Lpr lpr-0.50-4 and below contains vulnerabilities which allow local users to access other accounts, and sometimes root.
6ab9815eb4979f4f020da0a0b9a0978875d632bc2a0951630c7aef34b390f59a
Red Hat Security Advisory - A problem has been found in GnuPG versions (up to and including 1.0.3). Due to this problem, GnuPG may report files which have been signed with multiple keys (one or more of which may be incorrect) to be valid even if one of the signatures is invalid.
1ab144da652cc58ee50c74503e5ec6b62d5b5b1ed4bfec784c0eee283a2b6ac6
VLAD the Scanner - A freeware, open-source scanner that checks for the common security problems referenced in the SANS Top Ten list of common security problems. While freeware scanners are not neccessarily unique, VLAD is rather unique because of the amount of vulnerable CGI programs it checks for, and its comprehensive account/password checks (seven different protocols).
608aeb171c612c89e6d76b4bfe6c22989376748948513936c24b05ad401469b8
Check ps is a simple program that runs ps and compares it with its own list. It currently requires /proc but other scanning methods can be implemented. The program will run in the background or one-shot mode. Check-ps has grown rather to better resist increasingly sophisticated attacks, generate more useful reports, and implement more detection methods.
4637b14d6d2c1c46530c81a8b0005e0aea5fc61f51a174b202d2a364a383b485
Shoki is a collection of IDS tools, scripts, and so forth. All the bits together can collect data from sensors, schlep it to a central location for storage, run signature-based and statistical analysis on the data, and load the data into a SQL database. Shoki provides a framework for a distributed system for network traffic analysis among untrusted peers.
904a9c47b41b202a970ca5edc2f7a3fd52e937e4c3bf798ede5865ec6fce332f
Exiscan is an email virus scanner which works together with the Exim MTA and McAffee's uvscan or Trend Micro's vscan. It is written in Perl and is designed to be as subtle and lightweight as possible. The special thing about exiscan is that is does not resend messages after scanning them, so that the process is fully transparent to the MTA and requires only minimal reconfiguration of Exim.
90ae5efdbf9efad590af21f4901221b32fe7fe785a8110385ec8d7db96be86ab
Linux /usr/games/zarch v.92 local root buffer overflow exploit.
d420c219019c22b1db498fbe394d018774d0fc7f953b8a9a311f957a40202d37
GnuPG is a complete and free replacement for PGP. Because it does not use IDEA it can be used without any restrictions. GnuPG is a RFC2440 (OpenPGP) compliant application. Features RSA support.
2e9f7c2ef3a2ceafbcdf6191ed14fb029f9e97a3562af51f38c217a7ed5ab4cc
The SYN cookie firewall implements syn cookie syn flood protection on all hosts behind it. Contains a patch to Linux kernel 2.2.17 and an administration tool.
c192488f6c7329d60f1d1abec4ccbb6318beca885dc66b9f6839e6439bf761f4
Oracle 8.1.5 local buffer overflow exploit for Linux.
d10cd01d2e252d4560cf80fd8e8ad2a8ab0de947c5c91cad0cda66125a53492f
Pdump is a sniffer written in perl which dumps, greps, monitors, creates, and modifies traffic on a network. It combines features from tcpdump, tcpkill, ngrep, tcptrace, dsniff (and its webspy and urlsnarf), pfilt, macof, and xpy. It is able to do passive operating system detection/fingerprinting and can also watch packet streams and then create it's own spoofed packets to hijack or kill TCP connections. It understands tcpdump-like and perl-like syntax and allows easy modifications via a plug-in system. The packet display is easily configurable. Readme available here.
8e24b0b378bb2fcb4299404c9d926b4fd10bad9457d9ca28daeca49a647ca5d9
decoyblues.pl is a denial of service attack against active firewalls. Works by basically creating a lot of decoys with nmap. Router/firewall will try to block all the (decoyed) IP numbers, eventually running out of access list/packetfilters, and possibly crashing, or overwriting access lists.
cad12139ba8649d84be98349cfaf7e9026766bcf1b08660fe6c02a0942410501
Webevent v3.3.3 (webevent.pl) is an online calendar which contains a remote cgi vulnerability which allows administrative access.
5496ce9dcc8d0910d984fc7e479e1a67727682f51767ceae31adf5e834118d53
The Cum Security Toolkit v1.2 is a cgi/port scanner which checks for over 350 vulnerable CGI scripts and can implement 5 different Anti-IDS tactics. Features support for vhosts, wait times, fake X-forwarded-for: headers, and much more.
65d4e38e08388580ad5f6d1883da40bb1b4454eebda1f187608b30d654e4f7ce
Linux space plumber (/usr/games/splumber) local buffer overflow exploit.
807d031351ea5f76324fc2b5994894828847822ca1112cab19cbaff5f38514e9
Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.
1c29425efe9e0bdb06cdb00ee62355819ba967b90ab3d62401cc502c445a63f1
Unicde.pl exploits vulnerable IIS servers which allow remote command execition, as described in iis-unicode.txt.
ab15a086254fb78c36eb6996bbda2ad646248d11ed4dc609531b7f3030a47b81
iisscan.pl scans for vulnerable IIS servers which allow remote command execition, as described in iis-unicode.txt.
093aeb644066b0be68548ece511a815a0694daf0c35c00b210047c28f7e2ebb3