pIRCh IRC client has serious security hole.
cdcf165828e41c32d75c9fb84a737f63c520399fa7955fc9c065a0b2d2b75469
quakeworld/win32 DoS perl script.
faf5c0d10b4e46718466df2675a5a29810e463188a32fd3e897e8eb82955f4bc
ROCKME Microsoft Outlook Denial Of Service exploit code.
269314cd746ad4c486cfe97507b53af1517205a1d58d79b417932f16410549ed
daemon.c code in all versions of sendmail allows for potential DoS.
f5b03c53debb8a3af2ee1e30daad6af1df151096a3682b95f4dc2ab970f140e6
kill almost any process in (RedHat 5.1) Linux without root, regardless of who owns the process.
eee2755e0a99b59ceb92494b23950cb3110fe444d9c8fe7bac8765212b1d7b6b
Sendmail/Qmail DoS through spoofed packets.
512b766cf0fd5ad331671f5e41f1bff1569ca7d20d9e9cb858da055382baa71f
Information on how to reduce effects of smurf and fraggle attack effects on Bay and Cisco routers. Contains solutions for other router brands, servers, etc... VERY useful information!
afc9b159023311da580bb13b467a3b2d73f152d86e9831fb31d50e10f1370625
Hidden community string in SNMP implementation in Sun Solstice Enterprise Agent and Solaris<=2.6. Remote root compromise.
056b2841b7c510bd6b525a5e53094e72228660c1a3564d4a53e6c7d56a6e1c53
Default Solaris permissions on /dev/rmt/* allow normal users to erase tapes.
0c4df424bd17945c73b802b333806efb18a838271599355738f6fa207ab0184d
buffer overflow in ssh-1.2.26 when compiled with Kerberos5.
643cf20a6349142f4bb9065c68f8035581dd8d9f553faad33802e6a262ff78eb
ssh 1.2.26 vulnerability; buffer overflow in "sshd" logging facility of SSH up to and including SSH 1.2.26. Remote root compromise.
6d0ebb60a92ee3e83bae249282058af6b1be9633723328e01fbf6336fca24c35
Vulnerability present in the SSH software allows an attacker to execute arbitrary commands on the SSH server or otherwise subvert an encrypted SSH channel with arbitrary data.
54aaf383c33fb781fd60ec1eed64a34df40d25935badb87a9b46a4892357f2dd
sshd 1.x/2.0 potential local exploits.
bda3b861b21c1dbdc0eec25f10e04e86bcf6fa79272dc454000765de30fa98dd
Swish search engine vulnerabilities could allow remote access to the web-server as the user that the server is running as.
f75207bdf0bb630971ee22f8779e0481275d7ec3151049205ff9b917e21ca0b5
"TCP Flag Test" -- 'excersizes' a machines TCP/IP stack by passing it all combinations of 64 TCP flags and seeing which flags are usable to determine which ports on the machine are open or not.
98f715fbaeb89df34336baa3463ccce06aa26a99110e8bdad4066f97ade0a939
USR Netserver 8/16 V3.4 running 2.0.14 is vulnerable to the old nestea attack.
db20f4d33d17f732c9232574b15930617ea65f57a245a0828ef4cc0b62e0df1c
Winagte killer by kefka ported to perl (1 line!).
524a1178cf4c6e278dff63cbca5bd77ea1c0d33fe1843e9fda3b7c377c11994c
Simple, yet effective, DoS attack against Wingates.
a7a29468338a2302683f66365c76277c039bacc656011b972c1296b24e290942
wingate-killer.sh ported to C.
762d485268c75fee15f694b974521ffaa410ecd6f675a306b25341189a74fd1e
DoS attack. Flood any unix shell user who happens to have mesg y set.
831ffc968fd091274edf98e228b01574fffa9dea3e85b84560d8b7d534a9076f
Several new CGI vulnerabilities related to metacharacters in mail address fields; numerous perl-CGI scripts affected.
3feb133063d160966ddb290b17d1ffe84032ea3a99d03512b02effdbb2dde7c3
Matt's wwwboard script contains severe security holes. Exploit code and patch included.
0cfbeabf6af79f26f7309df68419ced67e88d4d7c087d63221172d6d46d2ee26
/tmp/.X11.* has exploitable default permissions on many systems. Exploit code included.
f865cd9a6c929492df00a99f3e239a915296a23574bc946cf68add8f9f271d4a
Juggernaut by daemon9. Spoof and hijack hijinks.
945691b7f64ba557800a80049ffdfa029f615ec38abb18f09aee756a0be5e332
Red Hat exploit of abuse.console to get root.
10db790921be8915545d44ba8ee681be97c50c44f9fbd40bfc67da542d47afb1