|
[[-dg/ux
4.0x-]] |
|
|
|
|
[-local-] |
[-description-] |
[-author-] |
at.c |
/usr/bin/at local root
exploit |
loophole |
core.sh |
n/a |
unknown |
dop.sh |
n/a |
unknown |
dushad.c |
users can grab shadow
passwd file |
james clement |
fstab.advfsd.sh |
/tmp lockfile symlink
race |
low noise |
rd.c |
du4 rdist exploit |
horizon |
smashdu.c /
inc.pl |
generic buffer overflow
|
lamont granquist |
xtcptrace.pl |
a tcpdump "wrapper"
to decode x keycodes |
dave plonka |
xterm.sh |
users can get root access
via xterm |
theman |
|
|
|
[-remote-] |
[-description-] |
[-author-] |
brute |
users can detect real
login names via bruteforce |
unknown |
fingerd |
users can execute commands
under the fingerd id |
unknown |
|
|
|