Posadis m5pre1 local buffer overflow exploit.
02990a3bf9a9b52f587bd26ec96d8142429acc8d34e02e69e765ef4fb60221b1
Posadis m5pre2 local format string exploit.
025e81c77e339b0490a61b132dcf3996293528d7e06703be59938c0e883873e7
Cold Fusion v5.0 on Windows 2000 w. IIS5 contains a bug because requests for certain DOS-devices are parsed by the isapi filter that handles .cfm and .dbm result in error messages containing the physical path to the web root.
e1c8dfbb628e1242d3787672e22d4588966e1ef76382598ce80d04e1ad70f7e9
The Sambar Webserver v5.1p on Windows 2000 contains a flaw in the serverside URL parsing that allows malicious users to bypass serverside fileparsing and display the sourcecode of scripts. The same flaw could allow a malicious user to crash the web service. Example URL's included. Fix available here.
7bff33cd3a2c799145ed9e3a6b0e19f2ba86cc4529efcc24ac878157fb592ca0
Microsoft Security Advisory MS02-020 - Microsoft SQL Server 7.0 and 2000 contain buffer overflows in stored procedures which allow remote attackers to execute arbitrary code in the security context in which SQL Server is running. An attacker could exploit this vulnerability in one of two ways - the attacker could attempt to load and execute a database query that calls one of the affected functions, or if a web-site or other database front-end were configured to access and process arbitrary queries, it could be possible for the attacker to provide inputs that would cause the query to call one of the functions in question with the appropriate malformed parameters. Microsoft FAQ on this issue available here.
e9aa37ecfa4622fac79e02caae7328ee79458d9a6c012915da1dea341479db03
Microsoft IIS W3SVC Denial of Service - Brings down the inetinfo.exe process, crashing IIS.
81814de9d2e596727cfc98782533c7d68dd2b7ae0b565762aba72a987fd5e7bd
FreeBSD Security Advisory FreeBSD-SA-02:21 - A bug in the FreeBSD kernel's TCP/IP stack's processing of ICMP echo replies can be exploited to create new routing table entries which are never deallocated, using all available memory.
1b209ae5272e1c845302bb2943ef5557ae459d0b9bb2720c44291a59a7de1062
PromiscDetect for Windows NT 4.0 / 2000 / XP checks if your network adapter(s) is in promiscuous mode or not (that is, in most cases, if a sniffer is running on the computer or not). Of course the attacker might be intercepting the communication between the tool and the adapter, making the result unreliable, but there are probably many more cases out there where the tool will really detect a sniffer.
8a4345015f03031fc61b7d463780177d80619f954ab9748ce8585b34ea995058
Fragroute intercepts, modifies, and rewrites egress traffic destined for a specified host, implementing most of the attacks described in the Secure Networks "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection" paper of January 1998. It features a simple ruleset language to delay, duplicate, drop, fragment, overlap, print, reorder, segment, source-route, or otherwise monkey with all outbound packets destined for a target host, with minimal support for randomized or probabilistic behavior. Includes scripts to defeat even the current CVS snort IDS.
6899a61ecacba3bb400a65b51b3c0f76d4e591dbf976fba0389434a29efc2003
Windows 2000 microsoft-ds Denial of Service - The default LANMAN registry settings on Windows 2000 could allow a malicious user, with access to TCP port 445 on your Windows 2000, to cause a Denial of Service on Windows 2000 server, advanced server, and processional with SP0, SP1, and SP2. An attack could be something as simple as sending a continuous stream of 10k null chars to TCP port 445.
7fe2f78f85a4b46727a496296575d34dab9432bafa9cfa3c252c2610e27d4ae9