Postfix versions 1.1.12 and below suffers from a remote denial of service attack due to a vulnerability in the address parser code.
e8e28a863997588aef90fb4e62ff99a22c91cdc08e3b2cd835651486388fcd55
Half-Life remote server root exploit for FreeBSD that works against version lower or equal to 1.1.1.0, and versions 3.1.1.1c1 and 4.1.1.1a.
898e3e82064b265aa059fca0a12fea7311f621681d5ab453ae2e45929872f676
Secure Network Operations, Inc. Advisory SRT2003-08-01-0126 - The cdrtools-2.x package comes with a setuid helper binary that allows non-root users to overwrite root owned files. Instructions for local privilege escalation included.
cbbba6e4ccd3d5a97d50f7d3e328abecc761e8017e481e8e7f64d1a64a99ca49
Atstake Security Advisory A073103-1 - Three vulnerabilities exist in the McAfee Security ePolicy Orchestrator Server and Agent that allow an attacker to anonymously execute arbitrary code.
39c4da258d3c16be42e6d5d36b203ec57d8400c5e932a4dfde6e4c3688971f66
wu-ftpd versions 2.5.0 to 2.6.2 have been found to be susceptible to an off-by-one bug in fb_realpath(). A local or remote attacker could exploit this vulnerability to gain root privileges on a vulnerable system.
26d10c27b7202a5cb1389a5a1f1668d76a81ead7b06f38bae80956501c6824ce
Linux and BSD x86 local exploit for xtokkaetama that gives egid of games.
b520af024cb9003b4e1a42a73b3409332209fffab5a67095c1e394f14a9b173b
Yet another version of the remote exploit for DCOM. This one includes over 48 targets for Windows variants.
bf987d60d7758495b19dbbcb9c74bf9c8cf6661de49ba2feed1fab38f3861de9
Yet another version of the remote exploit for DCOM. This one includes over 20 targets for Windows variants.
ceea1b53a03512f23a0039ba663ea047a540918f279a32a728a77f8c5440f50d
ThreeZee Technology Security Advisory #TZT002 - GameSpy Arcade allows for arbitrary file writing due to a lack of file extension checking in the GSAPAK.exe binary.
ab5ef565cea587e770cc35b8c662b36159dd53ccba85ca369f780905953f94d1
New version of the DCOM remote exploit that uses a magic return address.
e5c92fea127afc1160f63d29acf4ebb26561218ac01cee7a18d6b64cba4c894f
SGI Security Advisory 20030704-01-P - It has been reported that the IRIX name services daemon nsd can be exploited in various ways through the AUTH_UNIX gid list. This could result in an attacker gaining root access.
1c492bd25cd117c9719328492ea5a0d705616c02c747a27c46e6a7f055116b8c