This program finds the real IP address behind the masked IP address on PTlink version 6.14.2 and other versions of PTlink which has SpoofMethod set to 0 in network.dconf.
a7144b8a89043c345624b82a6de0ef8e811b9635c72393867945e943259c6311
SQLBase 8.1.0, the database management system, has a buffer overflow when the EXECUTE string exceeds 700 characters. Possibilities for exploitation include privilege escalation to GuptaSQL uid and a denial of service against the database.
ffa52760c1c161417420ffd38630b1569751d5cb660a82c0add839da2e0fb68a
Remote root exploit for Realserver 8 on several Windows platforms.
90292d4e257cdbfdf377651683c109aa8ae179a5a90d51aef9d7f78c2125337f
A specially constructed Java Applet crashes Opera versions 6.05 and 7.01. Opera's own class files in the opera.jar library are susceptible to a buffer overrun which causes a JVM crash and then crashes Opera.
348fa9d0eb2e4f65de49b13f851cd88cba36942bf730efaae4b722eecbce6fa8
IDScenter is a control and management front-end for the Windows platform. Main features: Snort 1.9/1.8/1.7 support, Snort service support, Snort configuration wizard, Rule editor, AutoBlock plugins (Network ICE BlackICE Defender plugin included (Delphi, open-source), Plugin framework for Delphi included), MySQL alert detection & file monitoring, e-mail alerts / alarm sound alerts / visual notification, etc.
69cbc9866723c2a52f2fe4ea7f68cc35f117253d649d9afa4245f43c1d6680a7
YAPH, or Yet Another Proxy Hunter, is a stealth proxy hunter that finds public access proxy servers on the Internet and validates proxy lists. YAPH reveals SOCK4, SOCKS5 and HTTP (CONNECT method) proxies.
62c236eb1cd4a5140b712726ae18fb9f8a1eaee597912ff49170d43d56674a2c
Local Exploit for a buffer overflow in /usr/ports/games/nethack32 which gives a privilege escalation to group id games.
abb5288b7bfd7cc323676bad19715c4a998d3dc8a42907c4990dee00d5bc2822
iDEFENSE Security Advisory 02.10.03: Eset Software's NOD32 Antivirus System is a cross-platform anti-virus application which contains a locally exploitable buffer overflow on the Unix version which could allow attackers to gain root privileges.
9c873e85cfe6992b13b2e8da5382e348d3979db26cf79e682de57495f210babf