GNITvse rc1: GNIT Vulnerability Scanning Engine Release Candidate One - (for WIN2K and NT systems). Performs a port scan, and based on those findings, calls other functions. Checks for MANY windows based vulnerabilities, and grabs banners.
1f337843a9ce01d908ccead72c80e7d43812269e422e2807368214bcf2e7c725
FTP Scanner v2.2.59 is a windows application which will scan a range of IP addresses for any login and password you specify.
38f7bab95018d3f33f227e902b67a8d2002a57b386b6a0d24812e9ded7a843fa
BufferOverflow Security Advisory #3 - libncurses buffer overflow in NCURSES 1.8.6 on FreeBSD 3.4-STABLE. Setuid programs linked with libncurses can be exploited to obtain root access.
d3900b7fe44530224283ef6bcd98f8704f6c629dab6bcb828e3d5083c81ea48e
FreeBSD mtr-0.41 local root exploit.
8fb8c8be26e6cdcb84cb5bb42887b0e84ec53f58ef96682bfc2e84d893e90fd4
Nmap is a utility for network exploration or security auditing. It supports ping scanning (determine which hosts are up), many port scanning techniques (determine what services the hosts are offering), and TCP/IP fingerprinting (remote host operating system identification). Nmap also offers flexible target and port specification, decoy scanning, determination of TCP sequence predictability characteristics, sunRPC scanning, reverse-identd scanning, and more.
4c9cb2a6a8c1bf58251b9e7976b690741e13813f3a85b79b11751d4a272dd128
Internet Security Systems (ISS) X-Force has identified a backdoor password in the Red Hat Linux Piranha product. Piranha is a package distributed by Red Hat, Inc. that contains the Linux Virtual Server (LVS) software, a web-based GUI, and monitoring and fail-over components. A backdoor password exists in the GUI portion of Piranha that may allow remote attackers to execute commands on the server. If an affected version of Piranha is installed and the default backdoor password remains unchanged, any remote as well as local user may login to the LVS web interface. From here LVS parameters can be changed and arbitrary commands can be executed with the same privilege as that of the web server.
61d620c67900aae2e66e83528048b341915c2605077b43b58e0a2baedc393854
incognitomail2.c sends fake mail using a wingate proxy to obscure the true origin of the message.
2db83f0aa98b6e3f8d8a8da4354b8fb4d3e12832b720864635806f9cb449ef61
LCDproc is a system to display system information and other data on an LCD display which uses client / server communication. The server is vulnerable to remote buffer overflow allowing an attacker to remotely execute arbitrary code or cause the LCDproc server to crash. Patch available here.
14eb38e3f0574a9702bdc7ae0cfe610a25f981b43a50cbfb49142d570cf2b5a2
Cerberus Information Security Advisory CISADV000420 - Windows NT/2000 cmd.exe overflow. Web servers that will execute batch files as CGI scripts on behalf of a client are therefore opened up to a Denial of Service attack. By providing an overly long string as an argument to a CGI based batch file it is possible to crash the command interpreter in the "clean up" stages.
0dcbdc1ab5da7d7148582f2f06ad1011474b95363fe58c05094dfee1821bee25
Windowmaker 0.62.0 buffer overflow exploit - Although wmaker is not suid by default, this code will overflow the $DISPLAY environment variable.
b98763e09a49cfb34054e919d503acf4584f861224878015ea7919bd5bb66904