Uni.pl checks a host for the recent IIS unicode vulnerability in 14 different ways.
32bd5f34a95c46295f57976cfbf6555ee9b99614f669f3c03817d94d1fb5c99d
Packet Storm new exploits for November, 2000.
bceee421a4f65a0ececf0fa87e308b9cb4bcd88b4982b651a42a90dc7473b73c
Remote denial of service exploit for Microsoft Exchange 5.5 SP3 Internet Mail Service and Information Store. The bug is in the handling of a line containing Content="".
0c9cfdbafe736d4492e5824460e8cf1c11123d2a6f395721ed470ff9d5905c32
Exploit Code for oidldapd in Oracle 8.1.6 (8ir2) for Linux. I tested in RH 6.2 and 6.1.
538b4209e4761c7b41607b2d2c04a48d5372e427a9bd4d58ec3f97fb47945eb3
CGIForum v1.0i (cgi-bin/cgiforum.pl) allows remote users to view any file on the system via a ../.. bug.
54a31d246b1ce0df322a76314cf66492c32c1c40d5388c5187fc9b897b0070fa
BitchX v1.0c16 remote exploit. Tested against Redhat 6.0, 7.0, and Debian 2.2.
f60db0f8af808e077c41cddcfbc5286c210560d141961d680824e2410e37b026
Glibc 2.1 + /bin/su local root exploit. Tested on Redhat 6.2, 6.1, and SuSE 6.2.
3b8551005bb76b0f86b59553d698f22a5a05b785634f1f4f7e8c60bdb0459e09
/usr/X11R6/bin/mogrify local buffer overflow exploit for Redhat 7.0.
3b8cfa09a9e36ebc44c23db2716680788f2f6f2f3d559d5ca6ce1e6da6db44ea
The Linux Napster Client v0.9 through v1.4.4 contains remote denial of service vulnerabilities, including a buffer overflow.
df942f2957c52dfcabfae137dce7e503c3a18bb3aa36ce6d8d404a43e2c6b85a
BSDI 3.0/4.0 /usr/contrib/mh/lib/rcvtty local exploit - Gives a egid=4(tty) shell.
97df13bd07d261bb87a10c4f6335d25e1cca2a73e97e369c44265dec113c0303
BSDI 3.0 local Inews (inn-2.2) buffer overflow exploit. Gives egid=news shell.
ea9a24a0938e3ecdaf81b1eb284380066bc47043343c111cae4471b9d5273e75
BSDI 3.0 /usr/bin/suidperl local root exploit.
58941d3c91d8b42f6784c8091f0c39755ddd7d5f6ad6a1825b63d7ab8c720c3c
BSDI 3.0 /usr/contrib/mh/bin/inc local root exploit.
ed628d1321ba3d0225a71dc5d95a94974deec4e382e6feef884016cddda04dd0
Microsoft IIS Unicode remote exploit which uses tftp to obtain code to run.
e0f403b11dab3aab5b3ee904e8e8bce6c11936552abdcf36a5b3990cd728aa32
Windows NT 4.0 SP6a with SynAttackProtect set is vulnerable to a remote denial of service attack.
714cad616a29fdfca52b206e8783d4c79dbf59b9a095f42bcd9514ec4ce0f734
Super Solaris sadmin Exploit - works with solaris 2.6/7.0 SPARC and x86, does the sp guessing (much like sadmin-brute.c).
1bc5ba57da0d2994c387df4be7a70b3d1a5261e3f76ef1792396e253ad6d576c
Koules v1.4 (svgalib version) local root exploit.
c1aa67a699bdb06becfd648b8e011150782023036520a46cdbdfa729d406a53d
Network Security Solutions Security Advisory - A denial of service vulnerability has been discovered in AnalogX proxy v4.10. POP, FTP, and SMTP are vulnerable to a buffer overflow, crashing all the proxy services.
5aef40f870f3d865e1fac6523c6b03f76193a5c55734a094120a524fc881f6ab
Tetrinet v1.13 has a denial of service vulnerability which is caused by telnetting to the tetrinet port and pressing enter once, freezing the game.
ed11e968ca11f1ec388ea80f84379db00319fe1bf75648088cf4b43c2f6bc74f
Ethereal v0.8.13 advisory and remote exploit for Linux x86. A stack overflow in the AFS packet parsing routine allows a spoofed packet to start a root shell bound to TCP port 36864.
5849011e1fbedaeca9f6469317a94d0d5df77b160e51dc2cfaf731ba6fdbc8e5
Joe's Own Editor File Link Vulnerability - If a joe session with an unsaved file terminates abnormally, joe creates a rescue copy of the file being edited called DEADJOE. The creation of this rescue copy is made without checking if the file is a link.
81d90d5f00752f52b9f0c8ad8e4f3c8f10e765b68b658e3a52086b00f61ecc5a
Vixie crontab local root exploit - an insecure fopen() call in Paul Vixie's crontab code is exploitable on systems where /var/spool/cron is user readable, such as Red Hat 6.1.
ab44f3d242c7a1c5af9df46eb9bdc3905efc1ef485b1406235d10775c03e5ede
Socks5 v1.0r10 remote buffer overflow exploit. Tested against Turbolinux 4.0.5 and Redhat 6.0.
1a9303c0f97246dd3156fb56a5fa42a61bf599c1860acd6a5af0eb6f7dfe2135
AOL Instant Messenger contains a caching vulnerability where once you have logged onto AIM with a screenname, you can permanently login with that screenname.
082713c2e36c75c665e6bb56ba99874d4c5196b712c54fcc9aafe49eff7eae7f
BSDI Elm 2.4 local buffer overflow exploit. Tested on BSDI/3.0, gives a group mail shell.
6a330ce2fc59bf584d239c77e5b345d9e7bb1abdf51acce4a1c2b43634c09ae2