📄 indexdl.shtml
字号:
<html> <head> <title>.:[packet storm]:. - http://packetstormsecurity.org/</title> <link rel="STYLESHEET" type="text/css" href="/ps.css"> </head> <body class=sc bgcolor=black topmargin=0 leftmargin=0 rightmargin=0 marginwidth=0 marginheight=0 border=0 alink=#ffffff><a name=top></a> <table border=0 cellpadding=0 cellspacing=0 width="100%"> <form method=get action="http://209.100.212.5/cgi-bin/search/search.cgi"> <tr height=1 bgcolor=#000000><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#5E5E9E><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr bgcolor=#000066 height=40> <td height=40> </td> <td><a href="/index.shtml"><IMG alt=".:[packet storm]:." border=0 height=30 src="/images/ps.gif" width=152></a></td> <td><IMG alt="" border=0 height=1 src="/images/spacer.gif" width=40></td> <td align=right><font color=white><input type=text size=20 class=inp name=searchvalue></font></td> <td nowrap><IMG alt="" border=0 height=10 src="/images/spacer.gif" width=1><br> <input type=image alt="[search]" name="[search]" border=0 height=16 src="/images/search.gif" width=50></td> </form> <td><IMG alt="" border=0 height=1 src="/images/spacer.gif" width=40></td> <form method=post action="http://209.100.212.5/cgi-bin/clickgo.cgi"> <td align=right> <font color=white> <select class=inp name=site> <OPTION SELECTED VALUE="/last20.shtml">recent files <OPTION VALUE="/last20.shtml">last 20 files <OPTION VALUE="/last50.shtml">last 50 files <OPTION VALUE="/last100.shtml">last 100 files <OPTION VALUE="">--------------- <OPTION VALUE="/advisories20.shtml">last 20 advisories <OPTION VALUE="/advisories50.shtml">last 50 advisories <OPTION VALUE="">--------------- <OPTION VALUE="/tools20.shtml">last 20 tools <OPTION VALUE="/tools50.shtml">last 50 tools <OPTION VALUE="">--------------- <OPTION VALUE="/exploits20.shtml">last 20 exploits <OPTION VALUE="/exploits50.shtml">last 50 exploits <OPTION VALUE="">--------------- <OPTION VALUE="/miscellaneous_files20.shtml">last 20 misc <OPTION VALUE="/miscellaneous_files50.shtml">last 50 misc</OPTION> </select> </font> </td> <td nowrap><IMG alt="" border=0 height=10 src="/images/spacer.gif" width=1><br> <input type=image name="[go]" alt="[go]" border=0 height=16 src="/images/go.gif" width=30></td> <td width="10%"> </td> </tr> <tr height=1 bgcolor=#26264D><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#000000><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#000066><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#3333CC><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#000066><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#333366><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#000000><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#333333><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#D1D1D1><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=20 bgcolor=#999999><td height=20 colspan=9 valign=center nowrap><center><font face=verdana size=1><b><A class=top href="/pssabout.html">about</a> | <A class=top href="http://209.100.212.5/cgi-bin/cbmc/forums.cgi">forums</a> | <A class=top href="/assess.html">assessment</a> | <A class=top href="/defense.html">defense</a> | <A class=top href="/papers.html">papers</a> | <A class=top href="/magazines.html">magazines</a> | <A class=top href="/misc.html">miscellaneous</a> | <A class=top href="/links.html">links</a></b></font></center></td></tr> <tr height=1 bgcolor=#666666><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#333333><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=4 bgcolor=#000000><td colspan=9><spacer type=block height=4 width=1></td></tr> </table> </form> <center><p><br><p><table border=0 cellspacing=1 cellpadding=2 width=90% align=left cols=4><tr><td class=header bgcolor=black colspan=4 align=left>.: Exploits for June, 2001</td></tr><tr><td class=name bgcolor=black colspan=4 width=100% align=left> Some of these exploits are from <a class=fd href="http://www.securityfocus.com">Bugtraq</a></td></tr><tr><td colspan=2 valign=bottom align=left class=name></td><td class=title bgcolor=black colspan=2 width=100% valign=bottom align=right><p><font class=small>To Change Sort Order, Click On A Category.</font><br>Sorted By: Downloads.</td></tr><tr><td class=title bgcolor=#333399 align=left><a class=title href=http:///0106-exploits/index.shtml>File Name</a></td><td class=title bgcolor=#333399 align=center><a class=title href=http:///0106-exploits/indexdl.shtml>Downloads</a></td><td class=title bgcolor=#333399 align=center><a class=title href=http:///0106-exploits/indexsize.shtml>File Size</a></td><td class=title bgcolor=#333399 align=center nowrap><a class=title href=http:///0106-exploits/indexdate.shtml>Last Modified</a></td><td class=title bgcolor=#333399 align=center>MD5 Checksum</td></tr><tr><td class=name bgcolor=#333366 align=left><a href=/"0106-exploits/openbsdrace.txt">openbsdrace.txt</a></td><td class=size bgcolor=#333366 align=center>4281</td><td class=date bgcolor=#444477 align=center>Jul 12 01:46:44 2001</td><td class=name bgcolor=#444477 align=center>9178cad0470bd7e348f0e538216d00c1</td></tr><tr><td class=desc colspan=4 bgcolor=#000033 align=left>Georgi Guninski security advisory #47, 2001 - OpenBSD 2.8 and 2.9 have a race condition in the kernel which leads to local root compromise. By forking a few process it is possible to attach to +s pid with ptrace. Includes vvopenbsd.c, a local root exploit. Homepage: <a href=http://www.guninski.com target=newbrowser>http://www.guninski.com.</a> By <a href="mailto:guninski@guninski.com">Georgi Guninski</a></td></tr><tr><td class=name bgcolor=#333366 align=left><a href=/"0106-exploits/tiatunnel.c">tiatunnel.c</a></td><td class=size bgcolor=#333366 align=center>6869</td><td class=date bgcolor=#444477 align=center>Jun 6 15:54:30 2001</td><td class=name bgcolor=#444477 align=center>806b38eb96baac01be27ce096fae9989</td></tr><tr><td class=desc colspan=4 bgcolor=#000033 align=left>Tiatunnel.c is a Linux/x86 remote exploit for TIAtunnel-0.9alpha2, an IRC bouncer. Tested on RedHat 6.2 with TIAtunnel-0.9alpha2 from tar.gz. Binds a shell to port 30464. Homepage: <a class=fd href=http://qitest1.cjb.net target=newbrowser>http://qitest1.cjb.net.</a> By <a class=fd href="mailto:qitest1@cercaband.com">Qitest1</a></td></tr><tr><td class=name bgcolor=#333366 align=left><a href=/"0106-exploits/cue.sh">cue.sh</a></td><td class=size bgcolor=#333366 align=center>1973</td><td class=date bgcolor=#444477 align=center>Jun 8 14:13:01 2001</td><td class=name bgcolor=#444477 align=center>90bbd4ddb85767d4598a8994dfaed28e</td></tr><tr><td class=desc colspan=4 bgcolor=#000033 align=left>Cue.sh exploits an old hp/ux local root vulnerability which remains unpatched on most systems. Tested on HP.UX 10.20 v899. /usr/bin/cue exists on 800 models. By <a class=fd href="mailto:e-chang@spacemail.com">Emilie Chang</a></td></tr><tr><td class=name bgcolor=#333366 align=left><a href=/"0106-exploits/su-wrapper.c">su-wrapper.c</a></td><td class=size bgcolor=#333366 align=center>4497</td><td class=date bgcolor=#444477 align=center>Jun 7 10:27:57 2001</td><td class=name bgcolor=#444477 align=center>90df033d56dc85b7713a3852178226ab</td></tr><tr><td class=desc colspan=4 bgcolor=#000033 align=left>Su-wrapper v1.1.1 local root exploit for Linux/x86. Homepage: <a class=fd href=http://www.raza-mexicana.org target=newbrowser>http://www.raza-mexicana.org.</a> By <a class=fd href="mailto:dex@raza-mexicana.org">Dex</a></td></tr><tr><td class=name bgcolor=#333366 align=left><a href=/"/groups/hhp/hhp-sccw_smash.c">hhp-sccw_smash.c</a></td><td class=size bgcolor=#333366 align=center>2378</td><td class=date bgcolor=#444477 align=center>Sep 10 21:18:49 2001</td><td class=name bgcolor=#444477 align=center>9f4fd01a61fe22039bc91d8ef6d301d6</td></tr><tr><td class=desc colspan=4 bgcolor=#000033 align=left>A local buffer overflow exploit for sccw v1.1 and maybe others. Will gain root[uid=0]. Homepage: <a href=http://www.hhp-programming.net target=newbrowser>http://www.hhp-programming.net.</a> By <a href="mailto:pigspigs@yahoo.com">Cody Tubbs</a></td></tr><tr><td class=name bgcolor=#333366 align=left><a href=/"/groups/hhp/hhp-pileup_smash.c">hhp-pileup_smash.c</a></td><td class=size bgcolor=#333366 align=center>2902</td><td class=date bgcolor=#444477 align=center>Sep 10 21:25:06 2001</td><td class=name bgcolor=#444477 align=center>7bec7f726aa3536d50353cced6d8907e</td></tr><tr><td class=desc colspan=4 bgcolor=#000033 align=left>A local buffer overflow exploit for pileup v1.1 and maybe others. Will gain root[uid=0]. Homepage: <a href=http://www.hhp-programming.net target=newbrowser>http://www.hhp-programming.net.</a> By <a href="mailto:pigspigs@yahoo.com">Cody Tubbs</a></td></tr><tr><td class=name bgcolor=#333366 align=left><a href=/"0106-exploits/openview.snmp.txt">openview.snmp.txt</a></td><td class=size bgcolor=#333366 align=center>1080</td><td class=date bgcolor=#444477 align=center>Jun 8 14:22:47 2001</td><td class=name bgcolor=#444477 align=center>cbb6e5495aa3d1b8af6375409b149752</td></tr><tr><td class=desc colspan=4 bgcolor=#000033 align=left>HP Openview NNM6.1 and earlier running on unix contains a remote vulnerability in the suid bin executable overactiond. Any program can be started remotely by sending a SNMP trap to the server. Exploit details included. By <a class=fd href="mailto:milo.van.der.zee@ordina.nl">Milo Van Der Zee</a></td></tr><tr><td class=name bgcolor=#333366 align=left><a href=/"0106-exploits/alt3kx-advisories-2001.txt">alt3kx-advisories-20..></a></td><td class=size bgcolor=#333366 align=center>8896</td><td class=date bgcolor=#444477 align=center>Jun 6 14:45:50 2001</td><td class=name bgcolor=#444477 align=center>f31b863e65cf4e42820d482689e3046f</td></tr><tr><td class=desc colspan=4 bgcolor=#000033 align=left>The QVT/NET 4.3 FTP Server and the Shambala FTP Server for Windows 9x/NT/2000 contains remote vulnerabilities which allow users to see and retrieve any file on the server. Exploit information included. Homepage: <a class=fd href=http://www.raza-mexicana.org target=newbrowser>www.raza-mexicana.org.</a> By <a class=fd href="mailto:alt3kx_h3z@raza-mexicana.org">Alt3kx</a></td></tr><tr><td class=name bgcolor=#333366 align=left><a href=/"0106-exploits/sunhome.txt">sunhome.txt</a></td><td class=size bgcolor=#333366 align=center>2684</td><td class=date bgcolor=#444477 align=center>Jun 4 16:29:35 2001</td><td class=name bgcolor=#444477 align=center>c001290c85b9715cba2645cb81f2c3f6</td></tr><tr><td class=desc colspan=4 bgcolor=#000033 align=left>Georgi Guninski security advisory #46, 2001 - There is a buffer overflow in SunOS 5.8 x86 with $HOME and /usr/bin/mail leading to egid=mail. Includes exploit. Homepage: <a class=fd href=http://www.guninski.com target=newbrowser>http://www.guninski.com.</a> By <a class=fd href="mailto:guninski@guninski.com">Georgi Guninski</a></td></tr><tr><td class=name bgcolor=#333366 align=left><a href=/"0106-exploits/vudo.c">vudo.c</a></td><td class=size bgcolor=#333366 align=center>17675</td><td class=date bgcolor=#444477 align=center>Jun 6 15:49:38 2001</td><td class=name bgcolor=#444477 align=center>a223d049daea0c009c41ef4a02237f0e</td></tr><tr><td class=desc colspan=4 bgcolor=#000033 align=left>Vudo.c is a Sudo-1.6.3p5 and below local root exploit. Tested on Red Hat 6.2 with sudo-1.6.1-1. Homepage: <a class=fd href=http://www.synnergy.net target=newbrowser>http://www.synnergy.net.</a> By <a class=fd href="mailto:maxx@synnergy.net">Michel MaXX Kaempf</a></td></tr><tr><td class=name height=10 colspan=4><img src=/images/spacer.gif></td></tr><tr><td class=name align=left colspan=4> </td></tr><tr><td class=name align=left colspan=4> </td></tr><tr><td class=small align=center><a class=small href=/privacy.html>Privacy Statement</a></td></tr><tr><td class=name align=left colspan=4><a href=#top><img border=0 src=/images/top.gif></a></td></tr></table></body></html>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -