Local root exploit for Qpopper v4.0.x poppassd that utilizes the ability to set the smbpasswd path.
ce5f5d341e016678062e1b6bd29ac00f6270e383375a46773cf0166a0247087f
INetCop Security Advisory #2003-0x82-016 - Qpopper v4.0.x poppassd, the utility that allows users to change their mail passwords, is setuid root and allows for a definable path to smbpasswd. In doing so, a local attacker can easily escalate to root privileges.
20cb7ad78ee34a4462fc2669a4d2d11d3fe2de2037bd5095118d7d9b3abee361
FreeBSD and OpenBSD remote Samba v2.2.x call_trans2open i386 buffer overflow exploit. Tested against OpenBSD 3.0 and FreeBSD 4.6.2-RELEASE with Samba v2.2.x. Includes support for target brute forcing. Information about the vulnerability is available here.
f677c9d6fb78104c365cb38722fea0540f263fc2adf56d38ded0fbb35c2f2573
Remote exploit for the buffer overrun found in passlogd on FreeBSD and OpenBSD. Tested against OpenBSD 3.0 and FreeBSD 4.6.2.
2d99af360fcfbd0f1ef67c210707772b3603b3c56e48592f450d174014eaef3f
Remote exploit for the buffer overrun found in passlogd. Target list includes four flavors of Linux with more to come.
37b269945b84e22d48de5f5d785c67d39f7bf09b5346f96a621bc6647022fc26
A buffer overrun exists in passlogd, the passive syslog capture daemon, in the parse.c code.
187f1c045d7ee8745a0af71546b8d5dde0458959b31d7fdf3347f791fc3439c7
Outblaze web based email is vulnerable to user cookie spoofing that will allow an attacker to retrieve a user's password.
27cb8401290217c09af3cc57b0eac1a72004aee543b0d3820828ddb0cc9e207b
INetCop Security Advisory #2002-0x82-013 - The Kebi Academy 2001 Web Solution suffers from a basic directory traversal vulnerability which may allow remote attackers to execute code on the server.
852fd7f68269e8865c32455952d42b80d4eef0257eeec6af4e85f898aa68088d
WSMP3 Remote root exploit for Linux which spawns a shell on tcp port 36864.
57112fc81196d3600ccb7974526081a3e031497f7e9f23ee4acbb08d4f5269db
INetCop Security Advisory #2002-0x82-004 - Various buffer overflow vulnerabilities exist in Zeroo HTTP Server v1.5. Remote linux exploit included to gain root privileges.
a3c4fb3627efc81e628826beed19110486973e4f8ac5a7bd42bc897ce5b93c6a
INetCop Security Advisory #2002-0x82-003 - LibHTTPD, a utility that can be used to add basic web server capabilities to an application or embedded device, is vulnerable to a buffer overflow which allows remote attackers to gain root access to the system.
42b98d2d9176568731b8e14b52d0f6712290e40350893e64b5996c712275747a
INetCop Security Advisory #2002-0x82-002 - A buffer overflow in Light HTTPd version 1.0 allows for remote attackers to grab a shell or perform related activities as the webserver uid.
4394e54d71505d1fce1d0784dbc84067ece93adfb1a1d1cad4e863b4f87b14c9
INetCop Security Advisory #2002-0x82-001 - A directory traversal vulnerability has been found in Tiny HTTPd 1.0. Basic exploitation is documented.
a49d55847f0e0b697cc4797e61934daffcf7b2aaf646fca37369ef068a3705ce