what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2002-07-18

rwcgi60.env.txt
Posted Jul 18, 2002
Authored by Skp | Site sec.angrypacket.com

Angrypacket Security Advisory - The CGI rwcgi60 which comes with the Oracle Reports Server gives away the contents of several environment variables to attackers, disclosing version information and full paths.

tags | cgi
SHA-256 | 0dfc187b0a6a2ff236da8d5333f2a0cdb6828869ef33bf29a0127ee64b318393
tivoli.managednode.txt
Posted Jul 18, 2002
Authored by Mark Rowe, Jeff Fay

A remove buffer overflow in IBM Tivoli ManagedNode v3.6.x through 3.7.1 allows attackers to crash the spider process or execute arbitrary code on TMR ManagedNotes. An overly long GET request results in a buffer overflow with registers being overwritten with user supplied data, resulting in code execution as SYSTEM on NT or root on Unix. Tested on Solaris 8 (Sparc).

tags | overflow, arbitrary, root, code execution
systems | unix, solaris
SHA-256 | 8cfc7d24ca4e2b6ff9a79befe4e32557c6ab3305892f9376b8d975a511dce55c
tivoli.endpoint.txt
Posted Jul 18, 2002
Authored by Mark Rowe, Jeff Fay

A remote buffer overflow in IBM Tivoli Management Framework v3.6.x through 3.7.1 running on tcp port 9495 allows attackers to deny service or execute arbitrary code. An overly long GET request results in a buffer overflow with registers being overwritten with user supplied data, resulting in code execution as SYSTEM on NT or root on Unix. Tested on Windows 2000 and NT4 SP6a.

tags | remote, overflow, arbitrary, root, tcp, code execution
systems | windows, unix
SHA-256 | e92e32242706e69a03bcae5286f23fa186f7abf143db928b16d7dc2496525c24
mercrexp.c
Posted Jul 18, 2002
Authored by 2c79cbe14ac7d0b8472d3f129fa1df55

Mercur mail server v4.2 remote exploit. The Mercur mail server's control service listens to tcp port 32000 and is vulnerable to a buffer overflow in the password field. Tested against Windows 2000 and XP pro. Sends a shell to port 3333.

tags | exploit, remote, overflow, shell, tcp
systems | windows
SHA-256 | 5d47b93de6b6b5e44524436f14aa61eeae568221c556a2a9290570d4db621bef
x2.tgz
Posted Jul 18, 2002

X2 exploits the SSH CRC-32 attack detection code buffer overflow vulnerability that exists in SSH1 implementations. The exploit is distributed in binary form and has been encrypted. Includes 45 target types. 319 target types are available Fair Use Law 17 U.S.C.A 107

tags | exploit, overflow
SHA-256 | 12258dcf8899d36e83ad1f68fd80e8b11b98188582068bf2c92b683f048f2711
7350wurm.c
Posted Jul 18, 2002
Authored by Lorian | Site team-teso.net

7350wurm is a linux/x86 wu_ftpd remote root exploit for the double free() bug affecting v2.4.2 to 2.6.1. This code was abandoned in a honey pot and is published under Fair Use Law 17 U.S.C.A 107

tags | exploit, remote, x86, root
systems | linux
SHA-256 | 61e426d8b881456407974cf5ba70fc5699bcc3a5684973685457044f14ce29c5
7350squish.c
Posted Jul 18, 2002
Authored by scut, Lorian | Site team-teso.net

7350squish is a Linux / x86 Squid remote exploit. Tested against Debian Squid_2.3.4-2, squid_2.4.1-1, and squid_2.4.2. This code was abandoned in a honey pot and is published under Fair Use Law 17 U.S.C.A 107

tags | exploit, remote, x86
systems | linux, debian
SHA-256 | c9d3a3dd4dd2f657e576ad62e4b0332e4678ac9a512951acc8c4fe28403a63ef
7350963.c
Posted Jul 18, 2002
Authored by scut | Site team-teso.net

Solaris /bin/login remote root exploit for SPARC and x86. This code was abandoned in a honey pot and is published under Fair Use Law 17 U.S.C.A 107

tags | exploit, remote, x86, root
systems | solaris
SHA-256 | 9a7dc0465ec7420e64c78c101c235a1124f003775a78c77e6d511355683dc689
7350fun
Posted Jul 18, 2002
Authored by Lorian

7350fun is a remote exploit for mod_php v4.0.2rc1-v4.0.5 and v4.0.6-v4.0.7RC2. This exploit appears to be a revised version of the 73501867 exploit, which was written by the same author, contained less functionality and was not encrypted. Note: this exploit also causes PHP 4.1.2 versions to segfault. This code was abandoned in a honey pot and is published under Fair Use Law 17 U.S.C.A 107

tags | exploit, remote, php
SHA-256 | 8a1c0c6bcdd15226fa9559cd421b9ccc4eefd1e6864a6e563ecc6a07fb3258aa
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close