Dazuko is a kernel module which provides 3rd-party applications with an interface for file access control. Useful for on-demand virus scanning, as a file-access monitor/logger or external security implementations. It operates by intercepting file-access calls and passing the file information to a 3rd-party application. The 3rd-party application then has the opportunity to tell the kernel module to allow or deny the file-access. The 3rd-party application also receives information about the file, such as type of access, process ID, user ID, etc.
120a967d446d552ad485f6197f5c9d9cd8b5369ae74104c98641c8e3492031ce
ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).
93b8c3b9cf5b61b20a8a949d338ebdfa0f2c8b7781df5c5ecd27ca269e152fb8
The OpenCA Project is a collaborative effort to develop a robust, full-featured and Open Source out-of-the-box Certification Authority implementing the most used protocols with full-strength cryptography world-wide. OpenCA is based on many Open-Source Projects. Among the supported software is OpenLDAP, OpenSSL, Apache Project, Apache mod_ssl.
7b356b26e455471fe2dcac6c03c95e4ab29b400e8b21ced9691f485baca59f6a
IWar is a war dialer used for auditing your PSTN (phone) network. Its features include random/sequential dialing, Voice over IP using the IAX2 (Intra-Asterisk eXchange) protocol, ASCII flat file and MySQL logging, a curses-based front end, key stroke marking, multiple modem support, several methods of tone detection, save/load state, banner detections (to determine remote system types) and blacklist support.
fac7b4801ad91e478e31f5da3b1feb7d3e2e09c6e281b0476f8c4adf42e52e6a
The MultiAdmin security framework kernel module provides a means to have multiple root users with unique UIDs. This bypasses collation order problems with NSCD, allows you to have files with unique owners, and allows you to track the quota usage for every real user. It also implements a sub-admin, a partially restricted root user who has full read-only access to most subsystems, but write rights only to a limited subset, for example writing to files or killing processes only of certain users.
e230d05121b93e48db1cedcdc60023126e1672458257223a7e065e75221f888f
A new grsecurity patch has been released for the 2.6.14.6 Linux kernel series. It implements a detection/prevention/containment strategy. It prevents most forms of address space modification, confines programs via its Role-Based Access Control system, hardens syscalls, provides full-featured auditing, and implements many of the OpenBSD randomness features. It was written for performance, ease-of-use, and security. The RBAC system has an intelligent learning mode that can generate least privilege policies for the entire system with no configuration. All of grsecurity supports a feature that logs the IP of the attacker that causes an alert or audit.
eaa8d0841c436461c0a8176a81ccbfc192d61cc0a8137702536776b170a512d3
A new grsecurity patch has been released for the 2.4.32 Linux kernel series. It implements a detection/prevention/containment strategy. It prevents most forms of address space modification, confines programs via its Role-Based Access Control system, hardens syscalls, provides full-featured auditing, and implements many of the OpenBSD randomness features. It was written for performance, ease-of-use, and security. The RBAC system has an intelligent learning mode that can generate least privilege policies for the entire system with no configuration. All of grsecurity supports a feature that logs the IP of the attacker that causes an alert or audit.
1af16f854a638f22bea48ff17e65d41cf97929628d2f1efb3730faf0a5ed0be0
The override Rootkit: A LKM Linux 2.6 rootkit that uses patched systemcalls. Features - Hides pids and automatically hides the pids of child processes - Hides network ports - Hides files which begin with a user-defined prefix - Can show the hidden pids.
04c076c58c76e17bab712708d97f482bcfca9fe65f29cad03d4b68cabbe13393
Secunia Security Advisory - A vulnerability has been reported in nfs-server, which can be exploited by malicious users to compromise a vulnerable system.
fbca3d6ee86bbcfbddc7f8c6ba9a720c21b94869788de4359d9e8a7cbbed5645
Secunia Security Advisory - Aliaksandr Hartsuyeu has discovered a vulnerability in My Little Forum, My Little Guestbook, and My Little Weblog, which can be exploited by malicious people to conduct script insertion attacks.
344d3fb945bd3946f912f84232a8917390b808ff9e765e9e606fb2d98c73b444
Secunia Security Advisory - A vulnerability has been reported in Cisco VPN 3000 Concentrator, which can be exploited by malicious people to cause a DoS (Denial of Service).
4568d050e5cfefb96e48d76ba5d84c33e6158ef076bf79f0b804ec3582976dab
Secunia Security Advisory - Debian has issued an update for drupal. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, and conduct script insertion and HTTP response splitting attacks.
47721504723aafd407f6fb93d45d5980d9b8de189f6090026b86f68a4fa3cf69
Secunia Security Advisory - Mandriva has issued an update for net-snmp. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges, or by malicious users to cause a DoS (Denial of Service).
2bc09eb6f72bb160255b32ea3674458c8e32283a9db1ea05b6e7a1f08ce38916
Secunia Security Advisory - SUSE has issued an update for nfs-server. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system.
16043c0ade4414add7ee0fdd67efa41f1f01b0ce10a39c794a690ea73b29f98d
Secunia Security Advisory - Mandriva has issued an update for perl-Net_SSLeay. This fixes a vulnerability, which can be exploited by malicious, local users to weaken certain cryptographic operations.
d87e25d0023e1938a8cfcd5290126201c0ad35971f9029ae395aca8cdeab484d
Secunia Security Advisory - imei has discovered two vulnerabilities in MyBB, which can be exploited by malicious people to conduct cross-site scripting attacks.
49f482d71066c4671746d0f62f37379eb5b9ac5d0595562ccdb48a98cacc84e3
Secunia Security Advisory - Gentoo has issued an update for gallery. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct script insertion attacks.
762f514b6ccc9b6e308cb7534e19ef95dd6b73ab96553f10faae573f32cf687f
Secunia Security Advisory - Aliaksandr Hartsuyeu has discovered a vulnerability in AndoNET Blog, which can be exploited by malicious people to conduct SQL injection attacks.
d6e421f5c2a2c168a0a74bb597c32eb3d8b86027941b2ff4b6fc7bc2261168b8
Shareaza, a P2P file sharing product, suffers from a remote vulnerability that allows code execution.
558bf79d1a63a228c41dc5ef9d31ba2a50943261248d81c328532ac0382442f9
Eterm LibAST exploit for Ubuntu. Yields utmp GID.
368fbf62bd1bd1c27f952c1154970ef9c400e0b7dae8aa841163e6e10ef4ebb6
my little homepage v2004.04.20 is vulnerable to XSS
1f4add3286c8cddc52e3bf32b4fb4eed5aed6a45025b94327903ae42cb12bf55
AndoNET Blog v2004.09.02 suffers from SQL injection in comentarios.php via the "entrada" variable.
35de2be590011ca4ae3c5500ad351361ba23ea930ca874bfa319fda0c05cf41e
Cisco Security Advisory: Cisco VPN 3000 Concentrator Vulnerable to Crafted HTTP Attack
461ce98665d8f47f2c4e32ab8228adbebd8310fd525df37e500bbe1acc7a7692
Vis.pl is a perl script which manages files as part of e-cms. It suffers from a directory transversal vulnerability.
9fdc7050f5b45aecc2181212ddce45de932feeee80a7d300792bc90d14fede25
Stefan Esser discovered a bug in in the register_globals emulation of phpMyAdmin that allowes to overwrite variables. An attacker could exploit the bug to ultimately execute code (CVE-2005-4079). Additionally several cross-site-scripting bugs were discovered (CVE-2005-3787, CVE-2005-3665).
b64f32086896128a7524972310d015e83c678f8cf9b97ebf8fd1a79eba34f537