Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Screenshot available here.
c890b840c691500d24fb0ad016094bc0febf29b5c5be513b07f434a3f4a35dce
Libsafe protection against format string exploits may be easily bypassed using flag characters that are implemented in glibc but are not implemented in libsafe. Example exploit code included. Libsafe v2.0-12 fixes the issue.
67243630ffbf72dec1fb961dd0c2684be8255858ba9eac121ed463abc80f0bb6
RealSecure Network Intrusion Detection (NIDS) Version 6.0 running on Nokia appliances contains a test system named "starscream" and test user "skank" left behind in the ISS.ACCESS file as a KeyManager. This information can be used to push new pubkey files to the sensor, reconfigure or take control of the NIDS daemon and daemon components if a backend network is not used to communicate with the sensors.
07ec7f7965b75739f31547fee37531ee6330d10d0f530169089399a0f10a588a