PerlCal directory traversal exploit - Takes advantage of a bug in cal_make.pl.
45ac7b012dc6861b9f018d6dc2b6b359067b5bbd323b9f0b36ab15cc0d7d0911
Red Hat Security Advisory RHSA-2001:046-03 - Netscape v4.77 has been released, fixing a problem with the handling of JavaScript in certain situations. Netscape did not escape GIF file comments in the image information page, allowing JavaScript commands embedded therein to be executed. These commands could access data such as the browser history.
5628f2c69aca6539e8ef52172f7db8f0811c99e6e034e02612ce4430c91dca21
CERT Advisory CA-2001-08 - The Alcatel Speed Touch Asymmetric Digital Subscriber Line (ADSL) modem has weak authentication and access control policies, allowing remote attackers to do many things, including unauthorized access, unauthorized monitoring, information leakage, denial of service, and permanent disability of affected devices. More information available here.
76b0c6926e286e0683d4a884673f336687a50efce904712c932438d0066b9ad6
SPS.pl is a simple perl scanner which scans ports 80, 21, 22, 25, 110, and RPC services. Includes a RPC lookup table. Tested on linux.
27df9076e57e41ccb517d478d95f7b837c454a7792ed7be1f38f0552703179fe
Red Hat Security Advisory RHSA-2001:042-02 - Updated pine packages are now available for Red Hat Linux 7.0, 6.2, and 5.2. These new updated packages fix temporary file creation issues in the pine mail client and the pico text editor that comes with pine.
9650d27684dd3a9384e0c8b6eacfde394e79da70ae4f6210b7014d748d69997e
Remote imapd exploit for Red Hat 6.2 (Zoot) written in perl. Tested against IMAP4rev1 v12.264.
c10e5754cc22a45a1dc466fc265a3b46bec4230888f5bdc4faefe634c2980552
Icmp-Log v0.3 is a simple ICMP logger.
179a33acb04cb3f8b1d29cea881736f0e52ae5700939d58d8ab690d18b1ab17b
SuSE Security Advisory SuSE-SA:2001:12 - Vim and gvim have two vulnerabilities - A /tmp race condition and vim commands in regular files will be executed if the status line of vim is enabled in vimrc. Both vulnerabilities could be used to gain unauthorized access to more privileges. Patches available.
8070dd0cc8be8aa8f30511aa9b4fe1c976358e0623d82c15c16cdb092b7c1942
SuSE Security Advisory SuSE-SA:2001:11 - The Midnight Commander, mc(1), is a ncurses-based file manager. A local attacker could trick mc(1) into executing commands with the privileges of the user running mc(1) by creating malicious directory names. This attack leads to local privilege escalation. Update mc to the newest version!
f0e762dca5b7e73c15bc2a0e7afd087bd7bc4462da02c245bf373d607d1987bb
IIS 4.0 Security Checklist v1.2 - This document provides a series of recommendations for securing Internet Information Server version 4 on Windows NT. Designed to be used with WinNTConfig.txt.
614f59b0f9944300e6b823eadb5090e3c9cff56fc1a01512f82a52d083804e2a
Lsof is an extremely powerful unix diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system. It easily pinpoints which process is using each network connection / open port.
2b5754c7e622dddba5c5a239bc5a2d98728bd9c47f904ac552bc93a627dffe31