Remote root exploit for ProFTPd versions 1.2.7 - 1.2.9rc2 that breaks the chroot and uses brute force. Tested against SuSE 8.0/8.1 and RedHat 7.2/8.0.
e1b8169e56e2b24443a163f1d695b621b114d4358c11fe13d71fa81194edffd3
Microsoft Windows Server 2003 allows a remote attacker to traverse directories and access arbitrary files via shell: references.
c746e2a9099c4bcf5bf8b1e876119b6acf3fd8066c84a86cf3960711f866973b
HPUX dtprintinfo on B.11.00 is vulnerable to a buffer overflow that can allow for privilege escalation.
18cece8ec7ddb9a30360119d056d1a27c301a94681f9e7898fecc7084e1d9e7a
Illegalaccess.org Security Alert - Openoffice 1.1.0 is vulnerable to a denial of service attack when enabled and a TCP connection to the daemon gets fed a bunch of zeroes.
f0e475822a5cb5d02bafd4ef52b5d3bcc86b303db8dcd07cd2bef486b0ce779b
Exploit that swaps the Windows Media Player with a message from Mindlock by making use of the Internet Explorer 6 XML bypass flaw.
6d864fa1511c92363d78b3e78af1299d57f03f4e40cdc69d731afd9c894c6e8f
Easy File Sharing Web Server 1.2 allows for remote access to logs and options without any type of authentication.
1f238918cd90aa0dc5dd59a8410daa436e3f3811bccae026948c30e06e1ae6a1
The Conexant Access Runner DSL Console has faulty authentication capabilities that allow an attacker to login as the administrator after one failed attempt.
9ca461e85238f47a1609559d07b6f180830fdb3564d26d03d99cffae24b0061d
I2S LAB Security Advisory - The HTTP daemon for FirstClass build 133 (SP3) and below suffers from a heap overflow that allows a remote attacker to shutdown various services on the server.
4b4cb1c418dd9a284c326f4da4b54e1bd17564a3e611c57ea4f3c95584b47532
GuppY versions 2.4p3 and below are susceptible to cross site scripting attacks and have a lack of authentication when various data submissions are performed.
638ddd4acfb1768d65554ad49dc68964fd98689e44a4646b73d7ba18355e680b
EMML version 1.32, or EternalMart Mailing List Manager, and EMGB version 1.1, or EternalMart Guestbook, are both vulnerable to cross site scripting attacks that allow for remote PHP code execution from another site.
850e833f809c4877c234514fd44139518b0302cac84561137c81c6348bc08e0e
PHP Nuke 6.7 is susceptible to allowing arbitrary file upload and execution via the file mailattach.php.
685e128399a15d42c3ea8f47b608c882803d1bd7b26e13a3e5a915ccdbd4fabf
WordPress Cafelog is vulnerable to a number of SQL injection attacks that allow a local attacker with access to the same filesystem as the database to exploit.
74b75135b16d5c546fca3aaed5d5aa888b0f45c7d26468f13f0b98bff599dfbb
Exploit that brute forces Microsoft's Active Directory authentication used in conjunction with the Cisco LEAP authentication on Cisco wireless access points.
5c87ee16dceaedfff86ef27f5cf5d747efa9ad7350b93a83fb929b17843d3b02
Inside the PostThreadMessage API, any user of any security level can give a WM_QUIT message causing the process to terminate. Sample exploit code included.
dae92371caa61085fff77e818f7e1bd44af495374120d1706c46fb9deee38189
OmniCon WinShadow version 2.0 exploit that makes use of a buffer overflow in the client handling of hostnames in host files.
86813402c8fb4dfc3ce919ffaaa3d42a89d9a501b49144029fa04d5764e3e764
DCP Portal 5.5 is susceptible to multitudes of SQL injection attacks.
4f047b815f0a078df914af5f2b80023f7c43c58e79712d72f8210ace0cbbed7c
Local proof of concept exploit that makes use of the HOME environment variable related overflow in Silly Poker v0.25.5. Yields group id of games.
88b463d11b64bec685313e31b98d0f4ed4c1b35c157792bd2f92bcfc6e7a6850