Remote DoS against inetd and ssh
66dc9c762f26912bc7d42673c2434de74ea521ae5faa3b865eecd6cda6636e16
In libc, the LC_MESSAGES environment variable affects the behavior of messaging functions. A vulnerability exists where a buffer overflow could be exploited to gain root access.
ff8df4fb487d8f783e7736e092e227b51d412592959553197dd7bec6270aaa54
Vulnerability in ttsession (part of CDE)
26e07263bb45733d8b0d3b9c7360d462a27be45b6262d984e0a9e95a17b9de40
Security holes in the implementation of vlans in the cisco catalyst 2900
d56c6e51ec884d03771e17f732fd76557cf0aa4676491ddb1132af6facaffe4b
Denial of Service attack on a machine based on inter-process communication vulnerability
9ab06f6379861330efe760209694174d01198415ba8416a657806b73950840ef
The attackers can use a misconfigured TFS SMTP for spamming and can remotely crash the TFS SMTP Gateway.
5002ff4f9fdd2b46ed97be4fca567d763b95aebd882c60f99ee8412f52519223
Buffer overflow exploit for Solaris in /usr/bin/mail
21d241b2a3120027a1def943a514281ac103d314214601fc19dd8fd001c77802
Shared memory DoS - IPC vulnerability patch.
d1ea298fbd785b06b60d0bc57e40ffe670c9dbfdef8eb9c99e50f9f40ca3187e
Exploit for the ProFTPD log_xfer() buffer overflow, allowing root
97aeed8685414d5ea2be467c6721db8d6b6805bc4b96b29d536106b80a82fe7d
Auditing for RPC vulnerabilities? Use BASS
0ddbe8d19c5f37b9eef1b99ec2da9fc3c3e3d0d3f9a31fd439dc122780797227
Buffer overflows in various SCO 5.0.5 and Skunkware98 programs
a7254b7c14624ee6e4d8405930bca6341ed5f6848c3a8b6aa8b497825f081aa6
A security hole in SCO UNIX 5.0.x /usr/bin/lprth exploit code to obtain root
a03bc281e15b3bb05b54c52f39d5457dc4f199eedc99a1fb76ffe9ab7e07891b
Many kind of POP3/SMTP server software unders Windows buffer overflows.
36aaf91caa3953aa176add505a0aac00dd4248c76dc4ba5f922510fae72b4cc9
Netscape4.x buffer overflow
11f04cb08f8e9f9424fb4a3c60c801de3522bbe05c0936df6de7f73ea52401ee
Free BSD exploit for NFS
0c092f55ab801a7107a31e5fc329340f2bd523869e09f4edb238c42148480da1
A version of nmap that will query open TCP and UDP ports to determine whether they are RPC as well as their program name, number and version(s) .
114df74179e5da7e80173723d6edb46efee16648a68e10f024adf3e089e87728
Mac OS encryption algorithm exploit
8b2052a46b3db2b821456ca62096eff403935e00f150afbfbdf6c52d63b6b051
Limit the maximum number of processes using Linux-PAM.
d531de1bb538021bd6512fe3857c8a5d0dfa0489acaf5e84e80ca9008873a4df
Patch Available for "Fragmented IGMP Packet" Vulnerability
50b84caec5d3513917cbe08026a99be1549e533d043c4b5b91d80a6223717a12
Netscape 4.x exploit for Windows 98
f086faaba50e650c83aeae44dbe9880f5db6ed50ee75b3ab70543e8f7245cba3
Exploit for NetBSD that ties up all the network resources and makes any networs I/O nearly impossible
c48f3bef5c3878e3bad646aab8d73e8b1e81b783c4ca5da9b868a58b412b29ba
Buffer overflow in the CDE calander manager
8f5e5de7534bf0e477643df1486f6637bca0712f5588dd418fc41379d2ee69ce
IE 5.0 security vulnerabilities - ImportExportFavorites - allows all sorts of nasties
fbf8f6173048226e75cfc52b7f460b359e3f0fee4dae56068beb0c5d8ce09dc5
Linux Suse exploits for /usr/bin/pb and /usr/bin/pg that allow any user to read any file on the system since these two mentioned files are suid root.
c1d4912aeb9c1f017776d1687c20aea59e9179c8db14d711497a72b6e7043025
Filter (elm package) security hole
729d9ba2214bd70900d69af921d7e5336e8e6f019a1cb970d370ea636ec37e79