3CServer ftp server version 1.1 remote exploit that binds a shell to port 1180.
b5968e526f536105d0b7f4dd141a4dd4e87ff1181b770a5035d8b3578d83f457
Local root exploit for the PerlIO package that makes use of a buffer overflow in PERLIO_DEBUG.
9d0552984b75d1eee91c3d55047ad2d3a217517c70c32a822a80f3f6ad4a4f98
The PerlIO package for Perl 5.8.0 suffers from a flaw where PERLIO_DEBUG is susceptible to a buffer overflow that allows for local root compromise when using setuid perl.
5e2549b861e8546d6c9a0b6ec2aca70aad65786d7da42bf5b87389a324a0c5d0
Local root exploit for the PerlIO package that makes use of a flaw where manipulation of the filename set in PERLIO_DEBUG allows for local root compromise when using setuid perl.
37c8e812ac9515d45c3ee54cc72ae33c4155953042f46623108ce7b9ced75a3c
The PerlIO package for Perl 5.8.0 suffers from a flaw where manipulation of the filename set in PERLIO_DEBUG allows for local root compromise when using setuid perl.
fc3d56a58c6c7d2ae08bf3106a893f605a2d8ba788499383f222dd779ac04d0f
ike-scan is a utility that discovers IKE hosts and can also fingerprint them using the retransmission backoff pattern.
52d5be7cfeddbc5fd01bec42fc8d39f1d86ce5584bc8e2553ab2b55673835e60
Secunia Security Advisory - Carl-Daniel Hailfinger has reported a vulnerability in the Linux kernel, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).
3164bf152132db85dccb5c7f6097403ec884cceced703a68672ccd3eb50eab3b
thefacebook.com is susceptible to a cross site scripting attack.
9a84bd32409cc970109d3557c565d339ae25182a960753cf758fbdce4603a8cb
Secunia Security Advisory - Avaya has acknowledged some vulnerabilities in PDS, which can be exploited by malicious, local users to gain escalated privileges.
f2050d1837bfcdf7b9193c1b2e4729a5c6fda3dc4d9f6ed88e4eca7f0787b98f
Ubuntu Security Notice USN-76-1 - Max Vozeler discovered a format string vulnerability in the movemail utility of Emacs. By sending specially crafted packets, a malicious POP3 server could cause a buffer overflow, which could be exploited to execute arbitrary code with the privileges of the user and the mail group.
5b27ef292375625c90e4266393b4bf371fcdd6ef6e5705b12fabdfaae4d74939
Mac OS X local root exploit for Adobe Version Cue that makes use of insecure path.
017cece775091cace1f674e295d3b3f0bba7d27840068e165334ad1654ae1d51
PerlDesk version 1.x remote SQL injection exploit.
e34bc935547597b87bad620eb8eb5c828670151482eadf48731c111052cd5e75
The Finder utility that Mac OSX uses to launch and manipulate files and applications fails to check for hard linked files before performing changes. This allows an unprivileged user the ability to overwrite files as root. Full exploit included.
607bf00b82581926e1ae755d2297dd135f36f47351d4a9b69559b86cf1ab5d89
International Domain Name [IDN] support in modern browsers allows attackers to spoof domain name URLs and SSL certificates.
8204fda1222d8ded750ab8fd6353d4cf829979e68f7205961239a8169e87fd02
EXPL-A-2005-001 exploitlabs.com Advisory 030 - A vulnerability in Microsoft Outlook Web Access allows malicious attackers to redirect the login to any URL they wish.
cc0fadb803b3aa16e9acd02377c86e4024ea510cee5b3e6bb7f1f5c8d1dfa1bf
A lack of validation in BXCP 0.2.9.7 scripts allow for local php file inclusion and path disclosure.
682e5f0612f5d2564293d0855b1b47b08d7056fdf09cf28a436caffa3a24ef43