3com 3CDaemon FTP unauthorized USER remote buffer overflow exploit that can bind a shell or reverse a shell back to a listener.
58939b294c832619405a1eb0bebba42133ec3b0586bf8f742328b1ae9c4d4e5e
Gentoo Linux Security Advisory GLSA 200502-25 - Squid contains a bug in the handling of certain DNS responses resulting in a Denial of Service. Versions below 2.5.8 are affected.
b98b37f0bc842cb16b69c781d43b4c8a1c06f43e9ca0eb2bdcf60ce8c951ad5a
Secunia Research Advisory - Secunia Research has discovered a vulnerability in Yahoo! Messenger, which can be exploited by malicious, local users to gain escalated privileges.
70022251c5a4349b15f90c19fe4600995fd54d38726d166a4046f8dd8ce8a7b1
Secunia Research Advisory - Secunia Research has discovered a vulnerability in Yahoo! Messenger, which can be exploited by malicious people to trick users into executing malicious files.
513774c469defad1cd93cfb1ccb109ae36b76b727993df1dca8cea05c194fcad
Secunia Security Advisory - Two weaknesses have been reported in Gaim, which can be exploited by malicious people to cause a DoS (Denial of Service).
b4b81621ad1a4e02e7887ba95ce2f8fbb00b4879e9442df2f3913dcd39d1b326
PeerFTP_5 local password disclosure exploit.
ed6e0326af2e04189dfd6304235c310e95b55318ff0e5abd1ec1cfac75fada26
Remote root exploit for Arkeia 5.3.x that makes use of a stack overflow when handling a Type 77 request. Windows version.
c87ca544ecc8e52849a9af4f848af8f646fd4bb2d65382dd0a67f3094ffcb9df
Remote root exploit for Arkeia 5.3.x that makes use of a stack overflow when handling a Type 77 request. Mac OSX version.
d21ccc911364b09e8c8f2ba7e8eb3bb0fab59aef75b1f2f28efff90f1f22e152
Proof of concept exploit for the Nullsoft SHOUTcast 1.9.4 File Request format string vulnerability.
f2d37d4e739ae49f7956859a9f8d89d5377574ab9943abe4818667d424cb0b7a
Thomson TCW690 POST password validation exploit. Tested with hardware version 2.1 and software version ST42.03.0a.
ed3b936e00dc4d12d3ae961a5fcf1dbcb4894b956f10ac7e366266cd2107e22b
Local exploit for VisualBoyAdvanced 1.x.x that is not normally setuid by default.
d7ad5d10ae68304f60fa8c23e1079b962f6c7588e14d261ff18c554610bcac6c
Savant Web Server version 3.1 remote buffer overflow exploit with French Windows support.
89050effe3dcbd193a8864b77cdcb028ed19a86e32efeeaa53483bd62f985f61
Proof of concept local exploit for typespeed.
6a6ff914f615eabfeff936e3dba4a9c79fa047ad7e78ef33797ad864bf5c9f3b
Local exploit for a2ps. Proof of concept and not setuid by default.
c0630b367b578e43ba17fda620061c3c67dd8919affa1ca08dcf6cc81e4243f2
Brute force utility for Cisco password authentication.
04878f9fcd2bba9a6a3be629e0e71407e6f2270b6bfdf8eb88077703d5592a2e
glftpd versions 1.26 to 2.00 suffer from directory traversal and information disclosure vulnerabilities.
110718097e5a28b9268a6032bf6f96515d6bdfd15d196ff2016190c1161b2bf3
Invision Power Boards 1.3.1 FINAL is susceptible to cross site scripting attacks.
b37cc241459613996ea38c595661f73a298bf77201e087fa514548c754502cd0
Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.
6562f374bb4320f0d58eed75a8bffb9139db8ef97bb941f041f7b91aa8cd191c
iptables is the new packet alteration framework (firewall utility) for Linux 2.4. It is an enhancement on ipchains, and is used to control packet filtering, Network Address Translation (masquerading, port forwarding, transparent proxying), and special effects.
0aa1e7a60e05bac9fb27fda8c52979cbbaa4e3aef6463983935d83691bd9fba9
afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.
e3f09a9a0399e01cdefafa2890c3035f00fe36e3496a0dcdbd5c67782f10de82
radmind is a suite of Unix command-line tools and a server designed to remotely administer the file systems of multiple Unix machines. Radmind operates as a tripwire which is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change.
8cac95a3387474cd63da145291faa6517cbac1cda4d4961534a5a62f46a68ecc
BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a Web frontend to query and analyze the alerts coming from a Snort IDS.
ce6ebc5e75d69be73eaad1a544ad66ac2349127303622e8199b3a2d7b246f196
Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.
94986cfc9badef2e717524d1ec87e2870d2195d5abab0a4b3298b776d489cf2e
Adobe Reader is susceptible to a denial of service when the count value of a root page is set to a negative digit.
e425f612d9d694c26bdb66bdae05b00cd4ab166c5cc01a78de8ba4e9593863fb
Gentoo Linux Security Advisory GLSA 200502-24 - Midnight Commander contains several format string errors, buffer overflows and one buffer underflow leading to execution of arbitrary code. Versions below 4.6.0-r13 are affected.
b8dfa45cd13112d037062d121f1fa7b2a9ed98b0da56b0870ccf826c70d1c9c1