visualboyadv.c
Local exploit for VisualBoyAdvanced 1.x.x that is not normally setuid by default.
View ArticleTCW690.txt
Thomson TCW690 POST password validation exploit. Tested with hardware version 2.1 and software version ST42.03.0a.
View ArticleshoutcastPoC.c
Proof of concept exploit for the Nullsoft SHOUTcast 1.9.4 File Request format string vulnerability.
View Articlearkeia_type77_macos.pm
Remote root exploit for Arkeia 5.3.x that makes use of a stack overflow when handling a Type 77 request. Mac OSX version.
View Articlearkeia_type77_win32.pm
Remote root exploit for Arkeia 5.3.x that makes use of a stack overflow when handling a Type 77 request. Windows version.
View ArticleSecunia Security Advisory 14322
Secunia Security Advisory - Two weaknesses have been reported in Gaim, which can be exploited by malicious people to cause a DoS (Denial of Service).
View Articlesecres18022005-1.txt
Secunia Research Advisory - Secunia Research has discovered a vulnerability in Yahoo! Messenger, which can be exploited by malicious people to trick users into executing malicious files.
View Articlesecres18022005-2.txt
Secunia Research Advisory - Secunia Research has discovered a vulnerability in Yahoo! Messenger, which can be exploited by malicious, local users to gain escalated privileges.
View ArticleGentoo Linux Security Advisory 200502-25
Gentoo Linux Security Advisory GLSA 200502-25 - Squid contains a bug in the handling of certain DNS responses resulting in a Denial of Service. Versions below 2.5.8 are affected.
View Article3CDaemon.c
3com 3CDaemon FTP unauthorized USER remote buffer overflow exploit that can bind a shell or reverse a shell back to a listener.
View ArticleGentoo Linux Security Advisory 200502-26
Gentoo Linux Security Advisory GLSA 200502-26 - gprostats, distributed with GProFTPD, is vulnerable to a format string vulnerability, potentially leading to the execution of arbitrary code. Versions...
View Articlearksink2.c
Remote root exploit for Arkeia 5.3.x that makes use of a stack overflow when handling a Type 77 request. Targets for Redhat 7.2/8.0, Win2k SP2/SP3/SP4, WinXP SP1, Win 2003 EE.
View ArticlesilePNUKExpl_v7.4.c
phpNUKE version 7.4 remote exploit that adds an administrative user.
View Articledsa-687.txt
Debian Security Advisory 687-1 - The Debian Security Audit Project discovered a format string vulnerability in bidwatcher, a tool for watching and bidding on eBay auctions. This problem can be...
View Articletcambof.txt
TrackerCam versions 5.12 and below are susceptible to a User-Agent buffer overflow, PHP argument buffer overflow, directory traversal, path disclosure, html injection to its log file, information...
View Articlecisco-torch-0.3b.tar.bz2
Cisco Torch mass scanning, fingerprinting, and exploitation tool.
View Articleexwormshoutcast.c
SHOUTcast version 1.9.4 remote exploit. Tested on RedHat 90 and Fedora 1. Has connectback shellcode.
View ArticlepmachineExec.txt
A lack of variable sanitizing in PMachine online publishing tools allows for remote command execution as the webserver uid.
View ArticlezeroboardXSS.txt
Zeroboard is susceptible to numerous cross site scripting and path disclosure vulnerabilities.
View Articleadpl33t.txt
ADP Elite invoice and purchasing systems allow for a user to circumvent their menuing system and drop into a shell.
View Articlepcap202.msi
ProxyCap enables users to tunnel Internet applications through HTTP, SOCKS v4, and SOCKS v5 Proxy Servers. It can be told which applications will connect to the Internet through a proxy and under what...
View Articleusr9105.bz2
usr9105.c is a very simple interface to the US Robotics 9105 ADSL router's command shell (linux-based). The program lets you send commands directly to the router's telnet interface and capture the...
View Article
More Pages to Explore .....