Single Honeypot simulates many services - SMTP, HTTP, shell, and FTP. It can pretend to be many OS's, such as Windows FTP systems, Windows SMTP systems, different Linux distributions, and some Posix distributions.
df033947535658dfb6aa0e49cb9d62ba6002a893119692be0fd847d14f0cbb09
pam_usb is a PAM module that enables authentication using a USB storage device through DSA private/public keys. It can also work with floppy disks, CD-ROMs, or any kind of mountable device.
4c0993d6a58e7ce409c3cbbfada982f5c897bd61804aa3a7b8975b86b2b8b413
Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix clone.
3df32f0482965454da395531f55410988514589c1395706816fe961dcd6f9359
Proof of concept exploit that makes use of a format string bug in IGI 2: Covert Strike. Affected versions are 1.3 and below.
e963bebcef000f6153acb4f8a4cc85894d3778effc37a72da254057fb13164a1
The IGI 2: Covert Strike server is affected by a format string bug in the logging function of the RCON commands. Affected versions are 1.3 and below.
f0fdf110d4229c03eb1683c695c18a13b559b107219d10ecd8ef6f31ef2a357c
IBM Director 3.1 Agent for Windows is vulnerable to a remote denial of service attack when being scanned.
11c8a7a8d97e1b7c71871fe52805b379be6151773027ff19753134ed8fd5d859
Monit versions 4.2 and below have two basic authentication flaws that allow for a remote denial of service and a buffer overflow that can lead to arbitrary code execution. An off-by-one vulnerability also exists with POST requests.
810840b17572800a7f7b3a1a0f1869203058b4950c0967687cd2f0ee5da4baf4
NGSSoftware Insight Security Research Advisory #NISR05042004B - To aid in the development of web applications that require database connectivity, certain test scripts are created and uploaded to a website when using Macromedia's Dreamweaver. These scripts help to test database connectivity. If left these scripts can allow an attacker to gain access to the backend database server, without the attacker having to supply a user ID and password. Systems affected are IIS/Dreamweaver MX and UltraDev 4.
5676bedc096db266dcec8d45b47caabbecb7b6fb751eaa892c1472bac4cc2b9a
Remote exploitation of a buffer overflow in the win32_stat function of ActiveState's ActivePerl may allow arbitrary commands to be executed. No check is made on the length of the string before the copy is made allowing long strings to overwrite control information and execution of arbitrary code possible.
3adc232e9981b7e4b616c8280bed4f979ce9a51c0a72c7d2f4eff52bb06efd16
NGSSoftware Insight Security Research Advisory #NISR05042004 - Due to a lack of boundary checking within the code responsible for loading Fasttracker 2 (.xm) mod media files by the Winamp media plug-in in_mod.dll, it is possible to make Winamp overwrite arbitrary heap memory and reliably cause an access violation within the ntdll.RtlAllocateHeap() function. When properly exploited this allows an attacker to write any value to a memory location of their choosing. In doing so, the attacker can gain control of Winamp's flow of execution to run arbitrary code. This code will run in the security context of the logged on user.
f19369974724e97b0e10b88bb80392f6506e21880ffcc74b92f2f54c0d616991
Microsoft SharePoint Portal Server 2001 suffer from cross site scripting vulnerabilities.
10169682debdfb934b48a36f761142428188f321b766946424a38fe3d7ad8251
Possible symlink attack in SuSe's Yast Online Update tool.
fa5ad54174d9f2e28e10a089d616b0f4ebc3a38a0f1b21434805e9abf2d6c5a7