Exploit for the local root bug in Kerberos IV TGT and AFS Token implementation of the OpenSSH server (sshd) version 2.2.0 - 3.1.0.
615c14091c2a14f0145ea91725a05309132d3183e87da264223c7b7de7a6d8aa
Food_for_the_poor is a linux exploit for a heap overflow in the Kerberos 4 ftp client which creates a suid shell in /tmp.
bf578a293cf0fb675fef500fdd69f10ee9038332f6d871a043dc039d9beab1ce
A vulnerability found in three DHCP signatures used by the RealSecure Network Sensor can be used to start remote denial of service attacks against up to date RealSecure 5.x,6.0 and 6.5 sensors. This issue has been corrected in XPU 4.3 that is now available from the ISS web site,
b7638c961514f18cc2661c51ef1239d98c23918796321e052903483d662cd6eb
eSO Security Advisory 2397 - The Sun Solaris admintool utility is vulnerable to multiple buffer overflow conditions that allow a local attacker to gain root access. The first overflow exists in the parsing mechanism of the .cdtoc file and the second overflow can be triggered trough the '-d' parameter that is given to this program upon execution.
46f8320fbeb6bec2c90998056a30257667fbabd667769dc75ea9f320ef7c4a4c
eSO Security Advisory 2408 - Multiple CGI scripts that are part of the CIDER Project's SHADOW intrusion detection utility contain vulnerabilities that allow remote command execution on systems that are using this package.
7affa8880d4b8af0a7249e08c39ceb30bb506699889809332508c8ff45a164a1
eSO Security Advisory 4197 - Sun Solaris cachefsd is vulnerable to a flaw that allows remote attackers to crash this daemon. Due to the nature of this application, abuse of this vulnerability can possibly result in data loss.
a6538bad8cd5e2c6e78c59ccbb2e0967549ce051314bc3aabc4a18e77b7bf48f
eSO Security Advisory 4198 - Sun Solaris cachefsd is vulnerable to a flaw that allows local attackers to execute arbitrary code. Because this application runs with root privileges, exploitation of this vulnerability can result in super-user privileges.
18ec186880bf8db1ab7bd221295caea0b1a3cdbbc8b719f283fb56ca2a1d6fba
eSO Security Advisory 4123 - Sun Solaris admintool is vulnerable to a buffer overflow condition that allows local attackers to gain root privileges. The problem resides in the installation path parsing mechanism of this application and affects Sun Solaris 2.6,7,8 (SPARC and x86).
93be0f80fb741c0e1169bc66b5b5364a68bda01eddbf530c46a15149aac47bec
eSO Security Advisory 2406 - The CDE dtprintinfo program is vulnerable to a buffer overflow condition that allows a local attacker to gain root access. The problem resides in the search functionality of this application and affects several Solaris, HP-UX, AIX and Compaq systems that are running CDE.
3f8c75f85e7c52ce8b67fcdeb6601461ad2f30233b6747179cbf004667005e52
eSO Security Advisory 3761 - Sun Solaris 8 lbxproxy is vulnerable to a buffer overflow condition that allows attackers to execute arbitrary code with elevated privileges. The problem exists in the parsing of user input that is given with the 'display' parameter during command line execution.
eccfa96eebb4c3fbf8e7eb741b59e2ead12c0d712388c1e60d78d4b125e8716c
3CDaemon FTP Server v2.0 buffer overflow dos exploit.
f356eb7981527a6a7920c4ab593bce2ccab2cacf56294d5cb8ded14619d5adae
The Bea Weblogic server v4.1 sp2 on Windows 2000 incorrectly parses certain types of URL requests, resulting in the physical path being revealed, a Denial of Service situation and revealing of .jsp sourcecode.
5238686bc453229b4aceceb879e2d11abd43881bf84eafdc99cb6eaafadf1cac
Itadem Trojan v1.0 is a small trojan controlled by a web browser. Archive password is set to p4ssw0rd. Use at your own risk.
60e8e4b511845f9a21351ef6593707f4f9fce30accb0bb3e88688fda9c61c157
The GNU Privacy Guard (GnuPG) is GNU's tool for secure communication and data storage. It is a complete and free replacement of PGP and can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440.
4855822f5c70bd66e0539521d067a1f442cefdd92ab49da597d46b9bfcd32208