AMD remote exploit that uses the amq binary.
f9d117869790e067d3a895a26af38832f3a03ce421b1cd1c1c538d7cc397b5af
stream2.c is a remote dos attack which uses ACK packets to consume large amounts of CPU. This DoS targets FreeBSD, Linux, and Solaris.
00e9a352d451a182c3b164b08eb3f0e785601818f7b898a84b811d45891d0ea4
Debian 2.1 local root exploit - A vulnerability exists in the apcd package shipped with Debian 2.1.
f7ca16d4ea9299fd7aef4c4a72b95848377702b1feeccf9d2d657e4193b25dbe
Packet Storm new exploits for February, 2000.
24408761a75586dc9b8a0d6043fa8ba8c42ce1143d750dd982d13c37ad1428f6
/sbin/dump on Linux is vulnerable to a local buffer overflow attack. Patch included.
70030d318162971da001a74c6ed300e763603b26a92fc3f781f8b5bac7a5d77b
The Xitami Windows 95/98 webserver is vulnerable to a remote DoS attack.
64fd8af32411e699883ac1a9b8fdeeccfc5dc800bea17a82b88105de457d8d4d
Netscape and Outlook are vulnerable to a DoS attack involving bogus news group file entries. Demonstration page here.
2bfc1b097a8fc3f4b77fc5f10820d45099aeff86130c9d05d7dc4017d565e8b4
Redhat /usr/bin/man exploit (gid=15 leads to potential root compromise).
d047a4471bf94117e04bb0e27a10406bced47cad8417a1cac07d960a8d4110c5
Microsoft Media Server 4.1 - Denial of Service exploit. This code will crash the Microsoft Media Unicast Server for Windows NT. We have tested this against machines running SP4 and SP6. Exploits the bug in ms00-013
cf6c20c1bd7246463c77ae25834294b7ce3a4cd2ae2fbfb9bfe122b462e14495
If X11forwarding is turned on, and remote xauth is patched, sshing into a compromised server can allow programs to be run on under your ssh client. This is turned on by default in ssh1, ssh2, and openssh.
083e386a21e2ee341ea8c6922e55896cde8a2b905b0e442bf586d17e95bf58d8
FreeBSD is vulnerable to a DoS vulnerability involving high speed pinging with packets over 8184 bytes. Unofficial patch included.
e6d81cdb10724ed192d48717002167649620f7b1c8833755743139dcae8ba13d
All versions of Sambar server running under Windows NT and 2000 (95/98 not vulnerable) have vulnerabilities which allow remote command execution.
7b13bc962d27ef93b883d59d73a68c652e8b342cd4167afd0fde35917066ca60
Georgi Guninski security advisory #7 - There is a vulnerability in Wordpad which allows executing arbitrary programs without warning the user after activating an embedded or linked object. This may be also exploited in IE for Win9x. Demonstration which starts AUTOEXEC.BAT available here.
8c815d047dd5d9b4e8a06fecc24985c9005b8075decd685d753f14bceca1b2b7
Sun iPlanet Web Server, Enterprise Edition 4.1 on Linux is vulnerable to a remote DoS attack. Many GET requests cause a kernel panic.
3d2d8fe606c710e7c1f85b7806cd14681cc6f8b5827957940ee2d1e143a45115
Remote vulnerabilies in the popular free email software Outblaze
5df78eeac0f105290b292936d7e3625d27b887b8dc7cbd37aa936f63bb2db1d7
Debian 2.1 local exploit - A vulnerability exists in the apcd package shipped with Debian 2.1.
20e0a1a9330cb3eb2152bce084249704d36e1eadd4f26b6d3b357b6c99c71410
asmon.sh - A vulnerability exists in both the ascpu and asmon ports to FreeBSD. Local root overflow. FreeBSD 3.4, 3.3, 3.2, 3.1, and 3.0 are affected.
911f207a0f8d6a25d7a509d2f1e665dc06ececed17e36c50b885d1c48567b0d3
Solaris (x86/7.0/2.6) local exploit for Sun's WorkShop 5.0 compilers and other products which use the FlexLM license management system.
36f48483c510695fffacc84e31f2a1eb85905b9dce7b7b3fd7e17098fbb11263
An ActiveX control shipped with IE can be used to install software components signed by Microsoft without prompting the user. This of course raises trust issues. Someone, not necessarily Microsoft, could use this control to install a Microsoft signed component in your system.
00f3f0b2e0d5491b814f02f98a69262203221432818c66cf49198886b616c325
This script sniffs traffic on the network watching for ebay userids and passwords. This is only possible because (as of this writing), ebay does not encrypt passwords -- they are sent in the clear.
047eb7cf864eff046548ebc72fe5010637e84aa5fe2d26b6f6c2a5b387b08d88
Exploit for recent FW-1 FTP problems - Demonstrate a basic layer violation in "stateful" firewall inspection of application data (ftp within IP packets). Checkpoint alert about this vulnerability here.
105b9db1985030576cb537ea4954c1985eb1a0c41554c114e8d7e40766964ac2
Qpop3.0b30 and below buffer overflow exploit. Remote, but requires username and password.
5bb66376ba934f2d28de1c8aeb6fd8c5a2ffc62e7eeb4f7942ea86aa3d8efd43
Frontpage-PWS32/3.0.2.926 (probably others) allows reading of any file on the system by putting /.../ into the url.
137d1427da44a3a1678c34f2c5e6d18c442d4b292586eb2186b4a6d260aca401
On AIX 4.2 and 4.3, the SNMP daemon is enabled by default and two community names are enabled with read/write privileges. The community names are "private" and "system", but are only allowed from localhost connections. Nevertheless, a local user may install an SNMP client, and modify sensitive variables.
fca6ebe0cf09746cd05366bd5c1a1506252c063978e36c0e845128326548d809
During the installation process of Windows 2000 professionnal anyone can connect to the ADMIN$ share as ADMINISTRATOR whithout any password.
28171d26faf3930c1a79b869e75aa51800e46d3d335d294936646c2ceee5982c