A buffer overflow vulnerability exists in the way a dynamic linking library (ssinc.dll)that is shipped with Microsoft IIS 4.0/5.0 handles the files it contains. Exploiting the vulnerability, local attackers could gain local system privileges.
80719fd500d2b9d91176bd0bb701df5bd2e4fa86a32fd7e6ccc2f7e5f15285f1
Amap is a scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!
6df1e33d4c0dea8aae82e949aa3198c14cb677bce90ca0f5998b50a39229a476
Remote exploit that makes use of the BIND OPT vulnerability to create a denial of service attack.
d61ba95c78e60ced442db0b1497f20317a5b8b1fca1b31a131906138f13acf11
Cups v1.1.17 and below remote exploit which spawns a shell as lp. Modified version of the original sigcups.c exploit.
5a88fad62d69412d2762fa193f415a3d84cba3182a07cc0ff828178c6b46a28d
iDEFENSE Security Advisory 05.30.03: Passing an overly long string to the apr_psprintf() APR library function that is used by the Apache HTTP Server could cause an application to reference memory that should have already been returned to the heap allocation pool.
8f14d25b16284066d16c7efda2e0561997eb563778e85bcaa8276dd562be3cf7
Microsoft IIS versions 5.0 and 5.1 remote denial of service exploit that makes use of the vulnerability recently published by SPI dynamics. Full advisory located here.
0a6e5ac42e64c1fced6fe1563d8830a3225d3aa638b65db1f8bb43dce8edea88
nmapgrep is a small tool customized to grep regular expression patterns from a nmap log file and output the IP addresses that match the pattern.
bad869c123e08b3b618205f22b3b15a4d14f3711bec321aea024ca3156bf31b7