Xine v0.99.2 remote stack overflow exploit. A overflow in all versions of xine-lib allow the vcd:// input source to execute arbitrary code, even if the file is .mp3, .mpeg, .mpg or .avi media. Fix available (currently only in the cvs xine-lib) here.
32955c3e74badabf60efcd97d31761b9fa8bfd32d260deb331486ed610d1a87d
Dump2code is an ELF file section reader that allows you to dump any executable section, such as .interp, .dtors, .text, etc, from binary code to hex code.
02e4221d141f634e535b986413a1fb59b4f7f15a334932f0e73b7c8cf95d095f
A buffer overflow vulnerability has been discovered in AOL Instant Messenger 5.x that can allow for arbitrary code execution.
29f13f59caac1ab84f3df01e8a06deb1d8cdc62ada4a2048e3186f5dbe2a3dd0
CVSTrac versions 1.x have an input validation flaw that allows for arbitrary command execution.
a4fbbe43075d15f6f1f2aa3f8a3d21cf99c42b351348d35ac984950bd03c8bc6
UPNP mass infector exploit.
18e0f419929aa859e5a7ec066be1b57c720c219044cd322fe7335ffc7841c819
Libnids is a library that provides a functionality of one of NIDS (Network Intrusion Detection System) components, namely E-component. It means that libnids code watches all local network traffic, cooks received datagrams a bit, and provides convenient information on them to analyzing modules of NIDS. So, if you intend to develop a custom NIDS, you do not have to build low-level network code. If you decide to use libnids, and you have got E-component ready - you can focus on implementing other parts of NIDS.
788882607cb35eaf005525af3f7ee8e6c99f98d76ef9daf48fc6388af9f7ab31
Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.
39925a2882b60cffb5673663f256429064eb325ad4c13c93ab41f6d2db9d592e