Section: .. / 0008-exploits /
/// File Name: |
kcms_configure-x86.c |
Description:
|
/usr/openwin/bin/kcms_configure for solaris 2.5.1 2.7 x86.
| Homepage: | http://lsd-pl.net | File Size: | 2217 | Last Modified: | Sep 7 22:54:13 2000 |
MD5 Checksum: | d7fb8e71c2df1089a59cf1071a511f15 |
|
/// File Name: |
dtaction2.c |
Description:
|
/usr/dt/bin/dtaction local root exploit for solaris 2.6 x86.
| Homepage: | http://lsd-pl.net | File Size: | 2196 | Last Modified: | Sep 7 22:27:51 2000 |
MD5 Checksum: | e8e7dc9099f1d98cc44105aa8498c91b |
|
/// File Name: |
dtaction.c |
Description:
|
/usr/dt/bin/dtaction local root exploit for solaris 2.5.1 x86.
| Homepage: | http://lsd-pl.net | File Size: | 2154 | Last Modified: | Sep 7 22:26:51 2000 |
MD5 Checksum: | fa2aae270effdf4bee65727d58de5b10 |
|
/// File Name: |
xlock-x86.c |
Description:
|
/usr/openwin/bin/xlock local root exploit for solaris 2.5 2.5.1 x86.
| Homepage: | http://lsd-pl.net | File Size: | 2152 | Last Modified: | Sep 7 22:49:34 2000 |
MD5 Checksum: | e400d0d4e9a157de2c7c3689ed622089 |
|
/// File Name: |
xsun-x86.c |
Description:
|
/usr/openwin/bin/xsun local root exploit for solaris 2.6 2.7 x86.
| Homepage: | http://lsd-pl.net | File Size: | 2138 | Last Modified: | Sep 7 22:33:09 2000 |
MD5 Checksum: | c39ce6d1de19677fe62ea2af0b62c33c |
|
/// File Name: |
rdist.c |
Description:
|
/bin/rdist local root exploit for solaris 2.4 2.5 2.5.1 sparc.
| Homepage: | http://lsd-pl.net | File Size: | 2124 | Last Modified: | Sep 7 22:11:52 2000 |
MD5 Checksum: | 40a867deaba689aa34e97cf710b084f9 |
|
/// File Name: |
eject-x86.c |
Description:
|
/usr/bin/eject local root exploit for solaris 2.5 2.5.1 x86.
| Homepage: | http://lsd-pl.net | File Size: | 2120 | Last Modified: | Sep 7 22:37:23 2000 |
MD5 Checksum: | 7308219daf7c83c637920c0cd85f37b8 |
|
/// File Name: |
lpstat-x86.c |
Description:
|
/usr/bin/lpstat local root exploit for solaris 2.7 x86.
| Homepage: | http://lsd-pl.net | File Size: | 2114 | Last Modified: | Sep 7 22:52:37 2000 |
MD5 Checksum: | ca6e78e296f0d8c366fb35fd6778924c |
|
/// File Name: |
libxaw.c |
Description:
|
libxaw.so inputmethod local exploit for irix 6.2.
| Homepage: | http://lsd-pl.net | File Size: | 2109 | Last Modified: | Sep 8 00:23:14 2000 |
MD5 Checksum: | f021df30c7f4708c805d9116ac2dc5f9 |
|
/// File Name: |
VIGILANTE-2000005.txt |
Description:
|
Vigilante Security Advisory - Watchguard Firebox Authentication dos vulnerability. Sending a malformed URL to tcp port 4100 causes Watchguard to shut down and require a reboot to restart. Fix available here.
| Author: | Vigilante | Homepage: | http://www.vigilante.com | File Size: | 2090 | Last Modified: | Aug 16 00:44:08 2000 |
MD5 Checksum: | 3f541d31e07cd77684a3542ad46821b9 |
|
/// File Name: |
ufs-restore.c |
Description:
|
/usr/lib/fs/ufs/ufsrestore local root exploit for solaris 2.5 2.5.1 2.6 sparc.
| Homepage: | http://lsd-pl.net | File Size: | 2081 | Last Modified: | Sep 7 22:10:28 2000 |
MD5 Checksum: | 22672f0a24f858d6b9de77583a41ee05 |
|
/// File Name: |
netpr.c |
Description:
|
/usr/lib/lp/bin/netpr local root exploit for solaris 2.7 sparc.
| Homepage: | http://lsd-pl.net | File Size: | 2080 | Last Modified: | Sep 7 22:16:29 2000 |
MD5 Checksum: | 530692786bd7bc01fab37185cb22e619 |
|
/// File Name: |
subscribeme.txt |
Description:
|
Unavailable.
| File Size: | 2010 | Last Modified: | Aug 24 22:29:08 2000 |
MD5 Checksum: | b32fff4d493f1bd7bb88989d494fd742 |
|
/// File Name: |
ntop.advisory.txt |
Description:
|
Ntop -w allows remote users who have permission to view traffic stats to view any file on the system as root.
| Author: | Dubhe courtesy of Bugtraq | Homepage: | http://www.hackerslab.org | File Size: | 1897 | Last Modified: | Aug 2 20:59:43 2000 |
MD5 Checksum: | afe2bd144d58dc5784dbc97357ad5406 |
|
/// File Name: |
libc.c |
Description:
|
libc.so getopt() local root exploit for Solaris 2.4 2.5 2.5.1 sparc.
| Homepage: | http://lsd-pl.net | File Size: | 1897 | Last Modified: | Sep 7 22:07:37 2000 |
MD5 Checksum: | 84bb4eec309095aa53e48eb8a842acea |
|
/// File Name: |
form-totaller.txt |
Description:
|
Form-Totaller version 1.0 (form-totaller.cgi) trusts user input for filenames, allowing a remote user to read any file on the webserver.
| Author: | Signal 9 | File Size: | 1879 | Last Modified: | Aug 14 22:29:59 2000 |
MD5 Checksum: | c176fa3885dae24832840fa6cf24539d |
|
/// File Name: |
VIGILANTE-2000007 |
Description:
|
Vigilante Advisory #7 - A malicious user can crash an Intel Express 550F or a host behind it by sending a packet with a malformed header. To restart the box you need remove it from it's power source as the reset button loses functionality as well. Affected systems: Intel Express Switch 550F - Firmware version 2.63 - Firmware version 2.64.
| Author: | Vigilante | Homepage: | http://www.vigilante.com | File Size: | 1871 | Last Modified: | Aug 28 11:16:01 2000 |
MD5 Checksum: | 70f964bfc3be8ff1be7c1a6ab323c0e2 |
|
/// File Name: |
everythingform.txt |
Description:
|
The Everything Form (everythingform.cgi) contains remote vulnerabilities which allow any file on the sytem to be read.
| Author: | Signal 9 | File Size: | 1850 | Last Modified: | Aug 14 22:25:42 2000 |
MD5 Checksum: | 886d2b5c72aae75767b040e22b3bbd9f |
|
/// File Name: |
ffbconfig.c |
Description:
|
/usr/sbin/ffbconfig local root exploit for solaris 2.5 2.5.1 sparc.
| Homepage: | http://lsd-pl.net | File Size: | 1801 | Last Modified: | Sep 7 22:19:33 2000 |
MD5 Checksum: | 2c5e7ff50700fd9684999fb461a4d779 |
|
/// File Name: |
php-nuke.txt |
Description:
|
A short advisory on how to manipulate a bug in the PHP-nuke Web Portal System to allow you to gain administrative access.
| Author: | Starman_Jones | File Size: | 1799 | Last Modified: | Aug 24 19:09:49 2000 |
MD5 Checksum: | f63871452fe6ee993b8f7a7961c8f7e0 |
|
/// File Name: |
fdformat.c |
Description:
|
/bin/fdformat local root exploit for solaris 2.5 2.5.1 sparc.
| Homepage: | http://lsd-pl.net | File Size: | 1782 | Last Modified: | Sep 7 22:20:54 2000 |
MD5 Checksum: | c933d007471a0ff5ab4708209cf5ae26 |
|
/// File Name: |
msw2ktelnetdos.sh |
Description:
|
Windows 2000 telnet server denial of service exploit.
| Author: | Wildcoyote | File Size: | 1763 | Last Modified: | Sep 7 21:59:27 2000 |
MD5 Checksum: | ee7d9a5af67365ac798788142ce9b1bb |
|
/// File Name: |
VIGILANTE-2000006.txt |
Description:
|
Vigilante Security Advisory - The OS/2 Warp 4.5 FTP Server contains denial of service vulnerabilities which allow anyone who can connect to port 21 to crash the service. Fix available here.
| Author: | Vigilante | Homepage: | http://www.vigilante.com | File Size: | 1763 | Last Modified: | Aug 16 00:48:42 2000 |
MD5 Checksum: | 076354db31d3da7d9ef4e70cab192a03 |
|
/// File Name: |
gr_osview.c |
Description:
|
/usr/sbin/gr_osview local exploit for Irix 6.2 and 6.3.
| Homepage: | http://lsd-pl.net | File Size: | 1758 | Last Modified: | Sep 8 00:27:15 2000 |
MD5 Checksum: | 5e2840ed7076d1cb5b71eb61c4225231 |
|
/// File Name: |
lpset.c |
Description:
|
/usr/bin/lpset local root exploit for solaris 2.6 2.7 sparc.
| Homepage: | http://lsd-pl.net | File Size: | 1747 | Last Modified: | Sep 7 22:14:06 2000 |
MD5 Checksum: | 59338dc2b875ff1ce9df8bd62055b609 |
|
|
|
|
|