ouch.c is a local linux denial of service attack which runs ls -w with a large parameter, causing ls to take up all the available memory. Obfuscated source.
8c5ebdec1d772958f856e4516beced5151ab86d93861706df9cec590be032d1c
Narrow Security Scanner 2000 (unix / perl) searches for 534 remote vulnerabilities. Updated frequently for the newest vulnerabilities. Tested on Redhat, FreeBSD, and OpenBSD, Slackware, and SuSE.
701e2addd80ef7d2ba0be0634202b7f96d79d360186a9cbe1c29b70f8c881acf
silk.c allows you to craft custom HTTP requests. Makes it simple to set the method, vhost, referer, uri, agent, and http version.
35938e66281bbf6dfc683c4e3cf483e136f5cca7e60c03a024454edf01a8cec8
eSS is a remote security scanner for linux that scans remote nodes for known security flaws. It does some of the simple probing technics automatically like banner grabbing, OS guessing. Includes a multithreaded TCP portscanner.
41d0d71c307fbb3009e934f1b1d31435169484601f32dff56538de5770a42377
Apache DSO backdoor - A get request to a "special" url allows remote command execution.
d49407f8380be928bcc8cb57171d11ca41fd2ec1f61a4678089d8ce1b6f3aaa9
Debian Security Advisory - Majordomo will no longer be distributed with Debian linux due to licensing restrictions which do not allow a fixed version of Majordomo to be distributed. If you are using majordomo we recommend that you replace it with one of the many other mailing-list tools available such as fml, mailman or smartlist. Debian security homepage: https://www.debian.org
05be458888b11488009cce8158839b8086d482254e1862d1ef230b28bd791957
Microsoft Security Bulletin (MS00-037) - Patch Available for "HTML Help File Code Execution" vulnerability. Microsoft has released a patch for a security vulnerability in the HTML Help facility which ships with Microsoft Internet Explorer 4 and 5. The vulnerability allows a malicious web site to launch code on a visiting user's computer without the user's approval. Such code could take any actions that the user could take, including adding, changing or deleting data, or communicating with a remote web site. Microsoft FAQ on this issue available here.
2a85b0eb44b421e06ad2885b46582cb0f459c6609e585227ee502531b4ab6fb8
gdm (xdmcp) remote root exploit. Tested against SuSE 6.2 and RedHat 6.2 running gdm-2.0beta1-4. Binds a shell to port 3879.
5f84108be835cb86e853f427609a8dabcca65b14019c0c0ca3b864c31c36179b