NSAT (Network Security Analysis Tool) is a fast, stable bulk security scanner designed to audit remote network services and check for versions, security problems, gather information about the servers and the machine and much more. Unlike many other auditing tools, it can collect information about services independently of vulnerabilities, which makes it "timeless", meaning it doesn't depend on frequent updates as new vulnerabilities are found.
461a3df9b3a2ca90e5ae7367fa87b9e9c40b2a804e947124fd42f56d560d7521
HPUX's ftpd contains a remotely exploitable format string vulnerability in the PASS command.
deb05390fad773d1f8e594e39f6c365b21288c7dc57008d1e696e4e2da8fcb7c
Totalbill is a complete billing and provisioning system for ISPs which contains remote root vulnerabilities.
6eccd079ce9e4448c67abb2c3b60374644fb7bf4faed59fe18628ecd8b704e95
Arse.c brute forces valid logins from many default Apache instalations by checking if the server returns a 404 or a 403.
48cae4b5fb7bd08375804462c8c9afd4adda0e9ff8b927b1152538b6da117678
Microsoft Security Bulletin (MS00-057) - Microsoft has released a patch for the "File Permission Canonicalization" vulnerability in Microsoft Internet Information Server. Under some conditions, the vulnerability allows a malicious user to gain additional permissions to certain types of files hosted on a web server. Microsoft FAQ on this issue available here.
2d20ce16ddc4817b524e5d8c15d6ccf43a8f62f3e233a72cf2fdc2ef1e6ab3ac
Red Hat Security Advisory - Updated perl and mailx package are now available which fix a local exploit made possible by incorrect assumptions made in suidperl.
a3d6d23791dcf67769e1c94abf99cb28578f22037c23cc5682f62e95a86895bc
FSCAN is a fast command line port scanner for Windows which will scan both TCP and UDP ports, grabs banners, has adjustable timeouts, and scans ranges of IPs.
df98fb2315a8cf10dbfe4b7ea7e227b742e8ba0be073f74a9214e7457d89863f
Microsoft Security Bulletin (MS00-055) - Microsoft has released a patch for two security vulnerabilities in Microsoft Internet Explorer. The "Scriptlet Rendering" vulnerability allows a malicious web site operator to read files on the computer of a visiting user. This patch is a comprehensive patch which also provides protection against several security vulnerabilities that have been discussed in previous security bulletins. Microsoft FAQ on this issue available here.
837204e1e5c2bb16d48d817649d86026820e7346b7bae148d093326729516ef3
Vetescan Local 8-9-2000 update.
5c473ccfa8e0f8da7c664400ec4848ac86b77341ed30c01fd31df297af577e92
Vetescan Update 8-9-2000.
3ff85081a5f194c048b3c6fc32dc60c289d2a130b799aa6967a68e94c715d5a0
VeteScan is a bulk vunerability scanner containing programs to scan Windows NT and UNIX systems for the latest trojans/remote exploits, a scanner for the vulnerabilities of single hosts (with or without host checking), a tool for scanning multiple hosts, a scanner for class A/B/C networks, and fixes for various vulnerablities.
139e9297a4962c6ac195c28bb539f264043a0e4b41d3554011ac787611cb8438
VetesCan Local is a shell script which checks local unix security, including checking for rootkits, log permissions, home/root directory accessability, inetd services, /etc/securetty, SUID/SGID files, World writable files, Unowned files, .rhosts, and cracks passwd/shadow.
e917e9c1a6b43f96ef5680a083ba3ed4ccedf12c4bef4279af953c3db10232f1
linux fingerprinting tool. Not written in english.
25e2dce91868a209dd655a4295a5198a7d475bc6ab1069b37179aba86958da8c
Microsoft Security Bulletin (MS00-049) (Update) - Two vulnerabilities have recently been discovered, one affecting Microsoft Office 2000, and PowerPoint 97, and the other Internet Explorer 4.01 SP2 and higher. The Office HTML Script vulnerability, allows malicious script code on a web page to reference an Excel 2000 or PowerPoint file in such a way as to cause a remotely hosted file to be saved to a visiting user's hard drive. IE Script vulnerability, can allow malicious script code on a web page to reference a remotely hosted Microsoft Access file. The Microsoft Access file can in turn causes a VBA macro code in the file to be executed. Microsoft FAQ on this issue available here.
4c81cb6858d14336d30e08a9672c24d9d344d2da537ae08343ad4c7e70ef2c96