Email address | private |
---|---|
First Active | 2005-04-17 |
Last Active | 2005-12-01 |
NetBSD/i386 2.0, callback shellcode (port 6666);
985380f3d689bef3424d8fbcad233c5443e4fe61f00063be20e410f22ba6af7e
SCO_SV scosysv 3.2 5.0.7 i386, execve("/bin/sh", ..., NULL); shellcode.
6f20ae95aa944bb69a3659723893bfc98b10c2c3adaac83025e81d739a068104
NetBSD/i386 2.0, setreuid(0, 0); execve("/bin//sh", ..., NULL); shellcode. 29 Bytes.
2361c89276305bd09af3f19909dd5cda1173703a34b42ec8f14d0baaec5e090a
NetBSD/i386 2.0, setreuid(0, 0); execve("/bin//sh", ..., NULL); shellcode. 30 Bytes.
117af4cd119203328bda7ac1a71cede1ce1eff0d09363550faf1f7a805060a54
A buffer overflow vulnerability in the utility phgrafx included in the QNX Neutrino Realtime Operating System can potentially be exploited by malicious users to escalate their privileges. Exploit included.
59ea4aa5c272f08159cf44506744ef6f78fd70d1feb59c535e77bf1afa84aea9
Local exploit for nwprint on SCO OpenServer 5.0.7 that gives egid of lp.
4d21e63f2918a6727ab6f1765974a340a61a1a5bacf0daad8cc84e8c103ca34e