Security Corporation Security Advisory [SCSA-015]: PowerFTP has a denial of service vulnerability that allows a remote attackers to crash the server by executing a specific command with a buffer of 1994 or 1995 bytes in length or more.
bfa6c30c5f95e7b646e02d2837ad2d58e2390287f03a9c314437e68e033edfa9
The 3Com 812 ADSL router will expose an internal computer's ports to an external computer once a connection between the two is established. Although 3Com denotes this as a feature, it inadvertently will leave a victim open to attack for up to 2 minutes.
a2090b18c0a9dfa47daaecc15e140a765d5af83ff73bec3f09c43087386c7f59
Digital Defense Inc. Security Advisory DDI-1012 - A malformed request used against HP Instant TopTools versions below 5.55 can cause a denial of service against a host by having it constantly it request itself.
7627cee904465d331ce5d25d50952fed0120096c80e38c11d338158b858a94ff
Security Corporation Security Advisory [SCSA-014]: EZ Server, which provides both HTTP and FTP services, has a denial of service vulnerability in the FTP server that allows a remote attackers to crash the server by executing a specific command with a buffer of 1994 or 1995 bytes in length or more.
79ea3b12b542e2eec2c723cd80d79e96bfa2538c08b7faa857cbdb2bf877fd47
There is a vulnerability in Sendmail versions 8.12.8 and prior. The address parser performs insufficient bounds checking in certain conditions due to a char to int conversion, making it possible for an attacker to take control of the application. This problem is not related to the recent ISS vulnerability announcement.
e56c207e41ff83acb9da15ebf18f6f1fbeb72d0a5ba1c4f489470c49b23fc690
0x333crypt is a tool for linux which encrypts files with md5 and xor.
f26f5a9e714c612abf4060c34e20cf2c6546e6ce583af38d665f5b71626353ee
0x333crypt is a tool for FreeBSD which encrypts files with md5 and xor.
4d8eedb49b20c48428ba6a689f7ed94dd30444a3074103207cfe4da123d442f8
0x333hpl.c compares pids in /proc with ps aux output.
d369beb106b3a6ea47350ebd43ea968f579778ad25d46ee20e18ae1a05875333
iDEFENSE Security Advisory 03.31.03 - An exploitable buffer overflow has been found in Apple Computer's QuickTime Player v5.x and 6.0 which allows the remote execution of arbitrary code via long quicktime:// URL's or the -u command line switch. Any remote attacker can compromise a target system if he or she can convince a user to load a specially crafted exploit URL. Upon successful exploitation, arbitrary code can be executed under the privileges of the user who launched QuickTime.
63b4e5946d2c0800bdcb621548d55499d68e76124dd328d5ff058b472234203b
NSFOCUS Security Advisory SA2003-03 - A local heap overflow was found in Sun Solaris's CDE manager dtsession which allows local users to execute code as root by setting a long HOME environment variable. Solaris 2.6, 2.7, 2.8, and 2.9 is affected.
d906f6000cf9a6b6bcee5345838232d36117025f3b2186a0a45ac2f0045dbe5a
NSFOCUS Security Advisory SA2003-02 - Sun Solaris LPQ has a stack overflow which allows local users to execute code as root. Solaris 2.5.1, 2.6, and 2.7 on SPARC and x86 is affected.
9ae4c0aec7caa3fc454b9ce6300d39ef37e423e1197c93fd5b339ab5be319e9e
FreeBSD Security Advisory FreeBSD-SA-03:07 - A second remotely exploitable overflow was found in Sendmail header parsing. Upgrade to 8.12.9 to fix the vulnerability. Patch available here.
2020462d2c424be84d00d47dab2a8fee098fe1f39416fb76eb439652f8902a06
OpenSSL-uzi is a semi-automatic mass rooter which uses the openssl-too-open exploit against multiple hosts.
c4db574327d2f1321e4c513c1cfb48c989b9d277b4b1761749396a56543638f6
Rs_iis_xpl.pl is a remote exploit for rs_iis.c, a remote IIS exploit. Sets up a web server, and if rs_iis.c is used to attempt an exploit, a shell will be spawned on the attacking host. Tested against FreeBSD 4.7-RELEASE-p7.
53a1d6f18d614b512a0d0c1ca5a75101a70147c7534c005448527d40e2891a82
Lsof is an extremely powerful unix diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system. It easily pinpoints which process is using each network connection / open port. FAQ available here.
9782550d36fc7da6095734928676a2f581254dc7d79a72ae300ec569a6a6ab4c
CERT Advisory CA-2003-12 - A remote stack overflow in Sendmail 8.12.8 and below was discovered by Michal Zalewski which allows remote code execution as root. This bug is in the prescan code and is different than the recent sendmail bug described in CA-2003-07. Patch available here.
3d21a9619dd79160009046d99d48567be339543825a6a4ca7d4af3174e7a1a0c
Sendmail is a very popular unix Mail Transfer Agent, a program that moves mail from one machine to another.
c5cc51a78fdcc0f09cd21188af6187e32d31ef877baf23e4d88b3e32156b9b3a