[[-dg/ux 4.0x-]]
 
[-local-] [-description-] [-author-]
at.c /usr/bin/at local root exploit loophole
core.sh n/a unknown
dop.sh n/a unknown
dushad.c users can grab shadow passwd file james clement
fstab.advfsd.sh /tmp lockfile symlink race low noise
rd.c du4 rdist exploit horizon
smashdu.c / inc.pl generic buffer overflow lamont granquist
xtcptrace.pl a tcpdump "wrapper" to decode x keycodes dave plonka
xterm.sh users can get root access via xterm theman
 
[-remote-] [-description-] [-author-]
brute users can detect real login names via bruteforce unknown
fingerd users can execute commands under the fingerd id unknown