radmind is a suite of Unix command-line tools and a server designed to remotely administer the file systems of multiple Unix machines. Radmind operates as a tripwire which is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change.
6b593dea6977f832910bfa6511c8c52762e74503a1edd6c4e71466afa52c7dfc
afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.
ccf388983b47fc1f8e85226a1d1f4d1b44f41a5bfdc7587b72148fcb0777f171
iDefense Security Advisory 05.23.07 - Remote exploitation of a stack-based buffer overflow in Opera Software ASA's Opera Web browser could allow an attacker to execute arbitrary code on the affected host. Opera 9.2 supports BitTorrent downloads. If a server sends the browser a specially crafted BitTorrent header, it can lead to a buffer overflow. The buffer overflow is triggered when the user right clicks on the item in the download pane. iDefense has confirmed the existence of this vulnerability in the Opera version 9.2 for Windows. Previous versions may also be affected.
27c3e133fe921c6258e20a9c2bd7db28f04bad4933ae646b769e8a46bc06e3e4
FreeBSD Security Advisory - An attacker who can cause file to be run on a maliciously constructed input can cause file to crash. It may be possible for such an attacker to execute arbitrary code with the privileges of the user running file. The above also applies to any other applications using the libmagic library.
8e2a86c43663ab976f1486f288aeb153a35b6755fa7c13f24c4527aa1cd9f14d
Secunia Research has discovered a vulnerability in various eScan products, which may be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in the MicroWorld Agent service (MWAGENT.EXE) when decrypting received commands. This can be exploited to cause a stack-based buffer overflow via an overly long command sent to the service (default port 2222/tcp). Successful exploitation may allow execution of arbitrary code with SYSTEM privileges. eScan version 9.0.715.1 is affected.
84fcea0897dbcc7747ab1ab311052fadef29a9ac5675225bdb6fefbc7edd8d6e
2z project version 0.9.5 is susceptible to SQL injection attacks.
8c1f0ad31e3bed991d06a6fc23cf198ac14ce4d6f9c1dae5aed59b395f0ed348
An input validation vulnerability exists in the Cisco CallManager version 4.1 and possibly in earlier versions as well.
e8ec52bed7f7a15a6801ff5345ef0d8dcd9b16a7993afa2f2e9359f96d9661e7
Simple Skype password cracker written in Perl.
2cd132cbd745bc4cf6895908ce3042740fe1ac6c1a9ec1575fb664736f5b3bfc