ADM named 8.2/8.2.1 NXT remote overflow exploit. Includes shellcode for linux x86, Solaris/Sparc, and NetBSD (with and without chroot). Slightly broken to discourage script kiddies.
e34031f3f343e58dd2155719b49f877be36a74f1455787d8c32c17baeacace25
Xipdump is a protocol analyzer and tester. It's a kind of graphical tcpdump(8) which adds the possibility of changing packet values and resending them. The graphical representation of a packet is intended to offer a complete, customizable view at a glance.
3f069aa05dbaed1efeba5015624838fc33cce790e16957b350c4182c74bd10a1
When patches/fixes are applied to binaries on UnixWare 7, the original, unpatched binary files (with the suid/sgid bits maintained) are stored in /var/sadm. By default, the permissions on this directory is 755. This allows normal users to execute and exploit old binaries leftover from patching.
ddcc3aea580eae13df34903d75ef698ba2a71c314c68aee75fb50df4903aaa5d
FormHandler.cgi uses hard coded physical path names for templates so it is possible to read any file on the system.
982f352a5e509b2e9e1fc85b0d6714be542e0e546c96f5882dc578ee003c3f13
A bug in the processing of NXT records allows attackers remote access to DNS servers at the priveledge level that the DNS server runs at. All versions of Bind below 8.2.2 patchlevel 3 are vulnerable. Updated with a little more detailed information about the bug and the handling of NXT records. Advisory from isc here.
0f62614994f9e3c303188367fb4933c80f550e5e69a744404d32c72ec099ca7d
XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. More than 100 display modes are included in this package.
adbe820a7007830ceb7292460bf3ce59a79efc33f6a25d450bbd287742ed2843
Patch Available for "Active Setup Control" Vulnerability. This vulnerability allows anyone to email you code to be executed and disguise it as a safe type of attachment. The malicious code will execute when you open the attachment.
dba60650f122a47119f9cd469b81b592b33cac0c45b12015986d938e5b17d604
There is a buffer overflow in NetCPlus' SmartServer3 POP3 server which can allow a remote attacker to execute arbitrary code on the machine. Affected are windows 95/98/NT machines running NetCPlus' SmartServer3 program with the POP3 server started. The version tested was 3.51.1.
33c1d77e009be8792bfdf0e14f137ed0d95f798035b257ffb85809fe276c7cff
ISS Security Advisory: Multiple Root Compromise Vulnerabilities in Oracle Application Server for Solaris. An account on the target system is required to exploit these vulnerabilities. Oracle Application Server prior to release 4.0.8 is affected by these vulnerabilities.
efb4afb5de23974d9b3bcdbaf09f000d1e0757705e82f4e88a4061c72070a989
nstreams is a program that analyzes the networks streams occuring on a network and prints them in a human readable form. This is useful when you want to set up a firewall but do not know your needs/the needs of your customers. nstreams can read tcpdump output files or directly listen on a given interface, and may even produce ipchains (Linux) or ipfw (BSD) firewall rules instead of printing the streams, letting you build your firewall automagically.
7085cf4f5e9be9ca948d4fa228b324010b012953df4b43b539bf90bf9eaa8bed