ZyXEL Prestige 650HW-31 and 650R-11 DSL Router denial of service exploit.
e8cc8aa0e77ce2a4cff14c8233b83829173b4599367ed8e83e217ece1585d09a
Port Scan Attack Detector (psad) is a collection of four lightweight daemons written in Perl and C that are designed to work with Linux firewalling code (iptables and ipchains) to detect port scans. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, TCP flags and corresponding nmap options, email alerting, and automatic blocking of offending IP addresses via dynamic configuration of ipchains/iptables firewall rulesets. In addition, for the 2.4.x kernels psad incorporates many of the TCP, UDP, and ICMP signatures included in Snort to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, Xmas) which are easily leveraged against a machine via nmap. Psad also uses packet TTL, IP id, TOS, and TCP window sizes to passively fingerprint the remote operating system from which scans originate. Changelog available here.
6bd217ff69b21745cd5bcc36f1d24b7a8010cfe703e104e69d4bc0d3c274fe13
Ettercap NG is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.
4a688a9835e3537ec6cb0b31c00acec252b02e4a40e0752f151eb1ec2ef5e80b
sudo version 1.6.8p1 has been released to address a security flaw in sudoedit that could give a malicious user read access to file that would normally be unreadable.
efab4b67cba3f43b49749ab3f9feff2c10711daa2901a428c6afc8c3591c8f21
Technical Cyber Security Alert TA04-261A - Several vulnerabilities exist in the Mozilla web browser and derived products, the most serious of which could allow a remote attacker to execute arbitrary code on an affected system.
f7d86e4564591538d33b369f77eeeeec3819b0c8aa29f08f2d427cfa298e4d9d
The Inkra 1504GX router suffers from a denial of service vulnerability.
7d88b0aa59b5c2c116b89d4bd94a13fda2109b7744bf6cfd8791bbd00030e7ce
sbd is a Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32. sbd features AES-128-CBC + HMAC-SHA1 encryption (by Christophe Devine), program execution (-e option), choosing source port, continuous reconnection with delay, and some other nice features. Only TCP/IP communication is supported. Source code and binaries are distributed under the GNU General Public License.
a15ce468e7e04cc12fe2686e0a44e1201d7c67986681d51e255cba9362ab0676
RsyncX version 2.1, the frontend for rsync on OS X, fails to drop a group id of wheel and allows for arbitrary program execution.
7461c1d224257e6868b2e710ecfd89f961714104279359829f4e24b82656f49b
Libnids is a library that provides a functionality of one of NIDS (Network Intrusion Detection System) components, namely E-component. It means that libnids code watches all local network traffic, cooks received datagrams a bit, and provides convenient information on them to analyzing modules of NIDS. So, if you intend to develop a custom NIDS, you do not have to build low-level network code. If you decide to use libnids, and you have got E-component ready - you can focus on implementing other parts of NIDS.
137fe89a3f5ed030632fd95c5d8892b7a5ba53d1ef42b0f36ff2a12ca1435379
A buffer overflow has been discovered in the trap.c syscall() function of the FreeBSD source tree. However, you need to be root to exploit this.
6444178da5ea0a896ca263731a215cc7f808b36e98e12a1934fae459315952df
iDEFENSE Security Advisory 09.16.04 - Remote exploitation of a denial of service vulnerability in Ipswitch Inc.'s WhatsUp Gold versions 8.03 and below allows attackers to cause the application to crash.
c438fb19fce4a7088b6fd32219675ec8c1ce08196af321f87c7fec70aa9b556a
Remote denial of service exploit for Pigeon versions 3.02.0143 and below.
cb65fe199cc4cbac985760de68a05888a15acf6bd8ccf4895e9316d6e9c0b438
A login field longer than 8180 characters sent to the port 3103 causes the immediate freeze of the Pigeon server versions 3.02.0143 and below.
5b895839fa11cad0d1760038031d16051b1c9b2bcb399577776f785a0ffb9460
Snitz Forums 2000 v3.4.04 suffers from an HTTP response splitting vulnerability.
088243d419f091086b2f76b1287fd453be130828c19e0fef6ca6f242e098be54
Gentoo Linux Security Advisory GLSA 200409-19 Several bugs exist in the Heimdal ftp daemon which could allow a remote attacker to gain root privileges. Versions below 0.6.3 are affected.
c6878366d672dd0f0a396d0c602079ad593297bb32821664a5c6c1a6cfc62a58
Westpoint Security Advisory wp-04-0001 - Multiple browsers are susceptible to multiple cookie injection vulnerabilities. Tested: Internet Explorer 6.0 for Windows 2000 with all patches, Konqueror 3.1.4 for SuSE 9.0, Mozilla Firefox 0.9.2 for Windows 2000, Opera 7.51 for Windows 2000.
8fc149376018ed5107866eec1ab39898b97111216c66d313f39856eb9a5ec1d0
Technical Cyber Security Alert TA04-260A - Microsoft's Graphic Device Interface Plus (GDI+) contains a vulnerability in the processing of JPEG images. This vulnerability may allow attackers to remotely execute arbitrary code on the affected system. Exploitation may occur as the result of viewing a malicious web site, reading an HTML-rendered email message, or opening a crafted JPEG image in any vulnerable application. The privileges gained by a remote attacker depend on the software component being attacked.
8c2d2c6aa130bc7ec7423475bd8f9beba3c9252e9dbe9c6644dd0867560479da
Secunia Security Advisory - Multiple vulnerabilities have been reported in Netscape, which can be exploited by malicious people to conduct cross-site scripting attacks, access and modify sensitive information, and compromise a user's system.
da88eda0403bc9a8acc075e424c78e6654f656264d699c2c305e829afa003382
Proof of concept exploit for the recent JPEG buffer overrun vulnerability that crashes any Windows XP system that has not been patched for this flaw.
8235e8220b01d7e3b3bd9bc0d634b7d3fb3d2ba3a9e71573e8a7c873f0e759fa
A file inclusion vulnerability exists in PerlDesk 1.x due to insufficient input validation.
fccfe2c244da7f27d78bf36a7fbd20b1efa2f98e85943f0f5988d3d6b984d995
Debian Security Advisory DSA 548-1 - A heap overflow error in imlib could be abused by an attacker to execute arbitrary code on the vicim's machine.
cc33a1bbf517c1b544721404299dd7e7b47739a2d5e2e278b25eab5c872cb688
Debian Security Advisory DSA 547-1 - SUSE has discovered several buffer overflows in the ImageMagick graphics library. An attacker could create a malicious image or video file in AVI, BMP, or DIB format that could crash the reading process. It might be possible that carefully crafted images could also allow to execute arbitrary code with the capabilities of the invoking process.
31a9e771d7509988bad9d172db9a1f829b1994e282e9d7830a0a15f8e95f0909
UPolyX version 0.3 is a simple polymorphic open-source UPX scrambler. Comes with VC6 source code.
76f803c4a241d2b65788305267750d8bb9e1ae284387570a49288f288b7670e9
ProBoards, based off of the YaBB Forums, is susceptible to a cross site scripting flaw.
325050c2279807d4a71e19dfd79394bff4bf0b671074e60d2825e1d7c4a46a56
iDEFENSE Security Advisory 09.15.04 - Remote exploitation of an input validation error in version 1.2 of GNU radiusd could allow a denial of service. The vulnerability specifically exists within the asn_decode_string() function defined in snmplib/asn1.c. When a very large unsigned number is supplied, it is possible that an integer overflow will occur in the bounds-checking code. The daemon will then attempt to reference unallocated memory, resulting in an access violation that causes the process to terminate.
638df77df40794f8d30fd8c68bc51f5d5c6d7b8da61c8fe14f8e5f634e0a5c51