[txt | archive] [www.hack.co.za] [archive | gui]
 

[download entire archive]
join us at #darknet @ EFnet

 
-[[ 2 february ]]-  
[-name-] [-platform/daemon-] [-description-] [-type-] [-author-]
kon.c turbolinux 4.2/3.0 arg stack overflow local unyun
ximp40.c solaris x86 8.0/7.0 ximp40 shared library overflow local unyun
ntopexpl.sh suse 6.1 format strings bug local ihaquer
bind-fingerprint.sh named attackers can identify bind 9 servers remote max vision
added exploit descriptions for bsdi, freebsd & slackware.
-[[ 1 february ]]-  
[-name-] [-platform/daemon-] [-description-] [-type-] [-author-]
hsx cgi users can view files remote mc gan
crazy.pl cgi crazywwboard.cgi remote overflow remote jin ho you
guestrook.c cgi users can execute commands remote fish stiqz
 
[comments? gov-boi@hack.co.za]
[january][december][november]
 
EOF
rooted by prime suspectz