This utility was written to allow for easy access to the kernelspace for testing insertion of modules, accessing miscellaneous kernel information, and allows for an easy test environment.
0ae55228f8b223d99486909dbdc0b7a27fe7683b4c71e424f7821a4fcc468540
Remote CVS exploit for versions 1.11.15 and below that makes use of the Argumentx error_prog_name double free heap overflow on RedHat 8.0.
1ef0f00bc5dd2efbcfedccbeaf427ca4d38d3c2fcf5a2710c02762f6489148f1
BlackIce Server Protect versions 3.6cno and below from Internet Security Systems installs a firewall ruleset that can be removed or modified by any trusted or local unprivileged user.
f4772cb504ab957ef7193a8d03b9130f45c9592b768c32a0241b609c051209a1
Secure Science Corporation Advisory TSA-051 - T-mobile Wireless and Verizon Northwest are vulnerable to caller-ID authentication spoofing, enabling arbitrary compromise of customer voicemail/message center.
225638f73c5b8d06d7de9f238c2bb0e7a75dbe00089b54e1c244ac3621208021
KDE Security Advisory - The Konqueror webbrowser allows websites to load webpages into a frame of any other frame-based webpage that the user may have open. A malicious website could abuse Konqueror to insert its own frames into the page of an otherwise trusted website. As a result the user may unknowingly send confidential information intended for the trusted website to the malicious website.
b7ff3009fd3623b629ad1c23d4c939e8d8d86da8e264bc838bb07aa33d69cf78
KDE Security Advisory - The Debian project was alerted that KDE's DCOPServer creates temporary files in an insecure manner. Since the temporary files are used for authentication related purposes this can potentially allow a local attacker to compromise the account of any user which runs a KDE application. Affected are version KDE 3.2.x up to KDE 3.2.3 inclusive.
650cf7c1856dd61b02738370add6ac1637635e590a07b095095cc7e81d599a31
KDE Security Advisory - The SUSE security team was alerted that in some cases the integrity of symlinks used by KDE are not ensured and that these symlinks can be pointing to stale locations. This can be abused by a local attacker to create or truncate arbitrary files or to prevent KDE applications from functioning correctly (Denial of Service). All versions of KDE up to KDE 3.2.3 inclusive.
ca4d4d4bce4848177851839010191e887247b3048ad18fc61311b63b0761a215
Aircrack is an 802.11 WEP cracking program that can recover a 40-bit or 104-bit WEP key once enough encrypted packets have been gathered. It implements the standard FMS attack along with some optimizations, thus making the attack much faster compared to other WEP cracking tools.
3e76a6dbae2063a324d6af67e978bdeb03d3290895241944b6db6002a268b4f1
Secunia Security Advisory - Ziv Kamir has reported a vulnerability in Shuttle FTP Suite 3.x, which can be exploited by malicious people to read or place files in arbitrary locations on a vulnerable system.
0dc99ae4e7abaf18c024f687fa448a6d9c7bf66de43c89ec04c7b09560ecf5d4
Clearswift Minesweeper versions 5.0.4 and below suffer from a directory traversal vulnerability.
a94ab822814443c73f9eed979ef7540a7bacc2ead451e62d616ba2683b8a3e6d
An unauthenticated remote attacker can submit various malformed service requests via Bluetooth, triggering a buffer overflow and executing arbitrary code on vulnerable devices using WIDCOMM Bluetooth Connectivity Software. All releases prior to 3.0 are affected.
5ec2b26e117a8391be03708d270e39f990dae23341935158de2640217287f268
Microsoft Outlook Web Access (OWA) for Exchange 5.5 is vulnerable to an HTTP Response Splitting attack.
40c728ecca4485d726b9dc1ed87d1cda4fe98dbe5ad4a766a323e40abecdbb28
Exploit that makes use of the flaw in libpng versions 1.2.5 and below.
d92551c5e38a7d7aa2a60a171034e18c3846a2df2108d858e9a8bde37948e2c4
Secunia Security Advisory - Multiple unspecified vulnerabilities have been reported in IceWarp 1.x through 5.x Web Mail, which can potentially be exploited by malicious people to conduct cross-site scripting and SQL injection attacks, access sensitive information, and manipulate the file system.
86c6387d579030f9a351128ed48bb42d89598447d40d17ff06be88c479550ad5
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.
ae41768b573a93be6ce056d3b984d9ce0a825eefcd6ec16ffbf5342e77677140
Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.
eedb15c911b12bfe5875017c67fd6f2ff7e514833ee6f9eda236fe9e015cd061