advisory DSA 509-1 - Steve Kemp discovered a vulnerability in xatitv, one of the programs in the gatos package. If an administrator removes the default configuration file, a local attacker can escalate to root privileges.
8e513db87dd560ae68c5ed832e87a45f
e107 version 0.615 is vulnerable to full path disclosure, cross site scripting, remote file inclusion, and multiple SQL injection attacks.
97ae0e46335f1d8621318b47bb8ed913
A cross site scripting vulnerability exist in the BBcodes of the LDU forum.
924907310ffd3709f6b835eadee11418
Mollensoft Hyperion FTP Server version 3.6 is vulnerable to a buffer overflow attack via the CD command.
ed4a30926065c28a2f1212c3b73cff46
JPortal is susceptible to SQL injection attacks and also stores the administrator password in the clear.
5d99778db6af0ad83abc1d85e30297a1
rrs is a reverse (connecting) remote shell. Instead of listening for incoming connections it will connect out to a listener (rrs in listen mode). The listener will accept the connection and receive a shell from the remote host. rrs features full pseudo-tty support, full OpenSSL support (high encryption, client/server authentication, choice of cipher suites), Twofish encryption, a simple XOR cipher, plain-text (unencrypted) session, peer-side session monitoring (snooping), daemon option and reconnection features. rrs is Free Software distributed under the MIT License and is known to compile and run under Linux, FreeBSD, NetBSD, OpenBSD and QNX.
b400d03c0e39e3e78a7327ba78f789f0
FLoP is utility designed to gather alerts with a payload from distributed Snort sensors at a central server, and to store them in a database. Both PostgreSQL and MySQL are currently supported. High priority alerts may be sent out via e-mail.
cc5a7a0a07131d462b94458ca4521724
Georgi Guninski has discovered a vulnerability in mod_ssl versions below 2.8.17, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Successful exploitation requires that the FakeBasicAuth option is enabled and that the malicious client certificate is issued from a trusted CA (Certificate Authority).
09b467d0d9a367dc251aaae6316a88c5
EncFS is an encrypted pass-through filesystem which runs in userspace on Linux (using the FUSE kernel module). Similar in design to CFS and other pass-through filesystems, all data is encrypted and stored in the underlying filesystem. Unlike loopback filesystems, there is no predetermined or pre-allocated filesystem size.
bedebf7cdad8cf13d9ef3cc43c9e1315
Simple UK GSM mobile network mail-bombing utility.
2988cedfc72b0096fb96ce76632b4484
nbtstat.pl is a simple Perl script that provides the basic functionality of the nbtstat utility that is available on Windows. It grabs the NetBIOS name table from a remote machine. This is a Perl port of eSDee's nbtstat.c (http://www.netric.org/tools.htm), written with portability in mind. It only requires Perl and the IO::Socket module.
bbc3d133ee4907d3d09f837fa2c6fd87
WifiScanner is an analyzer and detector of 802.11b stations and access points which can listen alternatively on all the 14 channels, write packet information in real time, search access points and associated client stations, and can generate a graphic of the architecture using GraphViz. All network traffic may be saved in the libpcap format for post analysis. It works under Linux with a PrismII card and with the linux-wlan driver.
63a39a85debef9289877284b3f1a09d7
tacshell is a drop-in replacement for sdshell, the functionality used with RSA's ACE/Server. It uses the TACACS+ protocol for authentication.
6cad05a93aa3f56cafd8b6d4eb48684a
Tutorial written by Covert Systems Research. It defines several of the common types of vulnerabilities together with their counterpart command line exploit sequences. The descriptions of these types of vulnerabilities range from stack to heap, function pointer and format string weaknesses. This whitepaper has been developed to help those seeking to improve their exploitation skills while also aiming to give the reader the knowledge for a more surgical aspect to manipulating vulnerable programs.
62a60a7f34fd8873be12ee4a1a5b2d43
NGSSoftware Insight Security Research Advisory #NISR27052004 - It is possible to cause a number of buffer overruns within the WildTangent WTHoster and Web Driver modules via any method that takes a filename as a parameter. Version 4.0 tested and others are possibly affected.
f074d3174ebc046ce09221657b72178a
Sun-Java-App-Server PE version 8.0 suffers from a path disclosure vulnerability when returning server error 500 pages.
a1340be73e5fa96fb10be66e55cb2789
Technical Cyber Security Alert TA04-147A - A heap overflow vulnerability in the Concurrent Versions System (CVS) could allow a remote attacker to execute arbitrary code on a vulnerable system. Systems affected: Concurrent Versions System (CVS) versions prior to 1.11.16. CVS Features versions prior to 1.12.8.
2e0d84d03979a45b15c596936a0fa348
Use Of TCP/IP Reserved Port Zero Causes Integrated Lights-Out (iLO) To Stop Responding. LAN management products that use port zero when accessing an Integrated Lights-Out (iLO) in a ProLiant server will cause iLO to become unresponsive. Port zero is specified as a reserved port by the Internet Engineering Task Force (IETF) and should not be used.
b5714e865abdbd6b17af261216dbb94c
MiniShare HTTP server version 1.3.2 is susceptible to a denial of service attack due to mismanagement of requests. If a HEAD or GET request is sent with only one line following it, the server will crash.
b9408a34ff51863488b63616ccf25e42
F-Secure Security Bulletin FSC-2004-1 - Certain malformed LHA archives cause a buffer overflow when scanning them for viruses. The error typically causes a restart of one of the modules in the product. This leads to performance degradation and makes denial of service attacks possible. Product lines affected: F-Secure Internet Security 2004, F-Secure Anti-Virus 2004, Solutions based on F-Secure Personal Express 4.6x and 4.7x.
853fa2a7a72dbfb7afae1b4645b4c8ee
Small whitepaper on nop usage and a random nop generation utility is included.
ce269a5e12c111aec8aa594b9ce1cc18
Metamail remote exploit that makes use of a buffer overflow and upon successful exploitation, binds a listening socket to UDP/13330 awaiting shellcode. Affected versions: 2.2 through 2.7.
c25cca5f2ea199cb78714642d720a041