rdist-bsd.c is a /usr/bin/rdist local exploit for freebsd.
3c39ee0b6efc6bfe91006e554d30a0bbd9c36dc3d95f708823389f5965f0fa06
ypghost is a remote NIS exploit that spoofs UDP packets. Uses libpcap.
bb87cfbb877aa971c1b35751bd4906f5ec29a359da65516c007562b506662dab
sunkill.c - Remote solaris 2.5.1 dos exploit. Opens a telnet connection on the victim machine and sends a few bad telnet negotiation options, then flooods the port with lots of ^D characters, using all available kernel memory.
8fe99b8546ca54ea717e39b38445c9396fcd270d2358ac63e6f901fe719dcd3d
hupux.sh hp-ux 09.04 local exploit - Takes advantage of default world writable /usr/local/bin.
ff4ceda14a87f72936c2cccf417ed823558617ad5fcbae45178ab2582ae2440b
USSR Advisory #38 - Remote DoS attack in Real Networks Real Server. The Ussr Labs team has recently discovered a memory problem in the RealServer 7 Server. By sending specially-malformed information to port 7070 the proccess containg the service will die.
767c71c7cc59bbd6cb2d7075cf31625110e4ad3bfc58b5529615f609cce8ae9c
Microsoft Security Bulletin (MS00-028) - Procedure Available to Eliminate "Server-Side Image Map Components" Vulnerability. The FrontPage 97 and 98 Server Extensions include two components, Htimage.exe and Imagemap.exe, both contain unchecked buffers that could be used to run arbitrary code. Although part of the Server Extensions, these components also install as part of several other web server products. Microsoft FAQ on this issue here.
2e69640f35ba3d473e24e33b8187613991fb8153ebd7058644650e4f8fd410c7
This is the securestackpatch by Openwall, ported for linux 2.3.99-pre5. There are no fancy configuration options, when you use this patch, next time you compile your kernel, the stack will be secure.
8de998b9481496276ed791afea42b3403f6d88559543d5466f115c7de6cca436
The whois_raw.cgi perl script included in all freeware versions of the cdomain package allows remote attacker to view/retrieve any system files, such as /etc/passwd, and to execute commands. Exploit included, which drops a shell, unlike previous whois_raw.cgi exploits.
cdcb04dcc8c8d833822d837b47e293b61db57cc6668962ea1ef6d1dbedf1b93b
5n0r7 is a snort alert file parser. It sorts the alerts based on source IP, destination IP, and frequency. 5n0r7 allows one to detect attacks (portscans, probes, or whatever snort is configured to alert) right away when displaying the sorted alert file.
8240c85f178c2a1cfd3e3c461cbfd3b6abb913e599def9d6fb3fbea47c507074
The libsafe library protects a process against the exploitation of buffer overflow vulnerabilities in process stacks. Libsafe works with any existing pre-compiled executable and can be used transparently, even on a system-wide basis. It works by putting a wrapper around dangerous functions that contain any buffer overflows within the current stack frame, so that the return address can not be changed.
ee61077d6a19cf6eb8c1238898602c3fe30e9322a56f7517f6a94a9cbd633ca2
Microsoft Security Bulletin (MS00-026) - Microsoft has released a patch for the "Mixed Object Access" vulnerability in Microsoft Windows 2000 that allows a malicious user to change information in the Active Directory that he should not be able to change. Microsoft FAQ on this issue here.
cef9d563d47988b76b7ae7637c221867eda142af7bd294ae1f501e1b7ac67813
Microsoft Security Bulletin (MS00-027) - Microsoft has released a patch for a security vulnerability in Microsoft Windows NT and Windows 2000. The vulnerability allows malicious users to take some or all of the memory on an affected server unavailable, slowing or potentially stopping an affected server. Microsoft FAQ on this issue here.
d39f9b182282d3ab7453d5ada94fcb2c6dc8d91e3269ac866d3379d5ecb41346