fetchmail on Mac OSX versions 10.4.7 and below suffer from an arbitrary code execution flaw.
a79a85fa9c78b353f28bab9c307f950ae95726f9619a959e9e455eb143f10992
Remote exploit for the Syslog server by eIQnetworks that has a vulnerability when processing long strings transmitted to its TCP port.
60bffcf1a26deeb9ebda5eb75a657c002ee82720c1ef7a36d68131a01a17d94d
Remote exploit for the buffer overflow found in the LICMGR_ADDLICENSE Field of EIQ networks network analyzer.
2fd385aaecbd319e45011cb0297961bc7072184913dd3828fc4dc4b0331f3984
Proof of concept exploit for Mac OS X versions 10.4.6 and below which are susceptible to a vulnerability in launchd's syslog() function. PPC version.
219477bc10fd86f44e79866b7a5a535c7bfad56e533185cc869da47f54021bdf
Proof of concept exploit for Mac OS X versions 10.4.6 and below which are susceptible to a vulnerability in launchd's syslog() function.
dda0b65f359384ab350d9017041509539f3b96081550de30781a83c0f6e82742
Mac OS X versions 10.4.6 and below are susceptible to a vulnerability in launchd's syslog() function.
ebe05c1d233358f6cc47cf20ff34ce80da5d2fbaea89f2ca9ece03f88113cdf0
Paper discussing new avenues of exploitation for OSX systems running on Intel hardware. Details ways to execute code despite the NX bit being present.
9d18fe12fe6c0f06eef46fae37e5f916eab293d3d1e3d6cb0c09d272fb631603
ClamAV freshclam suffers from an incorrect privilege dropping vulnerability.
d99dfdbc0180fa1f1ace658b029461b9473dd08a3bfa42d4a2b470b5aa3e3137
rdist NLSPATH buffer overflow exploit for Tru64 UNIX 5.0 (Rev. 910).
4c4a19453affa5482e5bbca99f5e8e7e6d25e7f2f3f895644df68abc77e86074
edauth NLSPATH buffer overflow exploit for Tru64 UNIX 5.0 (Rev. 910).
f73421b49ce9bd7859f4e56e743fa6c9d04c1db4b6d1f331a4c65e5863484bf0
DMA[2006-0313a] - Apple OSX Mail.app RFC1740 Real Name Buffer Overflow exploit.
13f2fb6a69d07991ff1a09e325d85755140c6c20f25a04064067a182186dfc6b
DMA[2006-0313a] - Apple OSX Mail.app RFC1740 Real Name Buffer Overflow - After applying Security Update 2006-001 Mail.app becomes vulnerable to a buffer overflow that may be triggered via a properly formatted MIME Encapsuled Macintosh file. Sending a file in the AppleDouble format with a long Real Name entry will invoke the overflow. Reading through RFC1740 should provide enough information to trigger the issue. The overflow is triggered by the file that contains the AppleDouble header information.
3edf284ed4ed9d45709010aab5c5a4c039e10a8f50cc01ac609017ae27a9b392
Whitepaper written to address both FUD and rumors surrounding the release of detailed information about the InqTana proof of concept worm.
97f38cd5ac3a5a8e7f37fced12c45e663ce5ca7f24ea52a2d3c528ce2ed49f19
AmbiCom Blue Neighbors versions 2.50 Build 2500 and below suffer from a buffer overflow in the Object Push service.
da47d3a1cfa2a10633bedd980ce061b8059930008236018cc8db60cc23de5f44
Using ussp-push from the Toshiba Bluetooth Stack versions 4.00.23(T) and below, an attacker can place a trojaned file anywhere on the filesystem.
032e619b38af3404776cca356075de5f940987e34114e0fcfc11faaae45c8d2f
The Widcomm BTW suffers from a remote audio eavesdropping issue.
866ef0aaf005e2d1e28227c8b6a9b0360290e3611a675df0bb6706bd1d5e5344
Patch for ussp-push that allows you to exploit the overflows discovered in the Widcomm BTStackServer.
0e42bdfaf64c52451da826f13806b1f19737198ef4ee6c79b7376721678cb3cd
Interesting write up on the exploitation of the Widcomm BTStackServer used for Bluetooth connectivity.
4981b2c6e270ad216ac899d27addb88e2e5b92507be34df0f6b93c2ec2d8d339
Remote exploit that makes use of a format string vulnerability in sobexsrv.
70af8edf82d16d5c0a15f619b7c245147a561588641160e58d5d55fedecb6bb3
DMA[2005-1202a] - sobexsrv is susceptible to a format string vulnerability.
76c84e2bf4e5cd57ebbbffba7467689a561d8e8da82bd825409341907cb1c713
Veritas Storage Foundation 4.0 local root exploit that takes advantage of a buffer overflow in the VCSI18N_LANG environment variable.
587a778f72ac01b11f2daf11d28d6e33a3c6d445c52a6d3b53972ceb9b9746b2
A buffer overflow has been identified in the VCSI18N_LANG environment variable which is used by a number of setuid root applications in Veritas Storage Foundation.
1ce7f2efa1b083250601260fef3536057de94ea8ec55c3048d69d5ed9d37e836
Exploit for the format string vulnerability found in the friendsd server that comes with GpsDrive. x86 version. Binds a shell to port 5074.
de673cde91a63e038403a137ba948626e811cb07bebe8fe092b400487c6d5169
Exploit for the format string vulnerability found in the friendsd server that comes with GpsDrive. PowerPC version.
768ba4a55ceffa1d68472a0647f755e17c5a821c24580850c632022b10c98bd8
The friendsd server that comes with GpsDrive contains an obvious format string issue compliments of a bad fprintf() call.
ec70d84c5f0cca691f8ba58bee71f8d6fe7cc9f04578b31c5892e4614ff209f0