Corel Linux dosemu config error. Local root compromise.
81ad1e0d833b1891556039a50544c4df1f8a580b3985a0e111e72d5f334fb2f2
Corel xconf utils local root (among others) vulnerability.
f6cddf04b692fdedb8346c87a2db5002b0d59c1869dffcfc1a4715f491adcfcf
SuSE Security Advisory - A security hole was discovered in htdig 3.14 and below. SuSE security site here.
67510eb1f47d7625e5bfc697884b66426c38c14f9221f6bc197370fee1f64ff6
Patch for linux kernel 2.2.14 to discard packets that many OS detection tools use to query the TCP/IP stack. Includes logging of the dropped query packets.
3064b0f88b98d44e4dbb74c8ac4a4dd4bf0509beb0614128b81561fcc53f9600
FreeBSD Security Advisory - There is a security hole in the htsearch cgi-bin program for versions of htdig prior to 3.1.5, which allows remote users to read any file on the local system that is accessible to the user ID running htsearch.
8430ae118e415cfb666f01a0ab93488717e4692293630520a1c0eb7551d96892
SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.
22c30f6e4ee0e50307223dba75106cf14b4fffe045928e4f55e23ff9e7225e26
Guardian watches the output from Snort, a lightweight intrustion detection system, and uses ipchains to deny any further packets from the attacker to get to the system.
92e72671e02c14ca90abea7fc575ddd598aec47c8d5fbcab105f2ec247dacd52
Shell script which scans for vulnerable pop-2 daemons.
5da342e49db9e135e3de5d38e18ac6aab928d6fcab5eaa672e8d0fdf0314ee0c
Snort2HTML v1.0 converts Snort Intrusion Detection System logs into nicely-formatted HTML.
e1d5c2092078ed1a0ebcf8e4a85982de1b18b2287501ab048ee45a0e47200e0f
Snort is a libpcap-based packet sniffer/logger which can be used as a lightweight network intrusion detection system. It features rules based logging and can perform content searching/matching in addition to being used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, and much more. Snort has a real-time alerting capabilty, with alerts being sent to syslog,a seperate "alert" file, or as WinPopup messages via Samba's smbclient.
deb50b6ec436be7b09681b55f0ebf8b7a4ba5a01eb08f20728c384ad9b9ba96c
Infosec Security Vulnerability Report - Bypassing authentication on Axis StorPoint CD. By modifying an URL, outsiders can access administrator URLs without entering username and password, allowing unauthorized access.
a9d7c189d04d0c389c6bcf2a550c2260c1361e22b171c946fe4e997ba0df1b8a
Htdig 3.1.4 search engine allows any file on the system to be read via CGI binary htsearch. Exploit information included.
1eecacdd74cf1f2d6d72a6122781d4380abec3bf059830728e3f5f5d2e059c08
Linux x86 man exploit - exploits the stack overflow in man (PAGER env var) yielding egid man. Tested on Redhat 6.2.
dad3bcbb22280ca155e875ba6739d1374edf3d73ce8562e9098dc336d6d26704
diemirc.c - mIRC 5.7 denial of service exploits. This program listens on port 6667 for incoming connections,
3a32e42f793cd084c6d8723291c12ae93c5134c3073701ad9c2863384e00fa7d
S.A.F.E.R. Security Bulletin 000229.EXP.1.3 - Buffer Overflow in Netscape Enterprise Server. Netscape Enterprise Server is a web server with long history of security problems. We have tested version 3.6 SP2 on Windows NT 4.0 Server edition, and found it to be vulnerable to a buffer overflow. Remote execution of code is possible.
d053aee89b0c0a4dcc75a3dbfdd74f0302c8844a94db145a8258559dc6a98329
CERT Quarterly Attack Summary - Currently being actively exploited on the internet are remote BIND vulnerabilities, Vixie Cron, WU-FTPD 2.5, RPC services and Malicious HTML Tags Embedded in Client Web Requests.
2846747e784cc97960ceec77e3c5fe98744cecc282ed7e9d1a59da63411d86aa
Packet Storm new exploits for February, 2000.
24408761a75586dc9b8a0d6043fa8ba8c42ce1143d750dd982d13c37ad1428f6
Etherape is an etherman clone which displays network activity graphically. Active hosts are shown as circles of varying size, and traffic among them is shown as lines of varying width. It is GNOME and pcap based.
1a9b1c03884d0c19cdffe025dbb029e494777970846daf18b283463397d993dd
/sbin/dump on Linux is vulnerable to a local buffer overflow attack. Patch included.
70030d318162971da001a74c6ed300e763603b26a92fc3f781f8b5bac7a5d77b