TinyCA is a simple GUI written in Perl-Gtk to manage a small certification authority. It works as a frontend to OpenSSL. TinyCA lets you manage x509 certificates. It is possible to export data in PEM or DER format for use with servers, as PKCS#12 for use with clients, or as S/MIME certificates for use with email programs. It is also possible to import your own PKCS#10 requests and generate certificates from them. It also lets you create and manage SubCAs for more complex setups. The most important certificate extensions can be configured with the graphical frontend. English and German translations are included.
aca855bc53d210f304a1bb7dd90d8fe366a6fd688baf0872863db0c58ca534fa
Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function. Secure Programming HOWTO here.
c156cf959f7a9c4c10625b1c8ef1ea7336369ee5ba5b1d6bdaeddd1e59a9a630
Placid is a Web-based frontend for Snort that uses MySQL. It supports searching, sorting, and graphing of events, and was designed for speed and to have little overhead.
ba5053c0fa657843dd5104e29603b9ac0dc972aad91e0e15001b112f0afe169b
chroot_safe is a alternative method for chrooting dynamically linked applications in a sane and safe manner. By using a little dynamic linking trick it delays the chrooting until after dynamic linking has completed, thereby eliminating the need to have a copy of the binary or libraries within the chroot. This greatly simplifies the process of chrooting an application, as you often do not need any files besides the data files within the chroot. In addition to chrooting the application, it also drops root privileges before allowing the application to start.
5de888e571c5635d7d75d7754c7bc8a68bcdac7207e4c743ecf483d9b9f9d29f
Os-sim attempts to unify network monitoring, security, correlation, and qualification in one single tool. It combines Snort, Acid, MRTG, NTOP, OpenNMS, nmap, nessus, and rrdtool to provide the user with full control over every aspect of networking or security. Supported platform is Linux.
3a9f53bc3b378143385b9f1317e870b86fd4aeef7922e1fe8daa5337341fcf8b
Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.
eff8a17827f7279f76bf0de8071b5e12453146448f2f5d13bd5abba2efe3501d
Ettercap NG is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.
b61e02cc9b34c664f2ce4bd3d0c3d0b4145da68b116d4186c8bb3d1d0c088f8b
The Linux Intrusion Detection System (LIDS) is a patch which enhances the kernel's security by implementing a reference monitor and Mandatory Access Control (MAC). When it is in effect, chosen file access, all system/network administration operations, any capability use, raw device, memory, and I/O access can be made impossible even for root. You can define which programs may access specific files. It uses and extends the system capabilities bounding set to control the whole system and adds some network and filesystem security features to the kernel to enhance the security. You can finely tune the security protections online, hide sensitive processes, receive security alerts through the network, and more.
6219db56dc49271afaeca6845cd6ef97ecd224e25daafcc1aebfbd0f5e82157c
NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.
ec22081a3b33d0c0ba1c9b4ebf1a18401d10af0a21cdd974855e1fcf83f5df30
The Linux 2.4.x kernel series comes with an i2c driver that has an integer overflow vulnerability during the allocation of memory.
6b9ab2a22bb370c236040f89eaeb9f52f07672f8bd3c635617f0c7a744113500
Sec-Tec Advisory - A cross site scripting vulnerability has been discovered in Snitz Forums 2000. Version 3.4.04 is affected.
31132f81367c14099db702f0cb6004506d7d9ff136c06cfee09ba284f6f9350c
eEye Security Advisory - eEye Digital Security has discovered a security vulnerability in IBM's signed acpRunner activex. Because this application is signed, it might be presented to users on the web for execution in the name of IBM. If users trust IBM, they will run this, and their systems will be compromised. This activex was designed by IBM to be used for an automated support solution for their PC's. An unknown number of systems already have this activex on their systems. Version affected is 1.2.5.0.
2b6bac2ea94d90530ba2aaba9296ae3ea83b7a8958d58406bb05f94b3b8ed1b6
Bit of information regarding the first cellular phone virus called Cabir being discovered.
f499582f9768509624e7e2807446cc2f20c715e4838acbdfd4a9543d0af0e053
Cisco Security Advisory: A Cisco device running IOS and enabled for the Border Gateway Protocol (BGP) is vulnerable to a Denial of Service (DOS) attack from a malformed BGP packet.
8ad9d928a214abb79d3802e20c67945f0a379565202873d2901d5d5b4e715e0c
Checkpoint Firewall-1 version 4.1 and later with IPsec VPN enabled will return an IKE Vendor ID payload when it receives an IKE packet with a specific Vendor ID payload. The Vendor ID payload that is returned identifies the system as Checkpoint Firewall-1 and also determines the Firewall-1 version and service-pack or feature-pack revision number. This is an information leakage issue which can be used to fingerprint the Firewall-1 system.
440208d725a4ec5c0d16e26260994618621b0231f531a80db7b7c381d24b4f4f
Symantec Enterprise Firewall dnsd proxy, versions 8 and later, is vulnerable to cache poisoning attacks when acting as a caching nameserver. Full proof of concept exploit included.
cb84018e4595e260c546cc412ec384eecb358019a95b682a3b76aa4857dc9956
Web Wiz Forums version 7.8 is susceptible to a cross site scripting attack.
fb95299c719e87d28e1135b8c3aef3ab5dcb36a4e9f359d4685af5c1f35642cd
A vulnerability has been discovered in Microsoft Internet Explorer that allows for attackers to bypass security zones and conduct phishing attacks.
7cc58b71bd55da16b1839c6169f86a2111c4f4cf84b990d63e22fcc73532f941
SGI Security Advisory 20040601-01-P - Adam Gowdiak from the Poznan Supercomputing and Networking Center has reported that under certain conditions non privileged users can use the syssgi system call SGI_IOPROBE to read and write kernel memory which can be used to obtain root user privileges. Patches have been released for this and other issues. At this time, IRIX versions 6.5.20 to 6.5.24 are considered susceptible.
c311575509d77e140256db203b3431dabc5c01cfb4dd8d1e624c66a52ee8d789
It seems that some Antivirus scanners are subject to a denial of service attack when attempting do a manual scan of compressed files. Some versions affected are: Norton Antivirus 2002, Norton Antivirus 2003, Mcafee VirusScan 6, Network Associates (McAfee) VirusScan Enterprise 7.1, Windows Xp default ZIP manager.
a90bb7f3417157fb4fb000c829c5adf3731995143dd6ab1b3ab4682d4aaa3950
VICE Security Advisory VSA-2004-1 - VICE versions 1.6 through 1.14 on all platforms are vulnerable to a format string vulnerability in the handling of the monitor memory dump command.
51874a9d9c5210599a173e589857775ad51874245713cf5292ebac779544b9a7
VP-ASP Shopping Cart version 5.x is remote susceptible to cross site scripting and SQL injection attacks.
db8830218c1a550f3a985dfb8800743c8e466a48417e32a30fe90ed3bf11b96a
Linksys Web Camera version 2.10 is vulnerable to a cross-site scripting vulnerability.
c27793f628af5044cf44444ff2b34cec8904f329d169f5ab86c847bc7edef77e
A vulnerability within Chora version 1.2.1 and below allows remote shell command injection.
a41aa4d39af2f221d39ccc9dc16ac042c25b39642f4b0f038fe3a4a1f40a2cfd
A very simple bug in the Linux kernel allows a small program to cause a denial of service. This flaw affects both the 2.4.2x and 2.6.x kernels on the x86 architecture.
4401c12e6329f60078d093537d2085227726b4bd70f20f9a1556884d34432d5d