Remote exploit that makes use of the BIND OPT vulnerability to create a denial of service attack.
d61ba95c78e60ced442db0b1497f20317a5b8b1fca1b31a131906138f13acf11
A vulnerability exists in the insecure creation of files in /tmp by Scrollkeeper versions 0.3.4 and 0.3.11. Proof of concept exploit included.
e0688a37a550e78e95f81f75c0a1a5d103aec32f940e904a1754d99dccb816fc
Webalizer v2.01-09 contains a remote buffer overflow if DNS lookups are turned on. A compromised DNS server can be used to return hostnames that are too long, executing code as root.
7055a3e82518d1a2f7545979aec64c7bdca857a417b4fd51475fe18fab55e87c
Xtell from the Debian Linux distribution is a network messaging client for sending messages to users on different computers. Xtell 2.6.1 with at least 3 remote buffer overflows, symlink bug, ".." directory traversal, file race condition, and more. Exploit spawns a shell on port 12321. Tested against Red Hat 7.2, 7.1; Debian Potato.
6ed195d3194377e4df0ecc29f2f8cb1d1bf25bebd9ce482ebca0708bafb87e3b
LogWatch 2.1.1 is a part of the Red Hat Linux 7.2 distribution, enabled by default and daily run by the cron daemon. On a system running LogWatch, a local user is able to gain unauthorized root access, due to a race condition during the temporary directory creation.
98ffcd498de4f7ca5cccf49a33a3d679c6ee9645522f117edf6b2e34c567d01a