A denial of service bug was discovered in BitchX - a nasty user can invite you to a channel with a %s in it, causing the client to coredump. This is a classic case of printf(variable) where variable contains formatting chars. Patch available here.
d314b02f3283b0b921e3c16a0e5bd4fc35f5d697e913f7b6012543988df5805c
SecureXpert Labs Advisory [SX-20000620-3] - Partial Denial of Service in Check Point Firewall-1 on Windows NT. The SMTP Security Server component of Check Point Firewall-1 4.0 and 4.1 is vulnerable to a simple network-based attack which raises the firewall load to 100%.
61c0ad7d028e554c35d5167f8ebd20c832a6adbd1bb7c02554be5c77505b3562
SecureXpert Labs Advisory [SX-20000620-2] - Multiple services on Windows 2000 Server are vulnerable to a simple attack which allows remote network users to drive the CPU utilization to 100% in an extremely short period of time, at little cost to the attacker's machine.
191c6adfd847ea402235201869f564559ee66cfe136a02c7e35f348121711f8d
SecureXpert Labs Advisory [SX-20000620-1] - Denial of Service vulnerability in Microsoft Windows 2000 Telnet Server. A remote user can cause the telnet server to stop responding to requests by sending a stream of binary zeros to the telnet server. This can easily be reproduced from a Linux system using netcat with an input of /dev/zero, with a command such as "nc target.host 23 < /dev/zero".
75c77bf0657fae44cbe5c5587fc4118b7d0679ae59041f32fa493cfc21d0f95d
Delphis Consulting Plc Security Team Advisory DST2K0019 - WebBBS v1.17 for Windows NT contains multiple buffer overflows, some of which allow remote code execution.
d82eeef70f6585ce7e748912ca67a16cd5fdbba6951e5096053b19902d66b3ad
Razor is a configuration management tool which has a serious flaw with the Razor password file, rz_passwd. It can be decrypted with dumprazorpasswd.c or passwd_rz.pl which are included.
82300ec15648f4a16224b4ad863d3c7cccc62a8d21ec4dfc1f9afc652a204554
iMesh V1.02 Beta build 117 remote exploit for Windows 98. Exploits a buffer overflow to download a file from a given URL and execute it on the remote host. Includes windows binary and C source.
fdac6101b44177dac984a8a1c7f42db4cc6a06d01a432a007d4b060595a4cc66
CheckPoint IP firewall crashes when it detects packets coming from a different MAC with the same IP address as itself. We simply send a few spoofed UDP packets to it.
ad01316cc5a45abb3776b8ade259c2dc2b3b162171ce1778e569bed038e2056d
SuSe 6.1 through 6.4 local exploit - when root switches users, /tmp/ will be the $HOME. This exploit will create a suid (user) shell when root su's to a user account.
0c640e5bd6cad6ab1a9f902ec11367abac1597d2768eedf475e4293e23c3c435
Gnapster 1.3.8 and Knapster 0.9 remote view file exploit.
53c82a8e2d27ddb652a607c8842ffdc06767db6dc99711ae7c83b0e6575c08d9
ProFTPD 1.2pre4 remote buffer overflow exploit. Requires a writable directory.
ddaa523bce8660f1ea7139487103115776722b6432a3e876c8f85d29b5c96cc5
JRun 2.3 remote buffer overflow exploit. Runs a shell on the port where the JRun webserver daemon is running.
0009f8a8198fbfbcd6431fe2f632926a00f52ef872ba53530e82d7fec95be05d