AsteriDex versions 3.0 and below suffer from a remote code execution vulnerability in callboth.php. Full exploit provided.
794379780fb3e3988a39c423bf0d884ff440774220df9bdf836c25beaaf1e46d
SaleLogix Server and Web Client suffer from bypass authentication, privilege escalation, SQL injection, information leak, arbitrary file creation, and directory traversal flaws.
cf52df7a7caebca0796139424646c88526767a6d48c7e79e1dfe9288dfa48f9e
Remote exploit for lsh 1.4.x that makes use of a boundary error in read_line.c when checking for errors. Spawns a bindshell on port 45295.
e168f8955d32dfb71b3687b375f1e860d3b0793aad3026a1c30016d53a3c21eb
Apache 1.3.x using the mod_mylo module version 0.2.1 and below is vulnerable to a buffer overflow. The mod_mylo module is designed to log HTTP requests to a MySQL database and insufficient bounds checking in mylo_log() allows a remote attacker to gain full webserver uid access. Remote exploit for SuSE 8.1 Linux with Apache 1.3.27, RedHat 7.2/7.3 Linux with Apache 1.3.20, and FreeBSD 4.8 with Apache 1.3.27 included.
35db86fbefd818ae72497d5bec23002b6922e45da53d40b85d2ee31a56599032
Citadel/UX BBS version 6.07 remote exploit that yields a bindshell of the user id running the software. Related advisory is here.
cce805d9b2f7de8f751fa627e8d554c704a82f2b001a4e1d329686ae2155bb8d
Citadel/UX BBS versions 6.07 and below have faulty boundary checking that allows arbitrary code execution, poor random number seeding that allows predictable authentication tokens, and do not keep a user from filling up the harddrive when entering in data via the biography section.
85126978760da416df1927103a59644cf4487bcea2d8fd64641318e7d07a0eb7
Carl Livitt security advisory CLIVITT-2003-2 - A format string vulnerability has been found in the plpnfsd daemon that comes with versions of the plptools package prior to 0.7. This issue can allow code execution with elevated privileges and has been fixed in newer versions of plptools. This advisory contains exploit code that may be used against affected SuSE Linux systems.
f829611591f0d2e1fe21f665a3734db57a1c622bdeb93d60a441b30612987c9e
Nanog traceroute v6.0 to 6.1.1 local root stack overflow exploit. Tested on SuSE 7.1, 7.2, 7.3 & 8.0, and should work on 7.0 and 6.x.
c117a8279378925e5c59c548d1f41f7d690bedabece5621ae083f62735be93c1