lids is an intrusion detection system patch for the Linux kernel; it can protect important files from being changed. When it's in effect, no one (including root) can change the protected files or directories and their sub-directories. First release.
876cfbda1720c31debfa343471e807d720b478388d1840e06c0a90c0be175976
PacketX 1.0 is a native Windows NT firewall testing tool that allows for complete TCP/IP packet creation. It creates packets to be 'fired' at a firewall in validation tests so that firewall rules can be confirmed. PacketX[tm] contains complete TCP/IP packet spoofing technology in order to verify the approval/denial of internet domain address against firewall ACL's. Freeware version.
4c35e611d93dad2d380a1e9f3e54a132c151acf2d5fc5d0e14e626923b7725b3
Yet Another Wingate Scanner (YAWS) Version 0.1.
1e321a08d3f5472a712fdfbdbbb470dd8f42a2f100e6e751422294ebac6dcf44
Update to ms99-042, released Oct. 15. Updated patch availability. The IE 5 security model normally restricts the Document.ExecCommand() method to prevent it from taking inappropriate action on a user's computer. However, at least one of these restrictions is not present if the method is invoked on an IFRAME. This could allow a malicious web site operator to read the contents of files on visiting users' computers, if he or she knew the name of the file and the folder in which it resided. The vulnerability would not allow the malicious user to list the contents of folders, create, modify or delete files, or to usurp any administrative control over the machine.
368f46701e13ab6e23ee4e12a95583ca7ffd7eacdd5e56b4c0404fe1899040db
Any user may overwrite any file with group auth (i.e. /etc/shadow, /etc/passwd) using /etc/sysadm.d/bin/userOsa.
efdff100c4986b360fdb21f715839b67fb3d8d0b39aa721df77706513060b1a7
An overflow in /opt/K/SCO/Unix/5.0.5Eb/.softmgmt/var/usr/bin/cancel which will allow any user to gain lp privs.
9a4e597b84c8c1eb31bb630c9cc574cac8e99b62e17a606be42a39e44a6790f1
Windows 95 updated RDS exploit.
149a610621db59471d4420731c09658ea691396164cc0d8d1ac34ce2e22ef793
IE 5.0 vulnerability - reading local (and from any domain, probably window spoofing is possible) files using IFRAME and document.execCommand. Includes exploit. Demonstration code Here.
9675de24df2217c21e2f6231a2c519019a809807235ded9783257956a7c2f796
WinNT.Infis is an executable file with .EXE extension that installs itself as a native Windows NT system driver. Alert from Finjan
23e7fbdac27458b692f699f8b02855358119285d3d4e180ca6f8cd287273b70a
multithreaded telnet toy first seen on palante's DefCon 7 CTF server. Waits for a incoming connection, port scans the source IP, and forwards the tcp connection back to one of the open TCP ports on the source IP.
3fe5fbb7e8645bc3f727dd1d289575575ded8656f7a9147c5a91414d5c07a22c
The NASHUATEC D445 printer is vulnerable to many attacks
394d23effdf942f93c8f35952664715426d28a4501b41528f8f01ed69afed5fc
The Veganizer is a spam counter-attack. It searches the headers of a specified message for all associated IPs and Domains, then sends mail to pre-specified addresses at those servers (abuse@, postmaster@) as well as addresses found by a whois query on the IPs/Domains. The mail sent will also include the original message with full headers.
269eb9c4b6ca3f3682eadc3e191298bd93cccb8ccb1c7946fd5bdd3d79c2675d