Remove vulnerability has been found in the SmartFTP-D Server which allows a remote user with an account to read any file on the system.
dc0c845f36c1df20329e24792344d24bc446161aac536e31bd3e8e9f4f21f5c7
Reptor is a utility designed to aid the analysis of Axent/Raptor firewall logfiles which generates HTML reports which can include traffic summaries and alert messages that are based on highly customizable conditions. It has built in support for logfile retrieval, FTP, and SMTP allow it to be easily automated.
2a2cfb7fe5594ca612f8122ebeda08e36f844bf4b937c0db39ea3d3b80937f3f
Remote Denial of Service for Mercur 3.2 allows any remote user to shut down the server.
1690ffae3274ca28e04e7f58873add187369c0fbf6c03ecfca0f74620e800cff
Proof of concept exploit for the "Remote Registry Access Authentication" vulnerability in Windows NT 4.0 which was described in ms00-040 which allows a user of the local network to crash winlogon.exe remotely.
0d522a59742b3cab17ef2324689d032e9e785a15ab459d5668296905d6083e0f
Solaris 2.x through v8 contains an exploitable local root buffer overflow vulnerability in ufsrestore. Exploit code included and tested on Solaris 8 sun4u.
9eccd7930a0be561b50a1d53fe6f55348b0d0226d0e0e377512167e9747f432d
Splitvt 1.6.3 local root buffer overflow exploit - Tested on Debian. Includes lots of cool dubugging captures from gdb explaining what is going on.
1c165f96640daf61e31a962255839951c5bc33f52d8efa132b5f781b747f5d08
Microsoft Security Bulletin (MS00-020) - Microsoft has released a patch for the "Desktop Separation" vulnerability in Microsoft Windows 2000. The vulnerability allows malicious users to gain additional privileges on a machine that he could log onto at the keyboard. Microsoft FAQ on this issue available here.
e6648bef5cbeee8b1c915670286a7e4929764f2fa6f4c4b8cd4bb6b28e094b94
The idea of the International Kernel Patch is to collect all crypto patches so that using crypto in the kernel will be easier than today. The patch includes a number of crypto patches including a crypto API including Blowfish, CAST-128, DES, DFC, IDEA, MARS, RC6, Rijndael, Safer, Serpent, and Twofish, an encrypted filesystem loopback device using the crypto API, CIPE VPN and EnSKIP patches.
a3bd33d6d20bec46864b514c53e33185ca3d9f110eea21433e391eba63ac7871
Linux Firewalling - Insights and Explainations. Covers basic IPchains firewall building, advanced IPchains firewalling, and linux firewall related insights and recommendations on which traffic to allow.
3c23ede6fcac5322c286ef9c78317b9d2dc6080d3c8bd5f2c70e41c164ec7673
USSR Advisory #45 - Remote dos attack in AnalogX SimpleServer v1.05. A malformed URL sent to port 80 will cause the proccess containg the services to stop responding.
5962cde8e9d34724c1d71bd9e3e0f7186e0f0a721c66586118c3c2b09ae04656
Remote vulnerabilities in GSSFTP daemon - A remote attacker can preform denial of service attacks, and local users can get root access. Source distributions which may contain vulnerable code include MIT Kerberos 5 releases krb5-1.1 and krb5-1.1.1, while MIT Kerberos 5 releases krb5-1.0.x is not vulnerable.
1a2c3ea6b342adf0bc8373cd79e7c97b12b37dbc7002b216a38079705be27cc1
Windows Security Update June 14, 2000. In this issue: Registry Request Denial of Service, Spoofing McAfee VirusScan Alerts, Unify eWave ServletExec Exposes Source Code, Path Exposure and Buffer Overrun in Ceilidh, Firewall-1 Denial of Service, Buffer Overflow Condition in EServ, Circumventing IE Cross-Frame Security, Win2K/NT Denial of Service via Invalid SMB Field, IE Mishandles SSL Certificates, NT Subject to User Session Key Reuse, Win2K and NT SMB-based Denial of Service, The Need for Layered Physical Security, Tip: How to Recover a Lost Administrator Password, and Windows 2000 Security: Checking Your Current Configuration in Group Policy.
fe902e20bf90478117f3a10877b1a53c907cafc498e2c88f49952ce0a7e58755
USSR Advisory #44 - Network Assosciates PGP Certificate Server v2.5.0 and 2.5.1 for Windows and Solaris has a denial of service vulnerability. Connecting to the PGP Certificate Server Command Port (TCP port 4000 default) from a host without a DNS name causes the process containing the services to crash, causing this message to be displayed.
d8f6c5c712c8c416b7760116ec2405ed9995450f003309fb981e30e00014ce47