CERT Advisory CA-2002-11 - Sun's NFS/RPC file system cachefs daemon (cachefsd) installed by default with Sun Solaris 2.5.1, 2.6, 7, and 8, contains a remotely exploitable heap overflow which allows attackers to execute code as root.
276afe600b3d5e09b12d6159c45a24d28ff25e3a76a9605470b08859cf84ca4f
CERT Advisory CA-2002-10 - Solaris v2.5.1, 2.6, 2.7, and 2.8 rpc.walld contains a remotely exploitable format string overflow.
dfeef848a17800822a0856ca026207b11800f25c0ee6e7a9baf5ebdd84e6d094
Caldera Security Advisory CSSA-2002-SCO.17 - A buffer overflow found in how the sar can be used to execute shellcode with elevated privileges on Caldera OpenServer 5.0.5 systems.
b2227264615ef07d201eb3e93c99b69dd64badf1fc46ac112f0c1c6cc2510596
Packet Storm new exploits for April, 2002.
8b9eddaafaebf6f06350f3a4d1d0a213ef6be8a89e1286ebfcdb5c7a518ff599
IIS 5.0 .asp buffer overrun remote exploit which runs cmd.exe. The .asp overflow is documented in ms02-018.
031a9428d1affec8b88f1c6878ae1fe05b1eb6fe28ea7cfafec0ea2297691a87
This is encoded FreeBSD shellcode that binds /bin/sh to port 43690 (0xAAAA). The aim of encoding the shellcode is to obfuscate certain bytes in order to bypass IDS detection and buffer filtering.
2672b98674cb4160ab29441ce7c4968ab49217ed9f2745731e4f65410a58ff5c