exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from Echo8

First Active1999-08-17
Last Active2001-11-22
varitas.solaris.txt
Posted Nov 22, 2001
Authored by Echo8

Veritas Volume Manager 3.0.x for Solaris contains a security hole which can, under specific circumstances, allow local users to gain root access. Exploit description included.

tags | exploit, local, root
systems | solaris
SHA-256 | fd2319ff0e16f1c6e713fa56b2101950213939c45121c340cc789350ca38aee3
lpplus.txt
Posted Sep 18, 2001
Authored by Echo8

LPPlus is Plus Technologies print management system for unix. Versions prior to 3.3.x contain several serious security holes, some of which undermine the integrity of the printing subsystem, others threaten the security of the system on which the product is installed. Upgrade available here.

tags | exploit
systems | unix
SHA-256 | 248b9234d97b69b1724934b3160bc67bfa94aad7c0d63ca95ae01ac0d7e7a78e
remedy.txt
Posted Aug 16, 2001
Authored by Echo8

Security Holes in Remedy Client Installer - Due to improper handling of temporary files, the installer program for Remedy Software's Action Request System client for unix can allow local users to gain root privileges. Tested on Solaris 2.6 and 8, using the installer for AR 4.5.1. Other platforms are likely vulnerable as well.

tags | exploit, local, root
systems | unix, solaris
SHA-256 | c95b5fdfab0923436993b9af56b0a4a3494ae9311cfd445be9ca1fe847a44131
mf.txt
Posted Aug 16, 2001
Authored by Echo8

Local root compromise in MicroFocus Cobol for Solaris/Sparc - If the AppTrack feature is enabled, the default install of MicroFocus Cobol 4.1 can be tricked into running code as root due to a permission problem.

tags | exploit, local, root
systems | solaris
SHA-256 | 6be64d2889f4def783b33e0ef5fcbe35a375d34660178a987267aed924cd2601
splex.txt
Posted Apr 7, 2001
Authored by Echo8

Shareplex v2.x (Quest Software's product for Oracle database replication) contains a local security hole which allows users to read any file on the system. Vulnerable platforms include Solaris 2.6, HP/UX 10.20 & 11.00, AIX 3 and OSF/1 4.0. Patched in v2.1.3.21.

tags | exploit, local
systems | solaris, aix, hpux
SHA-256 | 411071a044dfae79b08eacc42c4cada905fb4b0a45a2d420fe4048e37c2273fa
sc.txt
Posted Feb 14, 2001
Authored by Echo8

Vulnerabilities in Sun Clustering v2.x - Leaks sensitive information to local and remote users and has tempfile bugs. Includes proof of concept exploits.

tags | exploit, remote, local, vulnerability, proof of concept
SHA-256 | dbeee965b3c61658c3bfd723ca3b21434d825f52fb5c0fbb7d1c989dca5d5abd
netscape.coredump.txt
Posted Aug 17, 1999
Authored by Echo8

Netscape Navigator 3.x and 4.x for Linux and UNIX contains security vulnerability in which sensitive user information is easily obtainable from core dumps.

tags | exploit
systems | linux, unix
SHA-256 | e2e6a60c543e5e2794580b05b6757d800904326df1b02762d71a126a7d538fb6
Page 1 of 1
Back1Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close