Remote exploit for Solaris that only requires a single UDP packet to the sadmind service to execute commands.
df93ce9efbde4852942b9d78c95fe371ef525a0f31005c84b1acee1eeed53a35
SGI Security Advisory 20030901-01-P - It has been reported that under certain conditions a NFS client can avoid read-only restrictions on filesystems exported via NFS from a server running IRIX 6.5.21 and mount them in read/write mode.
20adad9965ecc3ab9669c0c0f988b3136ffc46d036a3e2a4b59af98e260d296a
The Plug and Play Web Server version 1.0002c is susceptible to multiple buffer overflow attacks that cause the server to crash.
2b68d648120147ab8417ee871e9d52d166dd19a55bd2cd64fc864ba5ce18e676
The Plug and Play Web Server version 1.0002c is susceptible to multiple directory traversal attacks allowing a remote attacker to gain access to internal system files.
08a1508555f21666773d5967a389f637ade7bd17986669a075b9984c763bda51
Remote Pine exploit for versions 4.56 and below. Makes use of a vulnerability discussed here. Binds a shell to port 10000. Tested against RedHat Linux 7.0.
902cb346d20aea5cb1ef62db8c36a27a7f7588fb1b62a8d42cc9f4c7751ba3f6
Simple shellcode that prints a URL, setuid(0), setgid(0), exec /bin/sh, and then exit(0).
26b2e829da4fc284b1722992a44397e4bd90960f25e56c8d8f43f3c680af91e7
Yahoo! Webcam ActiveX controls are remotely susceptible to both a heap and stack based overflow vulnerability.
77415dcf52c38a6a335911442a1fbde9f49c7a2c7184a6d87d15d4affb71051a
Core Security Technologies Advisory ID: CORE-2003-0531 - IBM DB2 Universal Data Base v7.2 for Linux/s390 has two binaries in a default install which are setuid to root and have owner and group execute capabilities. These binaries are vulnerable to buffer overflow attacks from a local user that is in the same group.
230169f15f23404e9986d75dff6bf3eea592ff6e1d121c14056dd29c97fc181c
DBabble 2.5i suffers from cross site scripting issues that can lead to cookie hijacking.
9621a85331b7dc09b3f7e86de4a39a480e82852474c273f85f4ca1868cd200b6
KDE Security Advisory: KDE version 3.1.3 and below has multiple vulnerabilities in KDM. KDM fails to check for successful completion of the pam_setcred() call which may leave a user with root access. It also has a weak cookie generation algorithm that allows easy brute forcing of session cookies.
ca89ac53ce316b9854b4014469a8a0552a04c991fbb2de9ae77549da65820b6f
Sendmail is a very popular unix Mail Transfer Agent, a program that moves mail from one machine to another.
14ad00edc87c4e7b24884dc2db3bdcbff76d164f86e5794814e7b3d9019cba12
Generic Windows XP URL download and execute shellcode.
a34c8afa73948e9a867355665d03c33149372aaa3f3bfd06d5782544de061ed0
Remote Windows exploit for the RPC DCOM long filename heap overflow discovered by NSFOCUS. Upon success, the target will have a user added as the letter e with a password of asd#321.
1aecaf0cce333af298b5df7d6880ca92c9442ee27738f94ed70f45095f52b0a2
There is a remotely exploitable vulnerability in Sendmail versions 8.12.9 and below that allows an attacker to overwrite heap and stack structures.
28c280e02042929b8acc8cdcb07a215783ebdfe53633e6f8410bce341f4bbb14
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.
0ab456f9eb81241cacff3102350ca2d3d01b129d6cc59541457ba3b94e221918
Liquidwar 5.4.5 local exploit that has been tested on Slackware Linux 9.0.0 and Gentoo Linux 1.4.
6038ccaf0089d0c6b1b982024c5d6232813a117568c7c20900bb183dcfc26458
This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.
61d9b805f255e143dbbc50c6c60c24f55bc4f8f319909dd399b3a3a1ef7c77f9