Pscan checks C source code for problematic uses of printf style functions such as "sprintf(buffer, variable)", which have been the source of many security holes. It does not check for buffer overflows or other misuse of function parameters.
cb2bd189b24663cf55c1b9bdbb2a40e2e84b75ece85ee86e49e70a5a8336c490
BitchX (75p3/1.0c16) local exploit.
aa40b281d2c006cac231c6c8505bc1727b23ce226626ce92283f8b3ea00b8bec
Wu-ftpd v2.4(4) remote root exploit. Exploits the SITE EXEC buffer overflow.
30ef02937719df0ad119e5858cca2726768166acf8b807fa9b407db7a9340c28
PNC Bouncer remote exploit - tested against v1.11 on RedHat 6.0, SuSE 6.3, and Mandrake 6.0.
f3e7d956629059a23a4eafb60363507ed837755b27f531596180153d41af5c6f