Key Hole is a linux administration tool that permits an admin to firewall even the ports he needs to use.
d92e58a64d79fa7dd009e3a7159855a988b562b37ba1143548dd416ec3b7a913
Ascan is a portscanner written in perl.
18733f258ecb4900491d0193ae5c5623238e5349272a60140757f0460a993f3a
/usr/X11R6/bin/mogrify local buffer overflow exploit for Redhat 7.0.
3b8cfa09a9e36ebc44c23db2716680788f2f6f2f3d559d5ca6ce1e6da6db44ea
Microsoft Security Bulletin (MS00-093) - Microsoft has released a patch that eliminates four serious security vulnerabilities in Microsoft Internet Explorer. The Browser Print Template vulnerability enables a malicious web site operator to take unauthorized actions on the computer of users who visit a site. The File Upload via Form vulnerability enables a malicious web site operator to read files on a visiting users computers. New variants of the Scriptlet Rendering and Frame Domain Verification vulnerabilities both allow files to be read on the users computers. Microsoft FAQ on this issue available here.
9aa5ecc4aab0fe22a94636425f74446fe8679dd3b37c17710b4acb20d1cccea6
Microsoft Security Bulletin (MS00-092) - Microsoft has released a patch that eliminates a security vulnerability in Microsoft SQL Server and Microsoft SQL Server Desktop Engine (MSDE). The vulnerability enables malicious users to run arbitrary code on the server. Microsoft FAQ on this issue available here.
b07b08bab40bfaae8d1b2dd22e7846714fc9aae22fc15b334f4cb2de56519832
Microsoft Security Bulletin (MS00-086) - Microsoft has released a patch that eliminates a serious security vulnerability in Microsoft IIS 5.0. Due to an implementation flaw, it is possible to create a specially-malformed file request that contains both a file name and one or more operating system commands. Upon receiving such a request, IIS 5.0 passes the entire string to the operating system, which would first process the file and then execute the commands with user priveledge. Microsoft FAQ on this issue available here.
346b1a035a7699fada25a0f3e1258835e1680873fb6b73579797815216e79c06
Debian Security Advisory - When joe (Joe's Own Editor) dies due to a signal instead of a normal exit it saves a list of the files it is editing to a file called DEADJOE in its current directory. Unfortunately this wasn't done safely which made joe vulnerable to a symlink attack.
2cc7835cff6b7eee83067241ec14569c45c3f9da7e897fdc6df2e25ceaaf4078
The Linux Napster Client v0.9 through v1.4.4 contains remote denial of service vulnerabilities, including a buffer overflow.
df942f2957c52dfcabfae137dce7e503c3a18bb3aa36ce6d8d404a43e2c6b85a
A local root exploit for /sbin/dump. Tested on RH6.2.
966cbbdeb7805adb5c2121b34a3d4ff536fbe8d9e2b18c9352b9fde122d9b4b0
BSDI 3.0/4.0 /usr/contrib/mh/lib/rcvtty local exploit - Gives a egid=4(tty) shell.
97df13bd07d261bb87a10c4f6335d25e1cca2a73e97e369c44265dec113c0303
BSDI 3.0 local Inews (inn-2.2) buffer overflow exploit. Gives egid=news shell.
ea9a24a0938e3ecdaf81b1eb284380066bc47043343c111cae4471b9d5273e75
BSDI 3.0 /usr/bin/suidperl local root exploit.
58941d3c91d8b42f6784c8091f0c39755ddd7d5f6ad6a1825b63d7ab8c720c3c
Pixpirate.pl will goto a source URL, download all other sub-URL's from an index of URL's, then goto each of those source url's, downloading every jpg file that it comes into contact with.
64e3cc7c17578c38ef8dc524c2d02dbb3d3b9af32dc9816acb91b586e1f91c97