what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2000-06-23

vmware_ex.c
Posted Jun 23, 2000
Authored by Funkysh

VMware v1.0.1 local root exploit. Tested on Redhat 5.2 and Slackware 3.6.

tags | exploit, local, root
systems | linux, redhat, slackware
SHA-256 | 4279e1d7f7970f9144228a7785457dd44a0425aaae3385a41041a119328a851d
jidex.c
Posted Jun 23, 2000
Authored by Funkysh

Jidentd 1.0 IDENT server remote exploit. Tested under Slackware 3.6 and 4.0, Debian 2.1, Redhat 4.1, 5.0, 5.1 and 5.2.

tags | exploit, remote
systems | linux, redhat, slackware, debian
SHA-256 | 9bb5daf2edcaff51a09bef34d3664fe3ceeb2793878de4d7c1634fcf15c2396a
netbsd.2000-007.urandom
Posted Jun 23, 2000

NetBSD Security Advisory 2000-007 - If /dev/urandom is not present and functioning correctly, des_init_random_number_generator seeds the random number generator with constant data, causing the generation of keys which are easy to determine. The following programs which are included in the NetBSD distribution are impacted by this bug: telnet, telnetd, kadmin, kdb_edit, kdb_init, kerberos, and ksrvutil.

systems | netbsd
SHA-256 | e1d055b2555d5fce58da4d1716b13072674fd2c5d66c268d460de2e000491fb8
rhsa.2000-037-01.kernel
Posted Jun 23, 2000
Site redhat.com

Red Hat Security Advisory RHSA-2000:037-01 - Kernel 2.2.16 fixes a security hole that could affect any setuid program on the system.

tags | kernel
systems | linux, redhat
SHA-256 | 6d11d4be2d606059cea64b44dbdf5edbbc269572cf0d37e7135d80c6ace7d37f
debian.wu-ftpd.txt
Posted Jun 23, 2000
Site security.debian.org

Debian Security Advisory - The version of wu-ftpd distributed in Debian GNU/Linux 2.1 is vulnerable to a remote root compromise. The default configuration in all current Debian packages prevents the currently available exploits in the case of anonymous access, although local users can still compromise the server.

tags | remote, local, root
systems | linux, debian
SHA-256 | ec7aaf2af99bc801996e49b6d0a1f43661d7e9b8bb2a301838af526c9b343382
rhsa.2000-038-01.zope
Posted Jun 23, 2000
Site redhat.com

Red Hat Security Advisory RHSA-2000:038-01 - Remote vulnerabilities exist with all Zope-2.0 releases. One of the base classes in the DocumentTemplate package could allow the contents of DTMLDocuments or DTMLMethods to be changed remotely or through DTML code without forcing proper user authorization.

tags | remote, vulnerability
systems | linux, redhat
SHA-256 | 895b9df321181a48619206fa37b860cac8f1999174eb76f92a0943ef66c5103f
wuftpd-2.6.0.patch
Posted Jun 23, 2000

Patch for wu-ftpd 2.6.0 to protect against the recent remote exploits. This was put together by MIT Information Systems as a stopgap until the wu-ftpd developers come up with an official fix.

tags | remote, patch
systems | unix
SHA-256 | a84057119accc24e45fd62bf82d749599c2a358dc5572038a8ef720ee3ca1f58
wuftpd2600.c
Posted Jun 23, 2000
Authored by Tf8

Wu-Ftpd 2.6.0 remote root exploit. Account is not required, anonymous access is enough. Tested against Redhat 6.2, Suse 6.3 and 6.4, FreeBSD 3.4-STABLE, FreeBSD 3.4-RELEASE, and FreeBSD 4.0-RELEASE. Slightly broken to prevent kids usage.

tags | exploit, remote, root
systems | linux, redhat, freebsd, suse
SHA-256 | dbfc37071494eec603b6a8d65a08f55496b09fa218a4e46efacbd9e961e775fd
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close