what you don't know can hurt you
Showing 1 - 17 of 17 RSS Feed

Files Date: 2001-07-18

Posted Jul 18, 2001
Authored by Paul L Daniels | Site inflex.co.za

Inflex is an email scanner which encapsulates your existing sendmail server setup. It scans both incoming and outgoing email and it does not alter your current /etc/sendmail.cf file. It can scan for email viruses, unwanted file types (eg. EXE, BMP, MPEG) and file names (eg. prettypark.exe). It can also be used to scan for text snippets within emails.

Changes: Corrected $filelist variable in script. Fixed McAfee AV support ripMIME string operations update.
systems | unix
MD5 | 6f8e7e55c543762ccd76969c20041ab8
Posted Jul 18, 2001
Authored by IhaQueR

Ktvision v0.1.1-271 and below symlink local root exploit. Tested against SuSE 7.1.

tags | exploit, local, root
systems | linux, suse
MD5 | e7386b4de150129eee315ee540b989bc
Posted Jul 18, 2001
Authored by Kevin Finisterre

Tarantella 3.01 ttawebtop.cgi "show files" exploit. '..' and '/' are not filtered while processing user input, so it is possible to enter arbitrary values to retrieve files from remote sever, which should not be accessible normally. Exploit URL included.

tags | exploit, remote, arbitrary, cgi
MD5 | 3c05d637d7955fb852fe1c1ec31d1681
Posted Jul 18, 2001
Authored by _Phantom_

/usr/local/bin/filter local exploit. Gives GID=mail. More information available <a href="http://www.tao.ca/fire/bos/0354.html"here.</a> Tested against Slackware 3.1. Exploits the nlspath buffer overflow.

tags | exploit, web, overflow, local
systems | linux, slackware
MD5 | ac0593f66f87f941019423787bd8fce7
Posted Jul 18, 2001
Authored by Lamerboy

FreeBSD 3.1 - 4.3 local root exploit - Uses the signal condition vulnerability discovered by G. Guninski.

tags | exploit, local, root
systems | freebsd
MD5 | e9b50e27f1042cfbac603ed819ac6420
Posted Jul 18, 2001
Site qDefense.com

qDefense Advisory Number QDAV-2001-7-3 - Interactive Story does not properly validate the contents of a hidden field entitled "next". Setting that field to the name of a file, and using double dots and poison nulls, an attacker can cause Interactive Story to display the contents of any file. Exploit URL included.

tags | exploit
MD5 | ccfd18fc1da76e132dea511b4220808d
Posted Jul 18, 2001
Authored by Gregory Duchemin | Site securite-internet.com

Sneaky2.sh is a swiss army knife for Hotmail/Messenger. Implements Spoofing/brute force/misconception/unexpected input Class Attacks. Will spoof Hotmail/messenger server to recover user hotmail/password, crash messenger client, remotely inject and execute malicious exe on the victim host.

tags | exploit, spoof
MD5 | 25055226b0a890073e135c5b546d136f
Posted Jul 18, 2001
Authored by Josh

Slackware 8.0 local root exploit - Creates a suid shell when "modprobe lp" is run from the startup scripts.

tags | exploit, shell, local, root
systems | linux, slackware
MD5 | da683d52f3f0072dc6963928eed7696f
Posted Jul 18, 2001
Site redhat.com

Red Hat Security Advisory RHSA-2001:091-07 - Elm had a buffer overflow when handling very long message-ids. This overwrote other header fields, and could potentially cause more damage. Red Hat Linux 5.2, 6.2, 7 and 7.1 is vulnerable.

tags | overflow
systems | linux, redhat
MD5 | 98632c550d1b5b7d7fa43097c390cbc8
Posted Jul 18, 2001
Authored by Roelof Temmingh, Haroon Meer | Site sensepost.com

Checkpoint Firewall-1's SecureRemote allows any IP to connect and download sensitive network information. This perl script gives a potential attacker a wealth of information including ip addresses, network masks (and even friendly descriptions).

tags | exploit, perl
MD5 | 64a69339c5b64edbad5cc889a991464a
Posted Jul 18, 2001
Authored by Antonomasia

Looking for Vulnerabilities - Our approach has been to look for a few common mistakes in programs (and scripts) of interest (mainly setuid, setgid programs and network servers). This paper focuses on unsafe temp files, unsafe environment, and buffer overflows.

tags | paper, overflow, vulnerability
systems | unix
MD5 | c19d28b643f5801709d883ff41b13972
Posted Jul 18, 2001
Authored by DiGiT | Site security.is

Cfingerd v1.4.3 remote root exploit for Linux. Binds to port 113 and sends bogus ident information.

tags | exploit, remote, root
systems | linux
MD5 | d764f4c05c80af0f321c878876a84804
Posted Jul 18, 2001
Authored by Andy Gavin

Qflood.c fills up a Quake server with spoofed "unconnected" clients, disallowing other players the ability to connect to the server since the player limit fills up quickly. Additionally, if the server does not support multiple clients from the same IP address, it will disconnect legitimate players if the spoofed connection request matches that player.

tags | exploit, spoof
MD5 | 7588a0c0ef179e78557b962a95c75291
Posted Jul 18, 2001
Authored by Zen-Parse, Josh, Lockdown

Slackware 8.0 and below ships with /var/man/cat* chmodded 1777, making it vulnerable to symlink attacks. This exploit creates a suid shell with the UID of the user running man.

tags | exploit, shell
systems | linux, slackware
MD5 | c1c8ef9823405a020ea2cc19d098e213
Posted Jul 18, 2001
Site cert.org

CERT Advisory CA-2001-18 - Several implementations of the Lightweight Directory Access Protocol (LDAP) protocol contain vulnerabilities that may allow denial-of-service attacks and unauthorized privileged access. Vulnerable services include the iPlanet directory server, IBM SecureWay running under Solaris and Windows 2000, Lotus Domino R5 Servers, Teamware Office for Windows NT and Solaris, Qualcomm Eudora WorldMail for Windows NT, Microsoft Exchange 5.5 LDAP Service, Network Associates PGP Keyserver 7.0, prior to Hotfix 2, Oracle 8i Enterprise Edition, and OpenLDAP, 1.x prior to 1.2.12 and 2.x prior to 2.0.8.

tags | vulnerability, protocol
systems | windows, 2k, nt, solaris
MD5 | 79332efa3535f9e75b175ec12691c9ce
Posted Jul 18, 2001
Authored by Suid

Local root exploit for /usr/bin/ml85p, a suid binary which is vulnerable to a local symlink attack. It is included in Mandrake 8.0 by default.

tags | exploit, local, root
systems | linux, mandrake
MD5 | 27106ddc98e2b944324483817b655184
Posted Jul 18, 2001
Authored by vade79 | Site realhalo.org

Xxman.sh is a local root exploit for an insecure system call in xman.

tags | exploit, local, root
MD5 | 631ac7297588dc7496aa411184167887
Page 1 of 1

File Archive:

November 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    28 Files
  • 2
    Nov 2nd
    1 Files
  • 3
    Nov 3rd
    1 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    19 Files
  • 6
    Nov 6th
    65 Files
  • 7
    Nov 7th
    22 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    1 Files
  • 10
    Nov 10th
    1 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    65 Files
  • 13
    Nov 13th
    27 Files
  • 14
    Nov 14th
    22 Files
  • 15
    Nov 15th
    18 Files
  • 16
    Nov 16th
    1 Files
  • 17
    Nov 17th
    3 Files
  • 18
    Nov 18th
    22 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By