L0pht Security Advisory - Microsoft Office 2000 UA Control Scripting is categorized as being "safe for scripting", allowing malicious active content to execute regardless of macro virus protection settings. Scripts can be executed without users consent from any HTML page viewed with active scripting enabled, including both Internet Explorer and Outlook e-mail in their default configurations. Online demonstration of this vulnerability in action here.
07e38831f23656433eb66a5e66acce7f1054bd81c2b6772ad482436a56ee2957
BUTTSniff v0.9.2: Standalone packet sniffer for Windows or back oriface sniffer plugin.
4702553e27b485e2298513c63801148a641d7afed7303bba42efae3572128d20
L0pht Research Labs Advisory - Microsoft ClipArt Gallery Overflow. An attacker can seize control of a Windows 95, 98, NT, or 2000 machine via any HTML source, including Microsoft Outlook e-mail. Proof of conccept exploit included.
2ec7de2c3c3d0f143a2c07d960d34afb1a67c52f1b03a5b7f8a09bed7e065237
QIB - Remote access through Linux LPD. Binds a shell to port 26092.
97afaabada366abf97982811fdd724de55e48453cce1302244854e8ba62fadfc
L0pht Advisory - A remote user can execute arbitrary code on a properly configured Linux LPD server.
09a305e3e24195a53ab09f9a992de2f278d9d4743d6570f174bdd602e7df59f1
pamslam - vulnerability in Redhat Linux 6.1 and PAM pam_start. both 'pam' and 'userhelper' (a setuid binary that comes with the 'usermode-1.15' rpm) follow .. paths. Since pam_start calls down to _pam_add_handler(), we can get it to dlopen any file on disk. 'userhelper' being setuid means we can get root.
876d2b15886f77f2239b7035380b86da4d9dfe5f103e08ee9eb8b83e04aee5dd
EliteSys Entry v2.05 - Entry is a remote brute-force security auditing utility, designed to crack passwords for FTP sites, WWW sites, and POP3 email boxes. [read: get passwds for 0-day pr0n sites].
b6cd545d2c4ed0e9103dd19a2f927c1376054403d96139099d98edcdd029cae0