what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from sw3

First Active1999-08-17
Last Active1999-08-17
junk.tar.gz
Posted Aug 17, 1999
Authored by sw3

Example script that exploits the poc.mail.local.txt (mail.local) security hole.

tags | exploit, local
SHA-256 | da41d2dae164a4557d6998e2fca3ac80383e4ac5caaab5ac71b14ec02dce8aec
listerine.tar.gz
Posted Aug 17, 1999
Authored by sw3

Example script to test for the ncftpd.txt (NcFTPd) security exploit.

tags | exploit
SHA-256 | f662640f6c2994030cb4786d5747a8b803f7f8564ddd7f013919b672ce04cb9f
mailfrm.tar.gz
Posted Aug 17, 1999
Authored by sw3

Example script that exploits the poc.mail.local.txt (mail.local) security hole.

tags | exploit, local
SHA-256 | 33008441bf71060f041ab7d57a1c8ed7eb2bf57f991fb1f98d2a75fe0f8b7cb4
ncftpd.2.txt
Posted Aug 17, 1999
Authored by sw3

NcFTPd FTP server contains stack buffer overflows that can result in Denial of Service attacks, log compromise, and theoretical remote root compromise.

tags | exploit, remote, denial of service, overflow, root
SHA-256 | 162c5824e0b78f3267db3e2594285af8731f98593ebb0c4310a1bc81b03465d1
ncftpd.txt
Posted Aug 17, 1999
Authored by sw3

NcFTPd does not confirm that destination PORT addresses belong to correct user IPs, allowing anyone to transmit data from the server anywhere, anonymously. Denial of Service attacks and spoofed sessions can result. Fix included.

tags | exploit, denial of service, spoof
SHA-256 | b8bb215caf5d724762bfea702c20250dfa706e8e6ba4bb9b427f646097e9758f
poc.mail.local.txt
Posted Aug 17, 1999
Authored by sw3

Berkeley Sendmail's mail.local allows any local user to dump anything into any user's mailbox, with no length limitation - which means any user can use the program to flood a mailbox or hard drive, or send fake (spoofed) messages, with no way of being traced.

tags | exploit, local, spoof
SHA-256 | 64ada8a0707843b0e3a17e5ef2ac0e38c374e081a9e66530369f847c8a5ec361
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close