Exploit that makes use of the buffer overflow in the Digest authentication code of Pavuk 0.x.
d434c2fc41504951b65ee3c9c5296a6c614a64b7f5a9e2960e7378c7b729981b
Some page.cgi script allows for remote arbitrary code execution.
db418121f9ed5ecd93f587d2bca8a0bf064fbff405ed25cec2150d7dfb122858
By placing the preferences submenu in a K Menu, the SuSE YAST Control Center can be accessed with needing root authentication.
cbe7b887ed960f3dd38fae5615d2f3de63b570dc8ad5a6c8ea7580c13375ac81
The info utility version 4.7-2.1 has an overflow that is exploitable if for some odd reason the binary was set setuid, which it is not by default.
54453499bb8d1e2d481e27a361533ef943a9ad8124e4e917e57e31c75263b064
GreyMagic Security Advisory GM#008-OP - Opera versions 7.53 and below on Windows, Linux and Macintosh fail to block write-access to the often-used location object, allowing an attacker to gain immediate script access to any webpage.
8765dcc665909546b2b59b8c80d65a8f048fbdd0669c220a3a67b998755b8dc6
Servme is a small daemon that listens on a port and logs the contents of all incoming connections to a file. New release allows emulation of ssh, Apache, VS-FTPD, telnetd, and generic open ports.
f151e543a15cb365cc585e937ecbf25a5817b597b04a508fd4b57d562d7ac2c0