Espernet irc services below version 3.3.5 DoS attack.
72d5370fe68c0e67d10e9f0e2d392a30a126a910a170db95b7a05764783477ce
Win95 Exploder - Exploder Active-X control. Puts down Windows'95 machines via WWW. Be afraid.
7eb11ebedad770310e7f98d9a730d54c3b4c021d5bc72d91b26d4115f86af030
Intel Pentium f00f Bug-exploit. BTW: Modern Linux-machines are immune...
0f19dab9b12e1c45855181ff683e6704be0631edba0950cab199e24db0bdbd6b
nestea v2 DoS attack works against freebsd 3.0-Release when using precompiled Linux binary.
f5936a8bbbf39337b655aca78b34f6e1619bbd631e77c3866fbbb8f18556984a
Solaris 2.5.1/2.6 fingerd DoS attack.
d5347656f101832059ed482219129ab7cc1cbe2931e9e7eb402b9bee4f07e2a4
Variety of exploits for FoolProof for PC security software.
aaf56dfc0b2624255745553747f33bd0aaa2c10f965da41c18f7833b66bad013
Vulnerabilities in the freestats.cgi interface at freestats.com allows malicious users to overwrite critical parts of database, including user profiles, passwords, and even entire accounts.
46c69ccad920daef5a98807c7014d4562a9288d00ef4eabe62d5cc41f2203010
FWB Hard Disk Toolkit 2.5 security holes. Users can bypass hard disk driver level passwords.
18aedd80070a540763337a1c936f15d67b98757aeb8756a83bb5cb48a33a17ef
Creates the file /etc/hosts.equiv if it does not exist (or appends to if it does) and will insert the host: b00ger.
5bab5184c8e3fe5a2a940be0befa86ea93afe9c2795a922f7f29ca5f487fa6d6
code to change to hostname of the target machine to: yEw_r_0wn3d. joke.
9f74a4bebce5ad2d9b18a77e9846a437fc2b9d7941789c432614fd578b5d0a2f
hoze.c : pmap_set/pmap_unset spoofer (portmapper v.2 and others probably).
cf2fb2420983d0bb2669bf3c45134f972db2645552011a0a5834e882e48ca114
klogd 1.3-22 buffer overflow, root exploit.
b29f022cbe9d14cbf279d20b943ef316a04a19bf35a20685bbb2c968b345f5ef
Several buffer overflows in protocol handlers in latest versions of lynx. exploit source code
3c79487c6bfff623323f40b94c287a4948ac1f5128cf2be2e2da599c424b7bcc
Macintosh Excel98 security bug allows any user to bypass hard disk security controls and write and overwrite HD files. Root compromise.
5bf4a2adc7e357a747f7e3be8f2e04b6609ce1c8d08ffa9c6dc9ce3b5f60dd0f
potential local root compromise with midnight commander if default permissions are '+s'.
6a31db12a9a06005ea8d20a32658cafb7fcc5aec8a442084e85fe9c54635ebfd
mpg123-0.59k buffer overflow with exploit.
8e2c051aa39abb36b1cd2a84664449c3a22e8da7ba59275e553a12b6b5c52870
DoS attack using Java reveals vulnerabilities in MSIE4-5.
99af3fd984a45deae4f77fe9a0d788125d34460ddaba06329af03a9fe3eb30f1
Several new DoS attacks in Netscape 4.x browsers. exploit source code
393f0a0e1fc3b2aecc479c11517b5ce44c7a0b3f24b63b302a0144266891755a
simple port of the Netscape Communicator JavaScript security bug to UNIX environment.
12edb33aa50e6b46d3b944c3d0a0b5205953bdfa4bddd85f996c4d7abcdb23fc
More JavaScript bugs in Netscape Communicator 4.x. Grab user caches, local directories, exploit via email.
658637eb42fbdce0acb6c3aa1a62295a409dae1c93ef832d418ebadc61143bf7
Token Ring Windows NT 4.0 machines will crash with a BSoD when a packet with bad data in the RIF fields are sent.
0f2107df916b180f048ad680e5abdc4b3ff083753758dba646f99d404e64bf85
named scanner used to find sites remotely exploitable.
36a0d5e8473c6751d56094d25ed0110121aff9b8f31ff1ef8b90086f1e31a29e
Communicator 4.5 stores EVERY mail-password in preferences.js as plaintext passwd. Both your passwd and mail are vulnerable.
aa235fd860c96d9ede810b46506add9766dd9ca2c2ff1195775b59f24b5afae6
CPU DoS against NukeNabber.
03d70630d50c467c63b46587df96463d3fbabe3bcf7bcfd23fa81d3961678c5d
sekure ping backdoor for Linux to bind shell.
023f1f668b9d5b627d75e782c1109ea276d810edef14ebef10be89144312e356