Texonet

4 exploits Active since Nov 2002
EIP-2026-119295 EXPLOITDB text WRITEUP
Working Resources BadBlue 1.7.x/2.x - Unauthorized Proxy Relay
EIP-2026-114709 EXPLOITDB bash WORKING POC
SCO OpenServer 5.0.x - 'mana' 'REMOTE_ADDR' Authentication Bypass
EIP-2026-114710 EXPLOITDB bash WORKING POC
SCO OpenServer 5.0.x - 'mana' PATH_INFO Privilege Escalation
CVE-2002-1239 EXPLOITDB text WORKING POC
QNX Neutrino RTOS 6.2.0 - Privilege Escalation
QNX Neutrino RTOS 6.2.0 uses the PATH environment variable to find and execute the cp program while operating at raised privileges, which allows local users to gain privileges by modifying the PATH to point to a malicious cp program.