a-WsMPdvuln.txt
INetCop Security Advisory #2003-0x82-017.a - WsMP3d, a web server that streams MP3s much like shoutcast but is GPL, suffers from a directory traversal vulnerability that not only allows viewing of...
View Articleb-WsMP3dvuln.txt
INetCop Security Advisory #2003-0x82-017.b - New versions of WsMP3d are not patched against an old remote heap corruption overflow vulnerability. Remote exploit and advisory included.
View Articlebufferpaper.txt
This paper goes into great detail describing how to utilize format string attacks with limited buffer space.
View Article0x82-GNATS_own.c
Local root exploit against GNATS v3.2 that makes use of the heap overflow found in the -d switch. Related advisory found here. Tested against RedHat Linux versions 6-9.
View Article0x82-GNATS_sux.c
Local root exploit against GNATS v3.113.x that makes use of a heap based environment variable overflow vulnerability. Related advisory found here. Tested against RedHat Linux versions 6-9.
View ArticleINetCop.GNATS.txt
INetCop Security Advisory #2003-0x82-018 - The GNU bug tracking system GNATS has two bugs that exist in the pr-edit (Problem report editor) program. There is a heap based overflow when a user uses the...
View Article0x82-dcomrpc_usemgret.c
New version of the DCOM remote exploit that uses a magic return address.
View Article0x82-wu262.c
wuftpd version 2.6.2 remote root exploit that makes use of the off-by-one vulnerability discussed here.
View Articlewu262.zip
wuftpd version 2.6.2 remote root exploit that makes use of the off-by-one vulnerability discussed here. Win32 version included that requires cygwin1.dll.
View Article0x82-WOOoouHappy_new.c
wuftpd version 2.6.2 remote root exploit that makes use of the off-by-one vulnerability discussed here.
View Articlesh-httpd.txt
Sh-httpd v0.3 and 0.4 contain a remote directory traversal vulnerability involving a wildcard character which allows attackers to read any file on the system and execute CGI's. Patch included.
View ArticleTrustix Secure Linux Security Advisory 2005.0
INetCop Security Advisory #2005-0x82-026 - Multiple buffer overflows and a format string vulnerability live in GLD versions 1.4 and below.
View Article0x82-meOw_linuxer_forever.c
GLD 1.4 remote overflow format string exploit that binds a shell to port 36864.
View Articlesnmppd_dos.txt
Snmppd format string vulnerability. Snmppd (used by / with Nagios) may contain a format-string vulnerability in unsafe syslog() calls.
View ArticleTrustix Secure Linux Security Advisory 2005.0
Snmppd is susceptible to a format string vulnerability.
View ArticleTrustix Secure Linux Security Advisory 2006.0
Zeroboard version 4.1 pl 7 is susceptible to cross site scripting attacks.
View Articleexecshield.tgz
Whitepaper titled 'Advanced Exploitation In Exec-Shield: Fedora Core Case Study". This is an excellent paper and is in both PDF and text formats. Please check it out.
View Article0x82-gnu-imap4d_search_fc6_ex.c
Fedora Core 6 (exec-shield) based GNU imap4d mailutils-0.6 search remote format string exploit.
View Article
More Pages to Explore .....