SADoor is a non-listening remote administration tool for Unix systems. It sets up a listener in non-promiscuous mode for a specific sequence of packets arriving to the interface before allowing command mode. The commands are sent Blowfish encoded in the TCP payload and decoded and passed on to system(3).
94e0dcdf600116b079950ef2ffe319177b437da4b237b008bb960d77c075ed17
FLoP is utility designed to gather alerts with a payload from distributed Snort sensors at a central server, and to store them in a database. Both PostgreSQL and MySQL are currently supported. High priority alerts may be sent out via e-mail.
18adeaf982dc57c0ae442afb3815fc04ee7c432a62e9688ccb674a4955dfd542
Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix clone.
da5d8dc171840f688afdb859ad75295823aafc7b4c902fd4fb4de6a694ea1943
ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.
d293d84700bb11561f0275c86caec33df22cb5fe89c987d3b7a6ddefdcffaec0
Weak encryption in the client for the game Dark Age of Camelot exposes customer billing and authentication information during transmission.
6d944e3dc153c45f1774d46011fc92c063d2ad92d85abf77cd1c805dfeb68133
Two buffer overflows exist in lftp versions 2.3 to 2.6.9. When using the ls and rels commands during an HTTP/HTTPS connection, an attacker has the opportunity to exploit a sscanf() call in try_netscape_proxy() and try_squid_eplf().
763cfb7b83021a88fea152144b0becd3ae188d5febab74fae428d2aa26a62665
Remote exploit for eZnetwork versions 3.3 to 3.5 that sends a shell back to the host that the attack spawns from.
9f8750c0a7a828bc993803f79bc0832fef6d9aedc389c1e9bf8aa51b774106c0
Remote exploit for the Microsoft Messenger service buffer overflow described in ms03-043. Tested against Windows 2000 FR SP0.
e89e791af17b286cbae55b6f8a5cc430de2ee2deb5b3cc411ff97b53dac2f46f