Lsof is an extremely powerful unix diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system. It is useful for pinpointing which process is using each network socket. FAQ available
a36c30700b06192ff417d36a35c38568296e637a9febb2bb22d72d625e02f718
radmind is a suite of Unix command-line tools and a server designed to remotely administer the file systems of multiple Unix machines. Radmind operates as a tripwire which is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change.
ac515acaec772a559b2173f570508cc5d668fa898fd24a4c7b86a0a0a1d74087
Network Leak Finder is a collection of small Perl scripts that detects connectivity between network segments. It is mostly useful to detect leaks in large organizations that have private network segments physically separated or firewalled from the Internet.
dc97597188f017613ab2b39f6c6da83a4f198d6ab814b13504c993ba1995e6d1
DMitry (Deepmagic Information Gathering Tool) is a UNIX/(GNU)Linux Command Line Application coded in C. DMitry has the ability to gather as much information as possible about a host. Base functionality is able to gather possible subdomains, email addresses, uptime information, tcp port scan, whois lookups, and more.
ead71bd9bd97c4bde3c74fa7c8ffe8dbd5f7e925b8a8a091ef67e8eb636d3597
Flaws in Kazaa allow for arbitrary code execution and for remote execution of code.
54d24c88f2912b09d0b345f953c5e2770d0632927a44603c2da9fd28f2b664fc
Gallery 1.3.4 suffers from remote script inclusion and cross site scripting vulnerabilities.
36bc6482ca51b4b7350ffc8c1ee1e6a6bb416073b0a7a3a9c534cf7492035976
iDEFENSE Security Advisory 01.17.05-AWS - Remote exploitation of an input validation vulnerability in AWStats allows attackers to execute arbitrary commands under the privileges of the web server. Version 6.1 is susceptible.
86d60671ec320c65fa109ea23d6f6992789e4379bf9a4737c37bee85674c97de
iDEFENSE Security Advisory 01.17.05 - Remote exploitation of a buffer overflow vulnerability in The ImageMagick's Project's ImageMagick PSD image-decoding module could allow an attacker to execute arbitrary code. Versions 6.1.7 and below are affected.
3f61acf2bfb9ee8a68e6af7b2919dfc308280f9382d58deec5ba66019fbd7b56
Secunia Security Advisory - Christian Stocker has reported a vulnerability in SafeHTML, which can be exploited by malicious people to bypass certain security restrictions.
4e3a08b877877f65fd13fd7da5ee7d829740bede109312b5c204191265f7ee3f
Secunia Security Advisory - VMware has acknowledged some vulnerabilities in ESX Server, which can be exploited to disclose sensitive information in kernel memory, bypass certain security restrictions, and potentially compromise a vulnerable system.
b5929f5d3096385a6e38290777b61db24c4b8b371fb1e1125ae9187290630c51
Halocon versions 2.0.0.81 and below suffer from a denial of service when having been sent an empty UDP packet.
c9c862ed402476055d48c3162a680de7d913f84528de753e0fb48ac9ade9ff7e
Debian Security Advisory 642-1 - Several vulnerabilities have been discovered in gallery, a web-based photo album written in PHP4.
1c2340cc0acda4ec503f645b5f92de2caa6565c2aa852ffdc4f3b6d59837286f
Deep Freeze 4.20 is susceptible to a denial of service attack.
99264118e7c02613804155370002f94d5dc8817b6af774b15ccc55d3ac852bcc
NodeManager Professional 2.00 has a stack overflow vulnerability that can be exploited by sending a specially crafted SNMPv1 trap.
2f7c4455305f9277c5d6931bd82f3660f702734db4e9275b16d3c83827dfb989
Secunia Security Advisory - A vulnerability in MySQL can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
b05d27e7099eee9d222fce2f8d88432812dff9ab56bd6feb3e0e99140da64a97
32 bit asm code written in AT+T syntax for the x86 processor. It adds an user with root rights and no password from the command line.
bbaf768f9bc7050ec1c7143524bc8b75ae62bb26e9360d431d9a5351798506cf
Secunia Security Advisory - A vulnerability has been reported in BlackBerry Enterprise Server, which can be exploited by malicious people to cause a DoS (Denial of Service).
466942874d911547aca6456b8ff4c50d84410df74e1c7ac4830a883bb052f1e8
Debian Security Advisory 641-1 - A MIDI player named playmidi contains a setuid root program with a buffer overflow that can be exploited by a local attacker.
cd0e9a337951b3e09ad611aa9ce6bb73ed15629ca751c148f112711735a8abdf
Secunia Security Advisory - Sun has acknowledged a vulnerability in Solaris and SEAM, which potentially can be exploited by malicious users to compromise a vulnerable system.
afea8120cd3c47e3656324a4c98cbcd93a8e98a78551991470079b9c2a68aa2e
Debian Security Advisory 640-1 - A buffer overflow has been discovered in xatitv, one of the programs in the gatos package
a5ba9f283834d8b4938ce473af0d75b42d0f86adf054a658ac39480ed9494ecc
The Netgear FVS318 version 2.4 router is susceptible to filter bypass when the URL is hex encoded and it also have a cross site scripting flaw.
e0429ec6f905a58deb753259af332c31bbfdea50bc29d36fff67ce55cbe545dc
Gentoo Linux Security Advisory GLSA 200501-25 - Squid contains vulnerabilities in the the code handling NTLM (NT Lan Manager), Gopher to HTML and WCCP (Web Cache Communication Protocol) which could lead to denial of service and arbitrary code execution.
02889a8e6fdf477d76ba90d004e85aeac84bba56864ec4c5e6e5f0e54e15878f
The Apple AirPort WDS is susceptible to a denial of service attack when a link-state change takes place on a UDP port.
ba61e9fa992c5d7036a2d67737ea15d2e8f1d17f0673d22c0b2f0eb6fcd5bbcf
Direct access to administrative pages in SparkleBlog do not require any authentication. Additionally, is it susceptible to cross site scripting flaws.
40ed3e540124f66225b479f580198e60203fc9805df45f8f3044838e6f6f52b5
Cross site scripting vulnerabilities have been discovered in nester BB tags.
d2edd3b75016dd553e18d0017adb0b56aa6543383f5e78d348e1beb9db00f5f7