IDScenter is a control and management front-end for the Windows platform. Main features: Snort 2.0/1.9/1.8/1.7 support, Snort service support, Snort configuration wizard, Rule editor, AutoBlock plugins (Network ICE BlackICE Defender plugin included (Delphi, open-source), Plugin framework for Delphi included), MySQL alert detection & file monitoring, e-mail alerts / alarm sound alerts / visual notification, etc.
6e63a96e3d7b640463f315ba5db36b317a35ea578991fa75ab4ad69acbba59f5
Postfix 1.1.12 remote denial of service exploit.
b0da22d0cfbdc3497ffd67e7e35596e8ba75b9df40e447e1d99fd7e249ae92d7
jmpreg is a python class which makes it easy to find jmp calls inside various Windows DLLs. This class is especially helpful for local overflows.
e8aa03292c6a732d4b571b601fe773b46d8df96c52a6e2ed925629ed9aef69d4
Possibly one of many DCOM scanners/worms in circulation. Makes use of the 48 target exploit.
50eaf8d03dedab5be875488d96d74ce540febb02a673e0a877588e4ee2238a75
Domino Hunter 0.91 is a Lotus Domino web server scanner, written in Perl. It attempts to access default NSF databases, as well as crawl user-defined bases. It tries to enumerate the database structure, enumerate available views, available documents, and ACLs set on documents. It also tries to retrieve documents from available views in order to check if ACLs are correctly set to restrict documents and not views. The scanner works in both anonymous mode or privileged mode if user supplied credentials are supplied to then be passed to the default names.nsf/?Login form.
3c2a5de75ff2142db4ae5a5c5bc7513405bbcb6e7ab06b5102e3e6016d591993
Novacoast Security Advisory - Novacoast has discovered that Novell GroupWise 6.5 Wireless Webaccess logs all usernames and passwords in clear text.
73f94dfc0e4284cc8cbaf2c9688ddbad14ddec6437238d61c2b58e0ae32235bd
EF Commander versions 3.54 and below are vulnerable to various buffer overflows that can allow for remote arbitrary code execution.
4b6a103daedde0838356670bb130997652d09b35383a7ead54a7b31c2bb79a60
CERT Advisory CA-2003-19 - CERT announces that the exploitation of the RPC/DCOM services on every flavor of Windows is occurring in a widespread fashion.
0afa663b6fe40143f38ab3473e9d8cdb5bbe3c9f4fc11d00d907b04333fbaab5
Shatter Master is a win32 program made in VB6 to develop and exploit shatter attacks in Windows NT/2k/XP. Related information available here.
c5950147449ed4a389f5d8bef53044cb8e1930a127a12b45da93507005f58a57
ZoneAlarm is vulnerable to a buffer overflow in its device driver VSDATANT that can allow for code execution with escalated privileges.
820b1f247faa010ab3db72480902ac763d30b08bf5e79008ff372f7dbf442eec
Local exploit for the atari800 Atari emulator on Linux. Makes use of the -config overflow. By default, this binary is not normally default on most Linux installations.
6aadd23c68aa03fd20777677fdf26a1f88f63806dbb1d73b2a7fe7e914ed8645
FreeBSD Security Advisory FreeBSD-SA-03:08.realpath - An off-by-one error exists in a portion of realpath(3) that computes the length of a resolved pathname. As a result, applications making use of realpath(3) may be vulnerable to denial of service attacks, remote code execution, and privilege escalation. A staggering amount of applications make use of this functionality, including but not limited to, sftp-server and lukemftpd.
c39b1f231af3aa6eed22527f9da4ecb48a71fe2b9222d7e38045c619b9534d99
Remote denial of service exploit that makes use of the Postfix vulnerability discussed here.
54fd82b0d9859aa96b40ddaf97c6305be1201cdb2e93594702a51808237266a1
wuftpd version 2.6.2 remote root exploit that makes use of the off-by-one vulnerability discussed here.
ee456ce67583efada4d02d4662672efba77c520fe854673004cf4f185d954ed0
Postfix versions 1.1.12 and below suffers from a remote denial of service attack due to a vulnerability in the address parser code.
e8e28a863997588aef90fb4e62ff99a22c91cdc08e3b2cd835651486388fcd55
Half-Life remote server root exploit for FreeBSD that works against version lower or equal to 1.1.1.0, and versions 3.1.1.1c1 and 4.1.1.1a.
898e3e82064b265aa059fca0a12fea7311f621681d5ab453ae2e45929872f676
Secure Network Operations, Inc. Advisory SRT2003-08-01-0126 - The cdrtools-2.x package comes with a setuid helper binary that allows non-root users to overwrite root owned files. Instructions for local privilege escalation included.
cbbba6e4ccd3d5a97d50f7d3e328abecc761e8017e481e8e7f64d1a64a99ca49
Atstake Security Advisory A073103-1 - Three vulnerabilities exist in the McAfee Security ePolicy Orchestrator Server and Agent that allow an attacker to anonymously execute arbitrary code.
39c4da258d3c16be42e6d5d36b203ec57d8400c5e932a4dfde6e4c3688971f66
wu-ftpd versions 2.5.0 to 2.6.2 have been found to be susceptible to an off-by-one bug in fb_realpath(). A local or remote attacker could exploit this vulnerability to gain root privileges on a vulnerable system.
26d10c27b7202a5cb1389a5a1f1668d76a81ead7b06f38bae80956501c6824ce
Linux and BSD x86 local exploit for xtokkaetama that gives egid of games.
b520af024cb9003b4e1a42a73b3409332209fffab5a67095c1e394f14a9b173b
Yet another version of the remote exploit for DCOM. This one includes over 48 targets for Windows variants.
bf987d60d7758495b19dbbcb9c74bf9c8cf6661de49ba2feed1fab38f3861de9
Yet another version of the remote exploit for DCOM. This one includes over 20 targets for Windows variants.
ceea1b53a03512f23a0039ba663ea047a540918f279a32a728a77f8c5440f50d
ThreeZee Technology Security Advisory #TZT002 - GameSpy Arcade allows for arbitrary file writing due to a lack of file extension checking in the GSAPAK.exe binary.
ab5ef565cea587e770cc35b8c662b36159dd53ccba85ca369f780905953f94d1
New version of the DCOM remote exploit that uses a magic return address.
e5c92fea127afc1160f63d29acf4ebb26561218ac01cee7a18d6b64cba4c894f
SGI Security Advisory 20030704-01-P - It has been reported that the IRIX name services daemon nsd can be exploited in various ways through the AUTH_UNIX gid list. This could result in an attacker gaining root access.
1c492bd25cd117c9719328492ea5a0d705616c02c747a27c46e6a7f055116b8c