exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 84 RSS Feed

Files Date: 2001-12-01 to 2001-12-31

SUN MICROSYSTEMS SECURITY BULLETIN: #00213
Posted Dec 18, 2001
Site sunsolve.sun.com

Patch advisory for Sun Microsystems. Please read for details.

tags | remote, overflow, x86, local, root
systems | solaris
SHA-256 | 11ceb5f50c546a836bc20af25d7ea1614c3cd5895bf45f647ce467bc6a41c19a
script.command.txt
Posted Dec 18, 2001
Authored by Marco van Berkum | Site ws.obit.nl

The script command overwrites hardlinks named typescript in the current directory.

tags | exploit
SHA-256 | d79023227c22e8ad95ff6441f4cb693f4c84fd87bea085fa786b664d343ebb48
FreeBSD Security Advisory 2001.68
Posted Dec 18, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:68 - The XSane port has insecure temp file vulnerabilities allowing local users to overwrite files by exploiting a race condition.

tags | local, vulnerability
systems | freebsd
SHA-256 | 13a8acd9ec717a5886e42bcf5e561d7bb8a8fd1f23abc51ef6013571ccd76bc0
FreeBSD Security Advisory 2001.67
Posted Dec 18, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:67 - Htsearch, part of the htdig port, contains remote denial of service vulnerabilities. It also can allow files on the webserver to be written, but only if the attacker can anon-ftp in files. Version 3.1.5 and below are affected.

tags | remote, denial of service, vulnerability
systems | freebsd
SHA-256 | c0535815b894fe6e442f2f4287ca788e2a7c57797fa9aac8ba3b5ac9b0612ddd
atphttpd.pl
Posted Dec 17, 2001
Authored by Tamer Sahin | Site securityoffice.net

ATPhttpd v0.4a remote denial of service buffer overflow Tested against OpenBSD 2.9.

tags | exploit, remote, denial of service, overflow
systems | openbsd
SHA-256 | b926c41fa5256e3f69e7d8bdcd486888ac5ea32cb2be030fd7dddd830c91635d
atphttpd-smack.c
Posted Dec 17, 2001
Authored by Tony Lambiris | Site sec.angrypacket.com

ATPhttpd v0.4b remote buffer overflow exploit. Tested on and against OpenBSD 2.8. Binds a shell to port 6969 which has the UID of the webserver.

tags | exploit, remote, overflow, shell
systems | openbsd
SHA-256 | 757c275efbea1d7b73f2905d9f4495bea18769bc447e4b0528d63eaf7503bca7
skl0g.zip
Posted Dec 17, 2001
Authored by Rex0xd | Site skl0g.cjb.net

SkLog is a very small and effective keylogger for Win32 that can log all keystrokes, is case-sensitive and supports all standard keys. It has been written in vb, uses the GetAsyncKeyState API call and doesn't need any other dll or ocx file(only the standard vb6 dlls). It restarts when you start windows (modifies the registry) and can be started/stopped anytime by using key combinations.

tags | registry
systems | windows
SHA-256 | cc8a58ba52d5b3635928bb35048bd2d972175e56675041380e19ad755e4baecf
aesop-0.2.tar.gz
Posted Dec 17, 2001
Authored by BigHawk | Site kryptology.org

Aesop is a TCP-proxy which supports many advanced and powerful features. It's designed to be secure, fast and reliable. Aesop makes use of strong cryptography (RC4) for all its data-transmission up to the end-link. Another powerful feature of Aesop is that Aesop proxies can be transparently stacked into a secure chain. Aesop is implemented using multiplexing and is therefor fast and lightweight.

tags | tcp
systems | unix
SHA-256 | 53a5affcbee053a8aa4f119e67611f7bf7ddf3bb8ba371fe5f78fd96a6328850
itransact.txt
Posted Dec 17, 2001
Authored by Jesse S. Williams

A security flaw in the itransact.com credit card payment system allows users to change the price of merchandise ordered.

tags | exploit
SHA-256 | d2ef91a633470fc9cfb5fcddc6efc11dc6bb686462ccd29b78c18ee6d0ea5e3c
ms01-058
Posted Dec 15, 2001

Microsoft Security Advisory MS01-058 - Microsoft Internet Explorer 5.5 and 6.0 contains three remote vulnerabilities which allow attackers to run code of their choice. The first vulnerability involves a flaw in the handling of the Content-Disposition and Content-Type header fields in an HTML stream. A security vulnerability exists because, if an attacker altered the HTML header information in a certain way, it could be possible to make IE believe that an executable file was actually a different type of file -- one that it is appropriate to simply open without asking the user for confirmation. The second vulnerability is a newly discovered variant of the "Frame Domain Verification" vulnerability discussed in Microsoft Security Bulletin MS01-015. The third vulnerability involves a flaw related to the display of file names in the File Download dialogue box, allowing an attacker to misrepresent the name of the file in the dialogue. Microsoft FAQ on this issue available here.

tags | remote, vulnerability
SHA-256 | 4b71b24d722f93c35b45b8e98778087925732f97a78f021e2ab8ec10a761b4f8
flawfinder-0.20.tar.gz
Posted Dec 14, 2001
Site dwheeler.com

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function.

Changes: Includes a man page and more command line options.
systems | unix
SHA-256 | 2c6e05444ffd6d6411ce9979c7c9e7318a26fd87efebed79112c95d925fead88
anomy-sanitizer-1.45.tar.gz
Posted Dec 14, 2001
Authored by Bjarni R. Einarsson | Site mailtools.anomy.net

The Anomy mail sanitizer is a filter designed to block email-based attacks such as trojans and viruses. It reads an RFC822 or MIME message and removes or renames attachments, truncate unusually long MIME header fields and sanitizes HTML by disabling Javascript and Java. It uses a single-pass pure Perl MIME parser, which can make it both more efficient and more precise than other similar programs and has built-in support for third-party virus scanners.

Changes: Rewritten HTML sanitizer which enforces default-deny instead of the old default-allow policy, in addition to many other HTML-related improvements. Also adds generic detection of MIME-type/filename mismatches, which protects against bugs like those exploited by BadTrans and Nimda.
tags | trojan, perl, javascript, virus
systems | unix
SHA-256 | cad6887bb95fb4ea027b9a2edec0604e3064919b11b5f0e33cfced017d48c7f3
ssh-3.1.0.tar.gz
Posted Dec 14, 2001
Site ssh.com

Ssh.com's Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another, providing strong authentication and a secure communications over insecure channels.

Changes: Fixed lots of bugs and improved file transfer performance.
tags | remote, shell, encryption
SHA-256 | e7a9a14b8bbe21326737843a4255af7034b38db21b64bdec983c00760d709d1f
ipac-ng-1.14.tar.gz
Posted Dec 14, 2001
Site sourceforge.net

IP Accounter is an IP accounting package for Linux. It collects, summarizes, and nicely displays IP accounting data. Its output can be a simple ASCII table, or graph images. Ipchains and iptables are supported. Logs are stored in files, gdbm, or even a PostgreSQL database.

Changes: This release has PostgreSQL storage fixes. Many little fetchipac fixes were done.
systems | linux
SHA-256 | d454f2bcd8ad72930c98f36fc3355aaae2c1b0461c002f9b9bfa42acf71cc1ed
netscript-1.6.6.tgz
Posted Dec 14, 2001
Authored by vade79, realhalo | Site realhalo.org

Netscript is a portable and lightweight tcp socket scripting tool. It is intended to allow anyone to script situations based on a word-to-word ruleset response system. Includes wildcard support, character replacement, random replacement, argument inclusion, server timeout, initial send, display altering, multiple character dump formats, telnet protocol support, logging, program to socket dumping, executable ruleset support and reverse binding among other things.

Changes: This release adds -Z (system logging support) for when it is running at a syslog accessible level. -u has changed so that it will now apply the supplementary groups to the id change. Also, if no group id is specified, it will apply the group id of the user id. The ns_exit() module function has been changed to pass the type of exit.
tags | tcp, protocol
systems | unix
SHA-256 | 14b6ef214c3e8d6da1516db0ef399a645466b853e422b3ae13aaffafb7d93911
nutsaq.pl
Posted Dec 14, 2001
Authored by twlc, Dioad

Nutsaq.pl scans for the WU-Ftpd v2.6.1 glob vulnerability via anonymous login.

tags | tool, scanner
systems | unix
SHA-256 | f3376c43283146377d00f27274f3d741a501c5a8e7671bdec945ce565f7d3236
ettercap-0.6.3.1.tar.gz
Posted Dec 14, 2001
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.

tags | tool, sniffer, tcp
SHA-256 | 32214792e9f397a9ffdd202f074776ac779226231fc1882796c897280e4f70ab
isnprober-1.02.tgz
Posted Dec 14, 2001
Authored by Tom Vandepoel | Site ubizen.com

ISNprober is a tool that samples TCP Initial Sequence Numbers (or IP ID's) and can use that information to determine if a set of IP addresses belong to the same TCP/IP stack (machine) or not.

Changes: IPID probing, better reporting of no response, added case for constant IPID=0 (or TCPISN=0), and added a README with new findings.
tags | tool, scanner, tcp
systems | unix
SHA-256 | 8d31129ad28b47eeac556a5e0bf64aca2c47c0c71b2c91e10ce374b15eabaf20
ettercap-0.6.3.tar.gz
Posted Dec 13, 2001
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.

tags | tool, sniffer, tcp
SHA-256 | 174a8876207df24c87e4b6aa1a62e1f62902942f2429db2acac2a17f4213b5b4
FreeBSD Security Advisory 2001.65
Posted Dec 13, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:65 - Libgtop, a library for the Gnome top command, has a stack overflow affecting versions prior to libgtop-1.0.12_1. Libgtop runs as group kmem, allowing local users to read from kernel memory can monitor privileged data such as network traffic, disk buffers and terminal activity.

tags | overflow, kernel, local
systems | freebsd
SHA-256 | 04f866fbe894a8ee150bd60466ea765785d534719c8addaed7c08038ebdc7559
tlibrary.zip
Posted Dec 13, 2001
Site tds.diamondcs.com.au

TDS-2 Trojan Information Database. For Windows. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
systems | windows
SHA-256 | e83d9070ba58f03bc98bf6b26ebfbf210eb45444a5ffc934f27260e1bd0e5396
bnc.txt
Posted Dec 13, 2001
Authored by Slinksi

Mirc bnc script with logging options.

SHA-256 | 8e7b2072d5afa4e0405140dac95c0f9ac020439f4896c38339eda7bb0cd10860
SpeedXess.txt
Posted Dec 13, 2001
Authored by secret | Site wowhacker.com

SpeedXess DSL routers come with a default password of speedxess.

tags | exploit
SHA-256 | da62a2697de53a086c998d6c3b8938a5da5307e7e8114b9715c39b9d38d81e87
vulcan.tar.gz
Posted Dec 13, 2001
Authored by Nelson Murilo

Vulcan is a simple tool to identify vulnerabilities in several network services. This is done by comparing initial information from a server (its banners) against a database of vulnerable versions. Databases are included for ssh, http, and ftp versions. Includes NT/2000 executable and unix .c source.

tags | tool, web, scanner, vulnerability
systems | unix
SHA-256 | c2b0ed85772617a1f084b00e128df4dbe08e3ccd40116cfc16e4eaa73e16bb32
01-wu261.c
Posted Dec 12, 2001
Authored by Zen-Parse

Wu-Ftpd v2.6.1 and below remote root exploit which takes advantage of the SITE EXEC globbing vulnerability. Includes instructions on finding the offset with gdb.

tags | exploit, remote, root
SHA-256 | f36854f1f5c3e1528c3b6966411d9d8995bb5081ba3c3e750ff7c8507aa3372c
Page 2 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close