Delphis Consulting Plc Security Team Advisory DST2K0040 - QuotaAdvisor 4.1 by WQuinn For Windows NT allows users to list all the files contained on a file system which is on a server with QuotaAdvisor running on it.
207715a553367fd86d35fea578da89546850f009eafcc211cb4a0381746ecbed
Cisco Advisory - The Cisco Secure PIX firewall feature "mailguard," which limits SMTP commands to a specified minimum set of commands, can be bypassed. This vulnerability can be exploited to bypass SMTP command filtering. All users of Cisco Secure PIX Firewalls with software versions up to and including 4.4(5), 5.0(3), 5.1(2) and 5.2(1) that provide access to SMTP Mail services are at risk. The IOS Firewall featureset is not affected by either of the above defects.
3fd96653c343f5d7653e249d522f740519cd8396a9f30cc652f351a0e895f840
Red Hat Security Advisory - Esound, the Gnome sound server, contains a race condition that a malicious local user could exploit to change permissions of any file owned by the esound user.
dc3741c53587458d108b978210709adeb4a0a1947fc36f55751c5dcf9c691919
Red Hat Security Advisory - A local root exploit and several additional bugs in traceroute have been corrected.
050464648835c6ab3948e1832fe926ca7a2bfaec3308b25b331289ae9e3c2f53
Fwsa.sh is a tool to penetration test Checkpoint Firewall-1 remotely which implements the recently published holes in session authentication. It attempts to recover user passwords, execute dos attacks, and brute force the firewall managment password.
15cc194a3f036e1dad933df40241526b6339084858b3fcaa488cf404942dcee7
HERT Advisory #3 - The way FreeBSD handles random sequence number incrementing is weak. With 3 consecutive random increments captured from the responses of 4 SYN packets sent to the target, an attacker can rebuild the random state of the remote machine, and predict the next sequence number. Includes proof of concept code.
4fdde88e38ec9b6ff465d28188c0d4ae5779697d0340aa76bb684473eced5ca5
Napalm Magazine issue #7 - In this issue: Security Holes in LPPlus, Using IPSEC and Samba to integrate Windows Networks, Resource protection mechanisms, Music Reviews, URL's, and the CISSP Certification part two.
f4199d505786da7b406f7eb66a92bbd7d873f5e0de3986592b15c012af3e1376
The Defense Worx Network Intrusion Detection System is a linux based IDS which performs high-speed traffic analysis of a network packet to detect unauthorized traffic in real-time. Includes a Java based consile to display alerts.
8c8c0dc8c0ecb2d7b168c0b9689384b31c0528488993d812d6a741ea2a889048
FreeBSD Security Advisory FreeBSD-SA-00:52 - FreeBSD has a predictable initial sequence number and is vulnerable to a TCP sequence number prediction attack. Programs which rely solely on IP address authentication such as rsh/rlogin and lpr are potentially exploitable.
109102cf876ef28915ebd1497ee8eb6bfb6a0ceedc7637fcfc39f58e3d962f95
Godmessage 3 (Revision 4) is an Active X trojan which automatically uploads a binary to unpatched IE browsers by simply viewing HTML code. Tested against IE 5.0, 5.01, and 5.5 on Windows NT, 2000, and 98. WARNING: Viewing this HTML very well may break your computer if you run Windows!
a7e16b7e8a4025e6d430b19893b0e47492278ae88ad47135008aef0feeeb93cd
IP-Generator version two creates the long lists of IP addresses which are fed into todays security tools. Features the ability to create randomized lists, host resolving, and multithreading.
2582d2648bb7ee404415b64d0a5ce935eba7ed2fd2e7b15c1560509f0513b9ab