📄 indexdate.shtml
字号:
<html> <head> <title>.:[packet storm]:. - http://packetstormsecurity.org/</title> <link rel="STYLESHEET" type="text/css" href="/ps.css"> </head> <body class=sc bgcolor=black topmargin=0 leftmargin=0 rightmargin=0 marginwidth=0 marginheight=0 border=0 alink=#ffffff><a name=top></a> <table border=0 cellpadding=0 cellspacing=0 width="100%"> <form method=get action="http://209.100.212.5/cgi-bin/search/search.cgi"> <tr height=1 bgcolor=#000000><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#5E5E9E><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr bgcolor=#000066 height=40> <td height=40> </td> <td><a href="/index.shtml"><IMG alt=".:[packet storm]:." border=0 height=30 src="/images/ps.gif" width=152></a></td> <td><IMG alt="" border=0 height=1 src="/images/spacer.gif" width=40></td> <td align=right><font color=white><input type=text size=20 class=inp name=searchvalue></font></td> <td nowrap><IMG alt="" border=0 height=10 src="/images/spacer.gif" width=1><br> <input type=image alt="[search]" name="[search]" border=0 height=16 src="/images/search.gif" width=50></td> </form> <td><IMG alt="" border=0 height=1 src="/images/spacer.gif" width=40></td> <form method=post action="http://209.100.212.5/cgi-bin/clickgo.cgi"> <td align=right> <font color=white> <select class=inp name=site> <OPTION SELECTED VALUE="/last20.shtml">recent files <OPTION VALUE="/last20.shtml">last 20 files <OPTION VALUE="/last50.shtml">last 50 files <OPTION VALUE="/last100.shtml">last 100 files <OPTION VALUE="">--------------- <OPTION VALUE="/advisories20.shtml">last 20 advisories <OPTION VALUE="/advisories50.shtml">last 50 advisories <OPTION VALUE="">--------------- <OPTION VALUE="/tools20.shtml">last 20 tools <OPTION VALUE="/tools50.shtml">last 50 tools <OPTION VALUE="">--------------- <OPTION VALUE="/exploits20.shtml">last 20 exploits <OPTION VALUE="/exploits50.shtml">last 50 exploits <OPTION VALUE="">--------------- <OPTION VALUE="/miscellaneous_files20.shtml">last 20 misc <OPTION VALUE="/miscellaneous_files50.shtml">last 50 misc</OPTION> </select> </font> </td> <td nowrap><IMG alt="" border=0 height=10 src="/images/spacer.gif" width=1><br> <input type=image name="[go]" alt="[go]" border=0 height=16 src="/images/go.gif" width=30></td> <td width="10%"> </td> </tr> <tr height=1 bgcolor=#26264D><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#000000><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#000066><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#3333CC><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#000066><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#333366><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#000000><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#333333><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#D1D1D1><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=20 bgcolor=#999999><td height=20 colspan=9 valign=center nowrap><center><font face=verdana size=1><b><A class=top href="/pssabout.html">about</a> | <A class=top href="http://209.100.212.5/cgi-bin/cbmc/forums.cgi">forums</a> | <A class=top href="/assess.html">assessment</a> | <A class=top href="/defense.html">defense</a> | <A class=top href="/papers.html">papers</a> | <A class=top href="/magazines.html">magazines</a> | <A class=top href="/misc.html">miscellaneous</a> | <A class=top href="/links.html">links</a></b></font></center></td></tr> <tr height=1 bgcolor=#666666><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#333333><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=4 bgcolor=#000000><td colspan=9><spacer type=block height=4 width=1></td></tr> </table> </form> <center><p><br><p><table border=0 cellspacing=1 cellpadding=1 width=90%><tr><td align=left class=fm></td><td align=right class=fd>To change sort order, click on the category. Sorted By: Last Modified.</td></tr></table><table bgcolor=#99CCFF border=0 cellpadding=1 cellspacing=0 width=90%><tr><td bgcolor=#99CCFF><table bgcolor=#99CCFF border=0 cellpadding=1 cellspacing=0 width=100%><tr><td bgcolor=#99CCFF background="/images/bg_area2.gif" class=fm><b>.: exploits for june, 2001</b></td></tr><tr><td bgcolor=#99CCFF><table bgcolor=black border=0 cellpadding=0 cellspacing=0 width=100%><tr><td bgcolor=black><table bgcolor=black border=0 cellpadding=1 cellspacing=1 width=100%><td class=fh bgcolor=white align=left width=40%><a class=fh href=/0106-exploits/index.shtml>File Name</a></td><td class=fh bgcolor=white width=10 align=center nowrap><nobr><a class=fh href=/0106-exploits/indexsize.shtml>File Size</a></nobr></td><td class=fh bgcolor=white align=center nowrap><nobr><a class=fh href=/0106-exploits/indexdate.shtml>Last Modified</a></nobr></td><td class=fh bgcolor=white width=10 align=center nowrap><nobr>MD5 Checksum</nobr></td></tr><tr bgcolor=#CCCCCC><td class=fl><a class=fl href=/groups/hhp/hhp-pileup_smash.c>hhp-pileup_smash.c</a></td><td class=fl align=center width=10>2902</td><td class=fl align=center nowrap><nobr>Sep 10 2001 21:25:06</nobr></td><td class=fl align=center width=10>7bec7f726aa3536d50353cced6d8907e</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>A local buffer overflow exploit for pileup v1.1 and maybe others. Will gain root[uid=0]. Homepage: <a class=fd href=http://www.hhp-programming.net target=newbrowser>http://www.hhp-programming.net.</a> By <a class=fd href="mailto:pigspigs@yahoo.com">Cody Tubbs</a></td></tr><tr bgcolor=#CCCCCC><td class=fl><a class=fl href=/groups/hhp/hhp-sccw_smash.c>hhp-sccw_smash.c</a></td><td class=fl align=center width=10>2378</td><td class=fl align=center nowrap><nobr>Sep 10 2001 21:18:49</nobr></td><td class=fl align=center width=10>9f4fd01a61fe22039bc91d8ef6d301d6</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>A local buffer overflow exploit for sccw v1.1 and maybe others. Will gain root[uid=0]. Homepage: <a class=fd href=http://www.hhp-programming.net target=newbrowser>http://www.hhp-programming.net.</a> By <a class=fd href="mailto:pigspigs@yahoo.com">Cody Tubbs</a></td></tr><tr bgcolor=#CCCCCC><td class=fl><a class=fl href=/0106-exploits/openbsdrace.txt>openbsdrace.txt</a></td><td class=fl align=center width=10>4281</td><td class=fl align=center nowrap><nobr>Jul 12 2001 01:46:44</nobr></td><td class=fl align=center width=10>9178cad0470bd7e348f0e538216d00c1</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>Georgi Guninski security advisory #47, 2001 - OpenBSD 2.8 and 2.9 have a race condition in the kernel which leads to local root compromise. By forking a few process it is possible to attach to +s pid with ptrace. Includes vvopenbsd.c, a local root exploit. Homepage: <a class=fd href=http://www.guninski.com target=newbrowser>http://www.guninski.com.</a> By <a class=fd href="mailto:guninski@guninski.com">Georgi Guninski</a></td></tr><tr bgcolor=#CCCCCC><td class=fl><a class=fl href=/0106-exploits/openview.snmp.txt>openview.snmp.txt</a></td><td class=fl align=center width=10>1080</td><td class=fl align=center nowrap><nobr>Jun 8 2001 14:22:47</nobr></td><td class=fl align=center width=10>cbb6e5495aa3d1b8af6375409b149752</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>HP Openview NNM6.1 and earlier running on unix contains a remote vulnerability in the suid bin executable overactiond. Any program can be started remotely by sending a SNMP trap to the server. Exploit details included. By <a class=fd href="mailto:milo.van.der.zee@ordina.nl">Milo Van Der Zee</a></td></tr><tr bgcolor=#CCCCCC><td class=fl><a class=fl href=/0106-exploits/cue.sh>cue.sh</a></td><td class=fl align=center width=10>1973</td><td class=fl align=center nowrap><nobr>Jun 8 2001 14:13:01</nobr></td><td class=fl align=center width=10>90bbd4ddb85767d4598a8994dfaed28e</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>Cue.sh exploits an old hp/ux local root vulnerability which remains unpatched on most systems. Tested on HP.UX 10.20 v899. /usr/bin/cue exists on 800 models. By <a class=fd href="mailto:e-chang@spacemail.com">Emilie Chang</a></td></tr><tr bgcolor=#CCCCCC><td class=fl><a class=fl href=/0106-exploits/su-wrapper.c>su-wrapper.c</a></td><td class=fl align=center width=10>4497</td><td class=fl align=center nowrap><nobr>Jun 7 2001 10:27:57</nobr></td><td class=fl align=center width=10>90df033d56dc85b7713a3852178226ab</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>Su-wrapper v1.1.1 local root exploit for Linux/x86. Homepage: <a class=fd href=http://www.raza-mexicana.org target=newbrowser>http://www.raza-mexicana.org.</a> By <a class=fd href="mailto:dex@raza-mexicana.org">Dex</a></td></tr><tr bgcolor=#CCCCCC><td class=fl><a class=fl href=/0106-exploits/tiatunnel.c>tiatunnel.c</a></td><td class=fl align=center width=10>6869</td><td class=fl align=center nowrap><nobr>Jun 6 2001 15:54:30</nobr></td><td class=fl align=center width=10>806b38eb96baac01be27ce096fae9989</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>Tiatunnel.c is a Linux/x86 remote exploit for TIAtunnel-0.9alpha2, an IRC bouncer. Tested on RedHat 6.2 with TIAtunnel-0.9alpha2 from tar.gz. Binds a shell to port 30464. Homepage: <a class=fd href=http://qitest1.cjb.net target=newbrowser>http://qitest1.cjb.net.</a> By <a class=fd href="mailto:qitest1@cercaband.com">Qitest1</a></td></tr><tr bgcolor=#CCCCCC><td class=fl><a class=fl href=/0106-exploits/vudo.c>vudo.c</a></td><td class=fl align=center width=10>17675</td><td class=fl align=center nowrap><nobr>Jun 6 2001 15:49:38</nobr></td><td class=fl align=center width=10>a223d049daea0c009c41ef4a02237f0e</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>Vudo.c is a Sudo-1.6.3p5 and below local root exploit. Tested on Red Hat 6.2 with sudo-1.6.1-1. Homepage: <a class=fd href=http://www.synnergy.net target=newbrowser>http://www.synnergy.net.</a> By <a class=fd href="mailto:maxx@synnergy.net">Michel MaXX Kaempf</a></td></tr><tr bgcolor=#CCCCCC><td class=fl><a class=fl href=/0106-exploits/alt3kx-advisories-2001.txt>alt3kx-advisories-20..></a></td><td class=fl align=center width=10>8896</td><td class=fl align=center nowrap><nobr>Jun 6 2001 14:45:50</nobr></td><td class=fl align=center width=10>f31b863e65cf4e42820d482689e3046f</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>The QVT/NET 4.3 FTP Server and the Shambala FTP Server for Windows 9x/NT/2000 contains remote vulnerabilities which allow users to see and retrieve any file on the server. Exploit information included. Homepage: <a class=fd href=http://www.raza-mexicana.org target=newbrowser>www.raza-mexicana.org.</a> By <a class=fd href="mailto:alt3kx_h3z@raza-mexicana.org">Alt3kx</a></td></tr><tr bgcolor=#CCCCCC><td class=fl><a class=fl href=/0106-exploits/sunhome.txt>sunhome.txt</a></td><td class=fl align=center width=10>2684</td><td class=fl align=center nowrap><nobr>Jun 4 2001 16:29:35</nobr></td><td class=fl align=center width=10>c001290c85b9715cba2645cb81f2c3f6</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>Georgi Guninski security advisory #46, 2001 - There is a buffer overflow in SunOS 5.8 x86 with $HOME and /usr/bin/mail leading to egid=mail. Includes exploit. Homepage: <a class=fd href=http://www.guninski.com target=newbrowser>http://www.guninski.com.</a> By <a class=fd href="mailto:guninski@guninski.com">Georgi Guninski</a></td></tr></table></td></tr></table></td></tr></table></td></tr></table><p><table border=0 width=90% bgcolor=#000000><tr><td class=name height=10 colspan=4><img src=/images/spacer.gif></td></tr><tr><td class=name height=10 colspan=4><img src=/images/spacer.gif></td></tr><tr><td class=name align=left colspan=4> </td></tr><tr><td class=name align=left colspan=4> </td></tr><tr><td class=small align=center><a class=small href=/privacy.html>Privacy Statement</a></td></tr><tr><td class=name align=left colspan=4><a href=#top><img border=0 src=/images/top.gif></a></td></tr></table></body></html>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -