Local exploit for Linux Mandrake 7.0's wmcdplay 1.0 beta 1. Unlike the Teso exploit for wmcdplay, this code exploits the -position argument.
eed00eb19c97858a9e3a92302523c50bd3259f79d45239243286e9ab1b43681f
Vulnerability: Any user can overwrite any file in the system with x11amp ver .70.
f854507d6d5cef408de353bd42cf556273c973adfc5e305c7058e4a61a099eab
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
2159a30060cec7d5e267b083c2935a46e14e8b1e37d3534565f3efa1ef7b3539
MRTG is a The Multi Router Traffic Grapher (MRTG) is a tool to monitor the traffic load on network-links. MRTG generates HTML pages containing GIF images which provide a LIVE visual representation of this traffic. Check https://www.ee.ethz.ch/stats/mrtg/ for an example. MRTG is based on Perl and C and works under UNIX and Windows NT. MRTG is being successfully used on many sites around the net.
04f52e0390bd6cc108991b7624c21faa480891f43b97c671a973436de3a5f26b
FreeBSD Security Advisory FreeBSD-SA-00:13 - generic-nqs v3.50.7 and earlier from the ports connection contains a local root compromise.
ef2592b6ee1f85613b4697dc9647ef182edb76c9b0b50c536c2611807caf36cc
ide_expl.mrc is an ircii-4-4 exploit ported to mirc5.7, works reverse to ircii-4.4.c. You send the chat request instead of having them chat you, attempts to execute /bin/sh.
07bb96538921b3cdfee62b6c246d8843f69f27f4c4ae7b182d900f7f81eee2fb
VTun is the easiest way to create Virtual Tunnels over TCP/IP networks with traffic shaping, compression, and encryption. It is a user space implementation and doesn't need modification of any kernel parts. VTun supports IP, PPP, SLIP, Ethernet, and other tunnel types. VTun is easily and highly configurable; it can be used for various network tasks like VPN, Mobil IP, Shaped Internet access, Ethernet tunnel, IP address saving, etc.
9969309539ca09ea798ec04ecef5921b64b47129c9f14258c0084b0131ca997d
sersniff is a program for tunnelling/sniffing for between 2 serial ports, written to help aid with the decoding of the protocol for the Nokia 9000i Communicator. It also has support for TCP connections.
7adb899fac13a9a2cbf14b0ab190cbb4945e712b35717a2822a31c8e67372857
lincity-svga local buffer overflow.
0e992f611058e6475b476b93e2fd3551b88d4998ced583ba5f74cac10c7f8afa
Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 330 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them.
8354df17a4303145db8268d78cb122bd7bcea882785e20967e3b97731f5c5ac8
lprm-bsd.c - Exploit for lprm local root vulnerability in OpenBSD and FreeBSD-stable.
5064c9b186987b843722ade89337e97adf457061ef2df4def5af44727cbd370f
ISC BIND 4.9.7-T1B local exploit - The named daemon will dump the named database to /var/tmp/named_dump.db when it receives a SIGINT signal. It does not check for symbolic links while doing so and can be made to overwrite any file in the system.
7fa0d1d6006035097d0506453bbfab039ef2cfd3493040c536282fb994572502
imap_core.sh is a quick proof of concept tool that causes some imapd implementations to dump core. Unfortunately the core file contains the password and shadow password file in it!
5e97f6397d4e546bc641fcd0059100b35a6649499f07bf90d15bf975d7a592ee
Linux kernel 2.2.14 local DoS - When accessing a file or directory with a very long path the process hangs in an unkillable state. All other processes are SEGFAULTing when trying to access unkillable process' /proc entry. So system utilities ps, w, top, killall and the like are stoppping working. Except that, the system continues to function normally. The only solution is reboot.
fed62f7bfada74221cc3839183f0cc7c51740bb3db917b76f9a033646deaf593
bedie is a beos (5.0/4.5) local dos exploit which exploits a kernel bug. ASM source and binary included.
ae01773b2e23dc02ef439825f66b171c3495bc5f91bd0bf5201e831e687897d9
BizDB is a web databse integration product using perl CGI scripts. One of the scripts, bizdb-search.cgi, has an unchecked open() call and can therefore be made to execute commands at the privilege level of the webserver. Remote exploit included.
0231145f36e7ae2640f0dc97b6b4306c0261fc240d851610ac7e3925a5697f20
farpce.pl - Force ARP Cache Entries. Force ARP Cache Entries Perl Script was designed to help System/Network administrators to prevent ARP Cache Poisoning / ARP spoofing. It's a simple and powerful perl script, based on forcehwaddr by John Goerzen.
901b59be0ff785bba17c8553b59e3c1d7e22c94ccfcbf9bb9750261bd81ae958
BufferOverflow Advisory #2 - The NetOp Remote Control for NT tool allows anyone with a client to connect to the host software and download any file. Version 6 is vulnerable.
c8aecbf2235c9cb21ac221f98f56af1a9457a30fea67a017427f132b915b270a
Evaluating the Security of a NT System Part II - In depth information on NT security. Includes discussion of Groups and User rights, The Administrator Account and Administrators Group, The Guest Account and Everyone Group, Files Folders Permissions and Shares, Virus and Trojan Horse Controls, Auditing and Event Logs, and backup.
a3ba4426df164c8f53bb9b8b31d38d2bce9306adea7f9f2dd16ec49f84f8514d
nmap-web v1.3 is a quick-n-dirty Web interface to nmap. It's some simple Perl/CGI script(s) you install on your web server which allows you to submit nmap commands (and receive the responses) through a web interface.
8918bb87e8f342903d9bd37862343f0a882a573253e9d8d4c55f8a00cde77959
CRYPTO-GRAM April 15, 2000. In this issue: AES News, The French Banking Card Hack, Counterpane -- Featured Research, Counterpane Internet Security News, The Doghouse: Cyber Security Information Act, Microsoft Active Setup "Backdoor", The Uniform Computer Information Transactions Act (UCITA), and Comments from Readers.
1ecdc6ce3a58a7f087fe74065e4831f41987d3282b128d31159013cf3cd45bde