A paper released by Relevant Technologies discussing the commercial CyberAngel product that provides laptop recovery and file encryption all-in-one.
7056e8965c4297f056c153ba29228321fc8f6bd82ccc8e41c57e87670cd5daad
Local root exploit for terminatorX version 3.81 and below that makes use of LADSPA_PATH environment variable vulnerability.
4f35813134f00f905885cf87adaabd4c29fb3fb47e5d26036019542fc4d90a1a
0verkill version 0.16 local proof of concept exploit that makes use of a stack overflow when reading in the HOME environment variable.
d9ffab67b02140a647fe3c11ab803aecd99d5a2a8a0012207686042adbb302e3
UnAce version 2.20 local proof of concept exploit. Original vulnerability discovery made by MegaHz. Tested on Debian 3.0.
4cb6fde86f0cb3e02c0caaad2773c007f7043f6b1029f4337860c1836f828169
UnAce version 2.20 local proof of concept exploit. Original vulnerability discovery made by MegaHz. Bruteforcing option included.
d191042bbe5c634e4f3a8ef7041d81538d5210cf278f7e65753a216a082b7361
Six step cache attach for Internet Explorer v6sp1 (up to date on 10/30/2003) which combines several older unpatched and recently discovered vulnerabilities to execute code remotely by viewing a web page or HTML email. More information available here.
94ea12a634a074b51cb882c92f07466864fecdcb97c1c35652f1946575389bb0