Solaris has a bug in the use of SO_REUSEADDR in that the kernel favors any socket binding operation that is more specific than the general *.* wildcard bind(). Due to this, a malicious socket can bind to an already bound interface if a specific IP address is used. Exploit included.
Various tools that demonstrate the use of the Internet Control Message Protocol (ICMP) to perform a variety of attacks against the Transmission Control Protocol (TCP). Inside this tarball lives icmp-mtu.tar.gz, icmp-quench.tar.gz, and icmp-reset.tar.gz.
The McAfee Intrushield IPS Management Console has been found susceptible to html and javascript injection, privilege escalation, and unauthenticated report deletion.
Core Security Technologies Advisory ID: CORE-2005-0629 - A buffer overflow vulnerability was found in the status command of MailEnable version 1.54. Remote exploitation of this vulnerability could allow an attacker to execute arbitrary code with System privileges. The status command requires an authenticated session, so valid credentials are required. Proof of concept python exploit included.