.:[ packet storm ]:.
                         
paranoia is a friend like no other
paranoia is a friend like no other

 Section:  .. / 0008-exploits  /

Some of these exploits are from Bugtraq and Security Bugware

Page 4 of 5
<< 1 2 3 4 5 >> Files 75 - 100 of 119
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: kcms_configure-x86.c
Description:
/usr/openwin/bin/kcms_configure for solaris 2.5.1 2.7 x86.
Homepage:http://lsd-pl.net
File Size:2217
Last Modified:Sep 7 22:54:13 2000
MD5 Checksum:d7fb8e71c2df1089a59cf1071a511f15

 ///  File Name: dtaction2.c
Description:
/usr/dt/bin/dtaction local root exploit for solaris 2.6 x86.
Homepage:http://lsd-pl.net
File Size:2196
Last Modified:Sep 7 22:27:51 2000
MD5 Checksum:e8e7dc9099f1d98cc44105aa8498c91b

 ///  File Name: dtaction.c
Description:
/usr/dt/bin/dtaction local root exploit for solaris 2.5.1 x86.
Homepage:http://lsd-pl.net
File Size:2154
Last Modified:Sep 7 22:26:51 2000
MD5 Checksum:fa2aae270effdf4bee65727d58de5b10

 ///  File Name: xlock-x86.c
Description:
/usr/openwin/bin/xlock local root exploit for solaris 2.5 2.5.1 x86.
Homepage:http://lsd-pl.net
File Size:2152
Last Modified:Sep 7 22:49:34 2000
MD5 Checksum:e400d0d4e9a157de2c7c3689ed622089

 ///  File Name: xsun-x86.c
Description:
/usr/openwin/bin/xsun local root exploit for solaris 2.6 2.7 x86.
Homepage:http://lsd-pl.net
File Size:2138
Last Modified:Sep 7 22:33:09 2000
MD5 Checksum:c39ce6d1de19677fe62ea2af0b62c33c

 ///  File Name: rdist.c
Description:
/bin/rdist local root exploit for solaris 2.4 2.5 2.5.1 sparc.
Homepage:http://lsd-pl.net
File Size:2124
Last Modified:Sep 7 22:11:52 2000
MD5 Checksum:40a867deaba689aa34e97cf710b084f9

 ///  File Name: eject-x86.c
Description:
/usr/bin/eject local root exploit for solaris 2.5 2.5.1 x86.
Homepage:http://lsd-pl.net
File Size:2120
Last Modified:Sep 7 22:37:23 2000
MD5 Checksum:7308219daf7c83c637920c0cd85f37b8

 ///  File Name: lpstat-x86.c
Description:
/usr/bin/lpstat local root exploit for solaris 2.7 x86.
Homepage:http://lsd-pl.net
File Size:2114
Last Modified:Sep 7 22:52:37 2000
MD5 Checksum:ca6e78e296f0d8c366fb35fd6778924c

 ///  File Name: libxaw.c
Description:
libxaw.so inputmethod local exploit for irix 6.2.
Homepage:http://lsd-pl.net
File Size:2109
Last Modified:Sep 8 00:23:14 2000
MD5 Checksum:f021df30c7f4708c805d9116ac2dc5f9

 ///  File Name: VIGILANTE-2000005.txt
Description:
Vigilante Security Advisory - Watchguard Firebox Authentication dos vulnerability. Sending a malformed URL to tcp port 4100 causes Watchguard to shut down and require a reboot to restart. Fix available here.
Author:Vigilante
Homepage:http://www.vigilante.com
File Size:2090
Last Modified:Aug 16 00:44:08 2000
MD5 Checksum:3f541d31e07cd77684a3542ad46821b9

 ///  File Name: ufs-restore.c
Description:
/usr/lib/fs/ufs/ufsrestore local root exploit for solaris 2.5 2.5.1 2.6 sparc.
Homepage:http://lsd-pl.net
File Size:2081
Last Modified:Sep 7 22:10:28 2000
MD5 Checksum:22672f0a24f858d6b9de77583a41ee05

 ///  File Name: netpr.c
Description:
/usr/lib/lp/bin/netpr local root exploit for solaris 2.7 sparc.
Homepage:http://lsd-pl.net
File Size:2080
Last Modified:Sep 7 22:16:29 2000
MD5 Checksum:530692786bd7bc01fab37185cb22e619

 ///  File Name: subscribeme.txt
Description:
Unavailable.
File Size:2010
Last Modified:Aug 24 22:29:08 2000
MD5 Checksum:b32fff4d493f1bd7bb88989d494fd742

 ///  File Name: ntop.advisory.txt
Description:
Ntop -w allows remote users who have permission to view traffic stats to view any file on the system as root.
Author:Dubhe courtesy of Bugtraq
Homepage:http://www.hackerslab.org
File Size:1897
Last Modified:Aug 2 20:59:43 2000
MD5 Checksum:afe2bd144d58dc5784dbc97357ad5406

 ///  File Name: libc.c
Description:
libc.so getopt() local root exploit for Solaris 2.4 2.5 2.5.1 sparc.
Homepage:http://lsd-pl.net
File Size:1897
Last Modified:Sep 7 22:07:37 2000
MD5 Checksum:84bb4eec309095aa53e48eb8a842acea

 ///  File Name: form-totaller.txt
Description:
Form-Totaller version 1.0 (form-totaller.cgi) trusts user input for filenames, allowing a remote user to read any file on the webserver.
Author:Signal 9
File Size:1879
Last Modified:Aug 14 22:29:59 2000
MD5 Checksum:c176fa3885dae24832840fa6cf24539d

 ///  File Name: VIGILANTE-2000007
Description:
Vigilante Advisory #7 - A malicious user can crash an Intel Express 550F or a host behind it by sending a packet with a malformed header. To restart the box you need remove it from it's power source as the reset button loses functionality as well. Affected systems: Intel Express Switch 550F - Firmware version 2.63 - Firmware version 2.64.
Author:Vigilante
Homepage:http://www.vigilante.com
File Size:1871
Last Modified:Aug 28 11:16:01 2000
MD5 Checksum:70f964bfc3be8ff1be7c1a6ab323c0e2

 ///  File Name: everythingform.txt
Description:
The Everything Form (everythingform.cgi) contains remote vulnerabilities which allow any file on the sytem to be read.
Author:Signal 9
File Size:1850
Last Modified:Aug 14 22:25:42 2000
MD5 Checksum:886d2b5c72aae75767b040e22b3bbd9f

 ///  File Name: ffbconfig.c
Description:
/usr/sbin/ffbconfig local root exploit for solaris 2.5 2.5.1 sparc.
Homepage:http://lsd-pl.net
File Size:1801
Last Modified:Sep 7 22:19:33 2000
MD5 Checksum:2c5e7ff50700fd9684999fb461a4d779

 ///  File Name: php-nuke.txt
Description:
A short advisory on how to manipulate a bug in the PHP-nuke Web Portal System to allow you to gain administrative access.
Author:Starman_Jones
File Size:1799
Last Modified:Aug 24 19:09:49 2000
MD5 Checksum:f63871452fe6ee993b8f7a7961c8f7e0

 ///  File Name: fdformat.c
Description:
/bin/fdformat local root exploit for solaris 2.5 2.5.1 sparc.
Homepage:http://lsd-pl.net
File Size:1782
Last Modified:Sep 7 22:20:54 2000
MD5 Checksum:c933d007471a0ff5ab4708209cf5ae26

 ///  File Name: msw2ktelnetdos.sh
Description:
Windows 2000 telnet server denial of service exploit.
Author:Wildcoyote
File Size:1763
Last Modified:Sep 7 21:59:27 2000
MD5 Checksum:ee7d9a5af67365ac798788142ce9b1bb

 ///  File Name: VIGILANTE-2000006.txt
Description:
Vigilante Security Advisory - The OS/2 Warp 4.5 FTP Server contains denial of service vulnerabilities which allow anyone who can connect to port 21 to crash the service. Fix available here.
Author:Vigilante
Homepage:http://www.vigilante.com
File Size:1763
Last Modified:Aug 16 00:48:42 2000
MD5 Checksum:076354db31d3da7d9ef4e70cab192a03

 ///  File Name: gr_osview.c
Description:
/usr/sbin/gr_osview local exploit for Irix 6.2 and 6.3.
Homepage:http://lsd-pl.net
File Size:1758
Last Modified:Sep 8 00:27:15 2000
MD5 Checksum:5e2840ed7076d1cb5b71eb61c4225231

 ///  File Name: lpset.c
Description:
/usr/bin/lpset local root exploit for solaris 2.6 2.7 sparc.
Homepage:http://lsd-pl.net
File Size:1747
Last Modified:Sep 7 22:14:06 2000
MD5 Checksum:59338dc2b875ff1ce9df8bd62055b609