exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-09-11

debian.horde.imp.txt
Posted Sep 11, 2000
Site debian.org

Debian Security Advisory - Imp, a webmail interface, did not check the $from variable which contains the sender address for shell metacharacters. This could be used to run arbitrary commands on the server running imp. To fix this horde (the library imp uses) and imp itself has been modified to sanitize user input.

tags | arbitrary, shell
systems | linux, debian
SHA-256 | 97d64ae7d8dcbc7d8f70877848129bc89275bed5a3d1f84c53f57e75fc362482
debian.xpdf.txt
Posted Sep 11, 2000
Site debian.org

Debian Security Advisory - Xpdf has two security problems - Tempfiles were created insecurely, and when handling URLs in documents no checking was done for shell metacharacters before starting the browser. This makes it possible to construct a document which cause xpdf to run arbitrary commands when the user views an URL. Both problems have been fixed in version 0.90-7, and we recommend you upgrade your xpdf package immediately.

tags | arbitrary, shell
systems | linux, debian
SHA-256 | e56990f7174ae5f59fb7c1fa5969013a7c59b4c17eb4b2d38c8deea23a6726b8
statdx-scan.tar.gz
Posted Sep 11, 2000
Authored by Bionic

statdx-scan contains some bash shell scripts to make it easy to scan large numbers of hosts for the rpc.statd vulnerability.

tags | tool, shell, scanner, bash
systems | unix
SHA-256 | de24b65684ce4df514b49c7404958227f210d2c8669662d1666842b48029d26b
anyportal-0.1.txt
Posted Sep 11, 2000
Authored by Zorgon | Site nightbird.free.fr

Anyportal v0.1 allows remote users to read any file on the webserver by submitting modified forms.

tags | exploit, remote
SHA-256 | e1ec85ae33fed5f71b59bb5010d7c3248c2ba5c473dd1c55908c4be4e6a1ee39
phpPhotoAlbum.txt
Posted Sep 11, 2000
Authored by Kostas Petrakis | Site synnergy.net

phpPhotoAlbum v0.99 and below for Windows and Unix allows remote users to read any file on the system with priviledges as the httpd. Fix available here.

tags | exploit, remote
systems | windows, unix
SHA-256 | 1fd5dac557c53d92324e640ef142c13d6504f28411ca172131ea0b05a2852c6e
SRADV00001.txt
Posted Sep 11, 2000
Authored by Secure Reality | Site securereality.com.au

Secure Reality Pty Ltd. Security Advisory #1 - PHP's handling of uploads permits a remote attacker to manipulate PHP applications into opening arbitrary files on the server with the permission level of the user running the server. Almost any PHP program which provides upload capability is vulnerable.

tags | exploit, remote, arbitrary, php
SHA-256 | aeaf6e2aa7063b4ff85dd2c6645bd2a6aa56552e8a26b759f5817c1bbd0a2039
FPipe_2.04.zip
Posted Sep 11, 2000
Authored by Foundstone Labs | Site foundstone.com

FPipe version 2.4 is a TCP source port forwarder/redirector that can be used to force a TCP stream to always connect using a specific source port. This tool can be used to get around firewalls that only accept traffic originating from common source ports.

tags | tcp
SHA-256 | d0eff452959037ffd1b6d1745db0de980ab8d88b67cb2476d7e142788ad15cb4
A090800-1
Posted Sep 11, 2000
Site atstake.com

@stake Advisory A090800-1 - Application: Mobius DocumentDirect for the Internet 1.2, Platform: Windows NT 4.0, Severity: There are several buffer overflow conditions that could result in execution of arbitrary code or a denial of service.

tags | denial of service, overflow, arbitrary
systems | windows
SHA-256 | e18e06ec635a16b0cea92f28e5a5084f01741c21323819a63b4517ac55736635
horde.txt
Posted Sep 11, 2000

The $from-bug is in the horde library file 'horde.lib', (on debian systems installed in /usr/share/horde/lib/horde.lib) in line 1108 belonging to function "mailfrom". In this file there is a call to "popen" with an unchecked "from:"-line as argument. Bug found and exploited by Jens "atomi" Steube, fixed and documentated by Christian "thepoet" Winter

tags | exploit
systems | linux, debian
SHA-256 | 26f093926bfd1dd43f634cf8d0562c202fcf591bde428c8157fc922d25f3a850
websitepro.txt
Posted Sep 11, 2000
Authored by Crono

WebSite Pro is a Web Server for Win95/98/NT platforms. The vulnerability (or bad server administration) allows any user to create arbitrary files with arbitrary text on the victim machine, from the Internet web browser. By a default installation, any user can create or uploads files to the victim machine running a vulnerable version of WebSite Pro. The problem is a bad "protection access" of the main directories on the machine.

tags | exploit, web, arbitrary
systems | windows
SHA-256 | bd5cdf4a6fed674aba622112ecb317033d101e50f0c57a16cba894aadc40d73e
netsec29.txt
Posted Sep 11, 2000
Site net-security.org

Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the news the past week. In this issue: Novell directory services problem, @Stake Advisory on DocumentDirect for the Internet, Mailman 1.1 + external archiver vulnerability, SuSE Security Announcement on Apache, buffer overflow in Net.Data DB2WWW, SuSE Apache CGI source code viewing, still image service priviledge escalation patched, and segfaulting Interbase 6 SS Linux.

tags | overflow, cgi
systems | linux, suse
SHA-256 | 1d4e15b1255386f1db5ef76fb528bce8ead790f0cd5cbd36794cf9c3f97266bc
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close