Red Hat Security Advisory - Systems using Network Information Service, or NIS, use a daemon called ypbind to request information from a NIS server. This information is then used by the local machine. The logging code in ypbind is vulnerable to a printf string format attack which an attacker could exploit by passing ypbind a carefully crafted request. This attack can successfully lead to local root access.
e2bc8aaefde02362fb2ac9bbc2b600f1dc777f40f304caf14d43b4a03937deae
Red Hat Security Advisory - A bug in some versions of curl would cause it to incorrectly parse error responses from FTP servers. A malicious FTP server could use this bug to crash its client.
6e2391e0dd98aa5ea6b0bdd5a4deb92efc6e3d76dcb3ae579ee35b9362294747
Red Hat Security Advisory - A vulnerability in the mod_rewrite module and vulnerabilities in the virtual hosting facility in versions of Apache prior to 1.3.14 may allow attackers to view files on the server which are meant to be inaccessible. Format string vulnerabilities have been found in PHP versions 3 and 4.
6288e107de691c83bc02de5b7e3bf8d172637322deaeff1feb317db4036c5989
HP/UX crontab local shell script exploit.
8db2472fc166d889f4791e2f620b41fb4436110f5536153e1ce57597db33ec00
whisker v1.40 with native SSL support. Adds a -x option which uses the Net::SSLeay perl module and OpenSSL. Whisker is what I've dubbed a 'next generation' CGI scanner. I've implemented anti-IDS checks into the scan. Includes over 200 checks. Lots of options. Reads in nmap output, files full of domains, or single host. Virtual host support. Proxy support. Can be used as a CGI.
b08da8795124f5cedfed471dc8c6fdce6b7cc819512817bb29e50ed6a5ac34ce
SendIP is a commandline tool to send arbitrary IP packets. It has a large number of command line options to specify the content of every header of a TCP, UDP, ICMP, or raw IP packet. It also allows any data to be added to the packet. Checksums can be calculated automatically, but if you wish to send out wrong checksums, that is supported too.
e6ff7c45faed15d89b54c2a93a9bddf0e81e813e597635cc976461475af89154
fwlogwatch analyzes the ipchains packet filter logfiles and generates text and HTML summaries. Features realtime anomaly response capability and has an interactive report generator.
046ebd4d6ca7d7a8a764f05c9c9bc0e05b10370daebb90f1fc4a4cc3864188ba
How to keep access to a rooted system.
6aea0980f6199821d95be6e02ee15a897c546b8c86715b0601ed199651f116cc
This program exploits a flaw in the share level password authentication of MS windows 95/98/ME in its CIFS protocol to find the password of a given share on one of these machines, as discussed in ms00-072. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected".
84e85c9487fc7ab4b25b357ee23948e85add674c5c955c17a2f3230d2fe92178
How to read ASP source code on an IIS 5 server using the recently discovered IIS vulnerability.
fbbc4a903d4d14e72415134d1f5fec3c86d4c7566f7cc3e2e8f21160f8293dc4