Debian Security Advisory - Mailman v2.0 came with a security problem which was introduced during the 2.0 beta cycle, that could be exploited by clever local users to gain group mailman permission.
30dee8f152b4a9edc9ecffccae34190e23d99ca769cff09e817c35de1deb7e32
TFAK v4.0 is a client for 22 remote access trojans, and removes 366 remote access trojans and 9 file joiners. This is the first and only trojan scanner which is able to find new, unknown trojans. Archive password is set to p4ssw0rd. Use at your own risk.
c4cf5ea10bda3bc85be557ea6706b52951e9899a4178028a4d1356505dd83f14
CORE SDI Security Advisory - NAI Net Tools PKI Server vulnerabilities. While investigating the exploitability of a buffer overflow in the Net Tools PKI Server from Network Associates Inc. we discovered three new vulnerabilities not fixed by hotfix 1, including buffer overflows and format bugs which allow remote attackers to execute arbitrary code. Perl proof of concept exploit included.
851d469fd06907ffafd8c19e1da95cdb05443f7df3e7b6b1b7fd894c41df184f
Modified tcp wrappers which bypass restrictions in hosts.deny and hosts.allow.
05c0c8153b0e120ee03f52bb7bc050264f99ebbc282ddb934160919b4d86f9b5
Netstat.sh is a shell script which compiles a C wrapper around /bin/netstat which hides a class B address space.
be7e62c57675bbf54932540dbc6671af52053285795f4448bb3113e4b4eac597