Remote root exploit for GNU Anubis 3.6.2.
3706cc19a90101297f16f0d876bb10fb413ee57eb509b253379de3d1b73e99e6
PWebServer version 0.3.3 suffers from a directory traversal attack that allows a remote attacker to access any file outside of the webroot.
ea3ca487389324ffa7305aa2021d36ed14251e5d30dd90ae1340b73839d76f18
Haegemonia version 1.07 and below denial of service exploit. Updated to support the other games from Desert Rats that are not even released yet but hold the same vulnerability.
e6a331c593c7fe0a0312e639ccf14bdb041134985719b0f7680d0a645160c8ec
Invision Power Board versions 1.3 Final is susceptible to a cross site scripting attack.
93d8939b30b06bd6edcf59474442458101779057deb1b80413667302d3c4d1bf
VirtuaNews Admin Panel version 1.0.3 Pro is vulnerable to a cross site scripting attack.
205786c68330b41eb6b26b19658148764eb7d43fc3a1175dc049219bdcbb8f1b
Exploit for Red Faction versions 1.20 and below that have a client-side buffer overflow.
01c7b9282fc2aa240cbc56fcdaaa2305670964794ae290b72a06e4e3f1e60a0c
Remote exploit that makes use of a buffer overflow in GNU Anubis. Vulnerable versions: 3.6.2, 3.9.93, 3.9.92, 3.6.0, 3.6.1, possibly others.
6f547b7717fcf62439171559f0223a0358e15ef1457120541045bf8af97228f1
SHOUTcast version 1.9.2 remote exploit with connect back code. Written for Slackware 8.1, 9.0, 9.1, and RedHat 7.2.
4871cfddef91c577c554b14dfdaf2472474b595033fe12ccb112b6a54d289e32
GWeb HTTP server version 0.6 is susceptible to a directory traversal bug that allows remote attackers to access files outside of the webroot.
c20a48105f58c207217782b131ab51bde54557edd4d00995be8d9650ff678743
Remote exploit for WFTPD server. Tested against WFTPD Pro server version 3.21.1.1 on Windows 2000 CN SP4.
36efa8521fe6d42fba082e0c14015fe3be98a3a0ad14ca3a9df03000a85bc69b
Motorola T720 Cellular phones have a vulnerability that cause a denial of service when the phone receives an abnormal amount of IP traffic. Upon receiving the traffic, the phone powers-off when the user attempts to access the network.
3c3012ee943ab155015cb94a94a705b5b7f6384e9067ab8966ff66d07ec2c944
A critical security vulnerability has been found in the Linux kernel memory management code inside the mremap(2) system call due to missing function return value check. This bug is completely unrelated to the mremap bug disclosed on 05-01-2004 except concerning the same internal kernel function code. Versions affected: 2.2 up to 2.2.25, 2.4 up to 2.4.24, 2.6 up to 2.6.2.
483ed3b485fe72175ca9d4f6e07e3c8cc8998ed7ee2f98e6a72a1016b9373ac3