ypk.tar.gz exploits the remote root sunos 4.1.3 ypupdated / keyserv vulnerability.
4c7783ed2a86bc488df0ca142c05ef885da86df6abf7835bf1fb963477f4a288
Exploit information for the "Virtualized UNC Share" problem talked about in MS00-019 which yeilds the source of .asp's.
95fa2946c47ff7913a1492a8b887bb7d64476444f8a22f608baa88cefaf77142
MailForm v1.91 for Windows 95 and NT 4.0 allows potentially dangerous parameters to be specified by anyone who can execute it. The web interface allows remote users to execute arbitrary commands. Exploit code included.
ec1657d7a461dfc355e9839059244543b53c114292ec4f73a2596f3a0c87c20c
This script exploits a vulnerability in the default installation of Caldera OpenLinux 2.3 which allows an attacker to obtain a listing of the packages, and versions of packages installed on this system, allowing an attacker to remotely determine vulnerabilities.
3c7ca0ba908d5de2a6e1fd15fcf8f251ada7f3de55a0e5b71efffc12ecf0816b
ircii-4.4 exploit - buffer overflow in ircii dcc chat's allows arbitrary code execution. Tested against SuSE 6.x and Redhat.
88d61d34ecad6ea393743dc89f4c5fee39942c513f990ff68ebb277181f1930b
Fcheck, a file integrity checker written in perl, can be subverted by a malicious user to execute arbitrary commands as root by creating files with shell metacharacters in their names. Version v.2.7.45 and below is vulnerable.
83567f032de695bd283111b491dcedee8d4e9a0f04b62c7ab4cd89cd545afe9d
There is a buffer overflow in the Win32 RealPlayer Basic client versions 6 and 7 which occurs when a long location to play string is entered. Using the HTML "EMBED" tag to embed RealPlayer in a webpage and setting the "AUTOSTART=true" flag, you can force RealPlayer to start automatically, triggering the overflow condition. It appears that arbitrary code could be exploited simply by *VISITING* a webpage with the malicious embedded RealPlayer tags. MacOS and linux versions appear not to be vulnerable.
37419905d1e37c015f0676d7c50395144408e6d018c7cd4c3400a0871bbd49fd
Linux 2.2.x IP Masquerading allows UDP packets in from the outside until the firewall times out. Under certain rare conditions, a UDP based service could be exploited from the outside.
19b4d2af4973b99c732c740c021e43f8fd08b524f19e5360b962ea66bf11b0b1
HTTP cache-control headers such as If-Modified-Since allow servers to track individual users in a manner similar to cookies, but with less constraints. This is a problem for user privacy against which browsers currently provide little protection.
6c0889a369f0094da2a486100eb292664da60e19b64393c51e565ab036c0676d
mh/msgchk and mh/inc demonstration local exploit for FreeBSD / BSDI.
2bfbb7210f09b6f9327cad291bd8de8bb5765b54244ea6522c9bdd9383c87417
fdmount local root exploit - tested on Slackware 4.0. Must be in the floppy group.
b9f489398fdfb811cf1ded7dfb08ba23ec8fc414c75571885b29f63112e1ef19
Solaris 2.6 snmpdx remote exploit.
967a377fe009f6615ffa341d4dbaf5c712e7560d3def5f4364a9fc0b4facb601
Oracle 8.1.5i install exploit - If Oracle is installed after this script has ran, roots .rhosts can be overwritten.
12cc6d91fae21a0a3c7016cddc4e580d317826d6ef6903c3b4a83a8ec7b3316a