ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).
919c584e8cf7e217bed6fc92527281158522d03d1ed476dd6a46a05b549749a6
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well.
bb7ae637b3f8c9792d7d6155b32a34303bdefbd40282aef4f6fb87501fe55814
popa3d is a POP3 daemon which attempts to be extremely secure, reliable, RFC compliant, and fast (in that order).
21aed6059bb3afce22f24c4cf1efc71a5df22e412807384da7bb0672b191e8eb
Scanlogd is a TCP port scan detection tool originally designed to illustrate various attacks an IDS developer has to deal with, for a here.
4a2621037270f88576c8770261c53761edc875984f126872c880c2a98a8f63fa
A vulnerability exists in Microsoft Excel which can be exploited to run a code of attacker's choice on user's PC. Sufficient data validation is not performed when parsing "Named Range" definitions in the document file, which makes it possible to produce a negative 32-bit value that is later used as a length parameter for the msvcrt.memmove() function. As a result, a large chunk of memory is copied overwriting critical memory ranges, including the stack space. All tests were performed using Microsoft Excel 2003 (11.6560.6568) on Windows XP and Windows 2000 Pro platforms. It is likely that all MS Excel products are vulnerable.
d3ff03122df3a97151a14bd39966d4c618c8133f2af3261d2fc519f3c40b6a32
Horde versions 3.09 and below suffer from a unauthenticated arbitrary file reading vulnerability.
ffe257bc37850ac77cff8df29d47bc0492aa5b5dc7688941ff6174407ac6118f
ASPPortal version 3.00 is susceptible to more than ten SQL injection vulnerabilities.
877f4a6827b3e4ff00071c0c77ab79d55525602a5dce401b56b3e0aacae42a72
Whitepaper entitled "WLSI - Windows Local Shellcode Injection" that describes a new technique to create 100% reliable local exploits for Microsoft Windows operating systems. The technique uses some Windows design weaknesses that allow low privileged processes to insert data into almost any Windows process regardless of their current privilege level. After a brief introduction and a description of the technique, a couple of samples (Exploits for MS05-012 and MS05-040) are included so the reader will be enabled to write their own exploits.
0edd124aeb55cb3125140eb5cdb86f78449fba1ac22466a4b4325fdf39c92857
Technical Cyber Security Alert TA06-073A - Microsoft has released updates that address critical vulnerabilities in Microsoft Office and Excel. Exploitation of these vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on a vulnerable system.
1ecf1950da060f73d8c84b791e2a2fdb436c6ef300126811c5f2221dda6ff9cc
Fortinet Security Advisory: FSA-2006-09 - Fortinet Security Research Team (FSRT) has discovered a improper stack overflow vulnerability in the Microsoft Excel software. This vulnerability is due to Microsoft Excel's manipulation of opcode 0x0218, when provided with a large Formula Size, it will cause a stack overflow. An remote attacker could construct a .xls file and put it on controlled web site. When the user opens the .xls file with Microsoft Internet Explorer, the browser will call Microsoft Excel to open the .xls file automatically, and this will cause Microsoft Excel to crash. If excel file is specially crafted, it may allow attackers to execute arbitrary code on the affected system.
16c513406c9b8eb2fa4c22dab9875ea3b88c39027021cbaa2f2e053132b54f34
Fortinet Security Advisory: FSA-2006-08 - Fortinet Security Research Team (FSRT) has discovered a improper memory access vulnerability in the Microsoft Excel software. This vulnerability is due to Microsoft Excel's manipulation of opcode 0x001D, when provided with a random Column Index, it will cause a Improper Memory Access. An remote attacker could construct a .xls file and put it on controlled web site. When the user opens the .xls file with Microsoft Internet Explorer, the browser will call Microsoft Excel to open the .xls file automatically, and this will cause Microsoft Excel to crash. If excel file is specially crafted, it may allow attackers to execute arbitrary code on the affected system.
dc9856cf4ccaafabc94f927fb1c3ed7a4f3095e88f27bb0e22a383e59fe370ae
Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft Office, which can be exploited by malicious people to compromise a user's system.
6300c1c3adca03d4a9e89630bb3403bdf04b48dfb5f117a447570c1e4516becc
Secunia Security Advisory - Some vulnerabilities have been reported in Flash Player, which can be exploited by malicious people to compromise a user's system.
2bcc89b5a7598588a7df2b8ee4931dee440f1a3b22010cd5f31318a3debeff6f
Symantec Security Advisory SYMSA-2006-001 - There exists a buffer overflow in Microsoft Word, Excel, PowerPoint, and Outlook in the parsing of the routing slip metadata. The result is that when a user closes a malicious document, arbitrary code can be executed on the host in question.
ea731a97597080437bb7468feb46d673d0c29d6bf906cdf8a42e809c2c07d1db