LCG Disk Pool Manager (DPM) suffers from multiple remote SQL injection vulnerabilities.
c09db0699a877aaa44c50f0e0b466403ccf2000c38640bf54a52c32b5d1f0385
Lighttpd versions before 1.4.30 and 1.5 before SVN revision 2806 out-of-bounds read segmentation fault denial of service exploit.
a78ebddef1ff446f752bc857193d5fc6a7bb8cdaa8a66f37a2fd64a80504bfe7
OpenSSH with gssapi-with-mic support suffers from a resource exhaustion vulnerability. It is possible to provide any value to the xmalloc() function, which is a simple wrapper to the malloc() function. This forces an application to allocate a huge amount of the memory (4GB?) and naturally exhausts available resources. Repeating this attack, by simply open many session, can kill the server.
65e738aed80888821cfc7b7291b21f403013fd57e28e24c9a17233bbb9662c26
Torque Server versions prior to 2.4.1.4 and 3.0.[0,1] suffer from a buffer overflow vulnerability.
d42dea2627d928ed2511106108e44d93bc90572f0feebc4a43a5e9fbfbcc8c7b
FreeBSD version 8.0 ftpd off-by-one proof of concept exploit.
a17d270d62782bdb0279584ea2dad8c8fe353c35767657f09ffda201da15d4f5
Mod_proxy from Apache 1.3 suffers from an integer overflow. Full details and proof of concept provided.
11dd93d3866b4c509284c60e2c79acc4279efc7fb07033aa2aaf0688759ed0f2
Xpdf allows local and remote attackers to overflow a buffer on the heap via an integer overflow vulnerability. Xpdf is prone to a NULL pointer dereference attack. Proof of concept pdf included.
f018780c48e64bea6962cec1802929ee779c256f795667d18cd48ba561b20f2e
Mtr suffers from a local and remote stack overflow vulnerability.
b5aaeddc9d0203578469fd018747dc56aa4cb6f38fd0d0cff0a0cf01e4b890b2
IRIX MIPS processor shellcode. Tested on R12000 process with system IRIX64 6.5.26m.
a44477ca1f8cd02261ab5c90a11b65a2d02cc650a4771be9db30638bfc80f798
Port scanner that can perform SYN, FIN, NULL, and XMAS scans with options to perform them very slowly and in decoy mode.
2bcf0d84a7c42318177d48b119992c9c9bd61b342e62e2177213a4f763875e11
Fcron (convert-fcrontab) allow users to corruption on heap section.
307ba9a0f7b0232313ae1444b91ef1bddb17413092dccb371e43e011fc3bd6c5
GNATS, the GNU problem report management system, allows attackers to overwrite any files when installed setuid root. Versions 4.1.0 and 4.0 are confirmed vulnerable.
4031dc7bd80756c01de19fbd5c5b10ed61647fcf3d7a8d671efe64383ea17a13
Exploit for wu-ftpd that makes use of the globbing denial of service flaw.
77b446fb929c57c3b6eb8452ee7f7f4034c86535094cd0eb6f01b548f2c92aea
iDEFENSE Security Advisory 02.25.05 - Remote exploitation of an input validation vulnerability in version 2.6.2 of WU-FPTD could allow for a denial of service of the system by resource exhaustion.
b773a75845596f1ab351ab1c13be23ca2743bbbe9b69eb4ece8d77d6739e7afb
Remote proof of concept exploit for the buffer overflow vulnerability discovered in Exim 4.41 by iDEFENSE.
753d89e248ed9f5367270763d2d68d1468737e48ae16a35a50dcfe7aa88d72f4
Exploit for the Atari800 atari emulator. Allows for local privilege escalation to root six different ways.
760cd8cf8696f135ffda0b2089c0d717801c12d775ac0adf04bfd86a5a846d7a
XFree version 4.3.x local root exploit that makes use of the vulnerability that exists in the use of the CopyISOLatin1Lowered() function with the 'font_name' buffer.
5f80619f3d14965d61bcf967f0b26ae2e5d1de37280e8076979c4872b7760af0
The game 0verkill is susceptible to multiple buffer overflows. Remote exploit for the client attached.
7d2eb5c5920c68dd27c52a9f04b753988fd9871025110681a75d6a2a2c80d2d5
Simple shellcode that prints a URL, setuid(0), setgid(0), exec /bin/sh, and then exit(0).
26b2e829da4fc284b1722992a44397e4bd90960f25e56c8d8f43f3c680af91e7
Local root exploit for kon version 0.3.9b-16 that makes use of a buffer overflow discovered in the -Coding switch.
1586b70f358e651d05f55592aa0f4e846738771a8dd29314ac025f542afa01e6
Denial of service exploit for the Pi3 web server version 2.0.2 that makes use of a malformed GET request.
a8f85d35b6797d09c4202c3b2fb8795e1815a65b2aacffdf8e99139fd252c0cd