/usr/lib/fs/ufs/ufsrestore local root exploit for solaris 2.5 2.5.1 2.6 sparc.
80467df9fca55b2f287adf6301e0f2398b11ef06b61616b6dc7f7caa4a2c78f0
/usr/openwin/bin/xsun local root exploit for solaris 2.6 2.7 sparc.
88c632fa3e55f9fc3d54eaae97573694c5c6322ebe5ccbab3ff94cc1b40fe54f
libc.so getopt() local root exploit for Solaris 2.4 2.5 2.5.1 sparc.
3dd191705466a68f47701499f678fba580ad6bcfe6753bfebbc3b90a8bc511ea
libxt.so local root exploit for Solaris 2.4 2.5 2.5.1 sparc.
55abfd1c75e24c49bf488d00d73ad585ab162c84d3da7591e2d4a5b2c2c89645
/bin/passwd local root exploit for Solaris 2.5 / 2.5.1.
b12610ad2a8bcaab4c18eb86db41a0a628cf2cedbb337b7175c1aa6cd35d96de
/usr/dt/bin/dtprintinfo local root exploit for Solaris 2.6 / 2.7.
12fdb49dd2478724c987e7bdd270169964f613321f4174e0f2c6c4ebf2fbe8f4
Windows 2000 telnet server denial of service exploit.
4b4ac82588b827afa52230a5621bf5b7eff2d4b62e97dd799a095d1aa6e8cf1f
awcrash.c exploits a buffer overflow vulnerability in Windows 95 and 98 which will result in a crash if a filename with an extension longer that 232 characters is accessed. Although arbitrary code could be executed via this manner, it would have to be composed of valid filename character values only.
7ad7a060484ff8053e615253a0723a73a32a083f94fe5194af600dcb8126a5e4
Hyperterminal, the default telnet program on Windows 98, contains a buffer overflow vulnerability. It is possible to exploit via IE using a long telnet: URL.
8b90845eac862f8b4a616ef0ba0cd3928cdcaecbb16e67ea6204413e73f639bd
Microsoft Security Bulletin (MS00-064) - Microsoft has released a patch for the "Unicast Service Race Condition" vulnerability in Microsoft Windows Media Services. The vulnerability allows a malicious user to prevent an affected Windows Media Server from providing service. Microsoft FAQ on this issue available here.
8d93b0c83caa16650f21c3772df0da7bcba6fde74d8115ee1df6e698a75d3c93
Microsoft Security Bulletin (MS00-065) - Microsoft has released a patch for the "Still Image Service Privilege Escalation" buffer overflow vulnerability which allows a user logged onto a Windows 2000 machine from the keyboard to become an administrator on the machine. The Still Image Service is not installed by default, but is automatically installed, via plug-n-play, when a user attaches a still image device (i.e. digital camera, scanner, etc.) to a Windows 2000 host. Microsoft FAQ on this issue avalable here.
d5e4e41b9834aff14c44308e5d7e45417c9b5d4756c5030baa6efffc4e5ba53a
Telnetfp is an OS detection tool which uses do / dont requests via telnet to determine remote OS type. Contains 32 OS fingerprints.
e83fb59569a1389c70a22f1b784ff37e5e031e4c84a72080ca8a08acbb023d67