[[-dg/ux
4.0x-]]
|
||
[-local-] | [-description-] | [-author-] |
at.c | /usr/bin/at local root exploit | loophole |
core.sh | n/a | unknown |
dop.sh | n/a | unknown |
dushad.c | users can grab shadow passwd file | james clement |
fstab.advfsd.sh | /tmp lockfile symlink race | low noise |
rd.c | du4 rdist exploit | horizon |
smashdu.c / inc.pl | generic buffer overflow | lamont granquist |
xtcptrace.pl | a tcpdump "wrapper" to decode x keycodes | dave plonka |
xterm.sh | users can get root access via xterm | theman |
[-remote-] | [-description-] | [-author-] |
brute | users can detect real login names via bruteforce | unknown |
fingerd | users can execute commands under the fingerd id | unknown |