|
[[-debian 2.2-]]
|
||
| [-local-] | [-description-] | [-author-] |
| dislocate.c | heap mismanagement overflow | michel kaempf |
| glibc-language.c / mount.c | glibc locale bug | sk8 |
| gnomehack.c / hhp-gnomehack_smash.c | home enviroment overflow | v9 |
| gpm-root.sh | a vulnerability exists in the gpm | unknown |
| mailx.c | buffer overrun in cc-addr option | funkySh |
| manhole.c | command line format strings vulnerability | fish stiqz |
| rootcron.sh | vixie-cron root sploit | michal zalewski |
| splitvt.c | heap mismanagement exploit | michel kaempf |
| traceroot2.c / openwall.c | heap mismanagement bug | mastersecurity |
| vixie-cron.sh | insecure umask() and fopen() calls | michal zalewski |
| [-remote-] | [-description-] | [-author-] |
| 5niffi7.c | sniffit 0.3.7.beta remote root exploit | michel kaempf |
| 7350cfingerd-0.0.4.tar.gz / fingex.pl | cfingerd <= 1.4.2 format strings vulnerbility | [multiple] |
| ntpdx.c | readvar argument buffer overflow | venglin |
| mdbms.c | mdbms v0.96b6 remote shell xploit | |[sdp]| |
| rpc-statd.c | .statd remote root xploit | doing |
| wuftpd2600.c / bobek.c | wuftp 2.6.0 site exec format string exploit | multiple |
| ypbind.zip | format string exploit | digit |
| [-dos-] | [-description-] | [-author-] |
| smtp-refuser.sh | users can trunch any file locally | unknown |