📄 index.shtml
字号:
<tr height=1 bgcolor=#26264D><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#000000><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#000066><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#3333CC><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#000066><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#333366><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#000000><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#333333><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#D1D1D1><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=20 bgcolor=#999999><td height=20 colspan=9 valign=center nowrap><center><font face=verdana size=1><b><A class=top href="/pssabout.html">about</a> | <A class=top href="http://209.100.212.5/cgi-bin/cbmc/forums.cgi">forums</a> | <A class=top href="/assess.html">assessment</a> | <A class=top href="/defense.html">defense</a> | <A class=top href="/papers.html">papers</a> | <A class=top href="/magazines.html">magazines</a> | <A class=top href="/misc.html">miscellaneous</a> | <A class=top href="/links.html">links</a></b></font></center></td></tr> <tr height=1 bgcolor=#666666><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#333333><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=4 bgcolor=#000000><td colspan=9><spacer type=block height=4 width=1></td></tr> </table> </form> <center><p><br><p><table border=0 cellspacing=1 cellpadding=1 width=90%><tr><td align=left class=fm></td><td align=right class=fd>To change sort order, click on the category. Sorted By: File Name.</td></tr></table><table bgcolor=#99CCFF border=0 cellpadding=1 cellspacing=0 width=90%><tr><td bgcolor=#99CCFF><table bgcolor=#99CCFF border=0 cellpadding=1 cellspacing=0 width=100%><tr><td bgcolor=#99CCFF background="/images/bg_area2.gif" class=fm><b>.: 0107-exploits</b></td></tr><tr><td bgcolor=#99CCFF><table bgcolor=black border=0 cellpadding=0 cellspacing=0 width=100%><tr><td bgcolor=black><table bgcolor=black border=0 cellpadding=1 cellspacing=1 width=100%><td class=fh bgcolor=white align=left><a class=fh href=/0107-exploits/index.shtml>File Name</a></td><td class=fh bgcolor=white width=10 align=center nowrap><nobr><a class=fh href=/0107-exploits/indexsize.shtml>File Size</a></nobr></td><td class=fh bgcolor=white align=center nowrap><nobr><a class=fh href=/0107-exploits/indexdate.shtml>Last Modified</a></nobr></td><td class=fh bgcolor=white width=10 align=center nowrap><nobr>MD5 Checksum</nobr></td></tr><tr bgcolor=#CCCCCC><td class=fl width=40% nowrap><a class=fl href=/0107-exploits/0107-exploits.tgz>0107-exploits.tgz</a></td><td class=fl align=center width=10>81081</td><td class=fl align=center nowrap><nobr>Aug 2 13:09:51 2001</nobr></td><td class=fl align=center width=10>da3cb1438250539d8be8380e15486d7d</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>Packet Storm new exploits for July, 2001.</td></tr><tr bgcolor=#CCCCCC><td class=fl width=40% nowrap><a class=fl href=/0107-exploits/attqt.pl>attqt.pl</a></td><td class=fl align=center width=10>2823</td><td class=fl align=center nowrap><nobr>Jul 23 12:20:12 2001</nobr></td><td class=fl align=center width=10>3215b593ce0c0f6a1dfd711c637436be</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>Attqt.pl is a tool for sending banned attachments through SMTP gateways by adding an invalid character to the filename. This is known to work on MailMarshall and TrendMicro Scanmail, others are probably vulnerable. By <a class=fd href="mailto:aidan.ok@oceanfree.net">Aidan</a></td></tr><tr bgcolor=#CCCCCC><td class=fl width=40% nowrap><a class=fl href=/0107-exploits/briiis-1.pl>briiis-1.pl</a></td><td class=fl align=center width=10>10133</td><td class=fl align=center nowrap><nobr>Jul 19 17:13:19 2001</nobr></td><td class=fl align=center width=10>612717b92fc58a8c3aa69e838872170e</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>Briis-1.pl is a unicode / decode IIS attack tool which includes SSL support under Linux. Features many checks for CMD.EXE, Caches the found directory, SSL support with SSLeay (Unix), Easy to use text file upload, Easy to use / encoding option, Relative path name program execution, and Virtual host support. More info available <a class=fd href="http://www.securityfocus.com/archive/1/190898">here.</a> By <a class=fd href="mailto:ian.vitek@ixsecurity.com">Ian Vitek</a></td></tr><tr bgcolor=#CCCCCC><td class=fl width=40% nowrap><a class=fl href=/0107-exploits/cayman.txt>cayman.txt</a></td><td class=fl align=center width=10>344</td><td class=fl align=center nowrap><nobr>Jul 12 00:36:59 2001</nobr></td><td class=fl align=center width=10>9cc90717d2cfb63a71c77417f014dbca</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>Cayman routers allow remote access by using } as the username. By <a class=fd href="mailto:rhandorf@mail.russells-world.com">Russell Handorf</a></td></tr><tr bgcolor=#CCCCCC><td class=fl width=40% nowrap><a class=fl href=/0107-exploits/cfingerd-exploit.pl>cfingerd-exploit.pl</a></td><td class=fl align=center width=10>4227</td><td class=fl align=center nowrap><nobr>Jul 12 00:07:46 2001</nobr></td><td class=fl align=center width=10>7deade15eef46381573d4b4220a005e0</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>Cfingerd v1.4.3 and below local root buffer overflow exploit in perl. Exploits <a class=fd href="http://www.securityfocus.com/archive/1/192844"this</a> vulnerability. Homepage: <a class=fd href=http://www.digit-labs.org/teleh0r target=newbrowser>http://www.digit-labs.org/teleh0r.</a> By <a class=fd href="mailto:teleh0r@digit-labs.org">Telehor</a></td></tr><tr bgcolor=#CCCCCC><td class=fl width=40% nowrap><a class=fl href=/0107-exploits/cfingerd.c>cfingerd.c</a></td><td class=fl align=center width=10>22161</td><td class=fl align=center nowrap><nobr>Jul 17 23:34:09 2001</nobr></td><td class=fl align=center width=10>d764f4c05c80af0f321c878876a84804</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>Cfingerd v1.4.3 remote root exploit for Linux. Binds to port 113 and sends bogus ident information. Homepage: <a class=fd href=http://security.is target=newbrowser>http://security.is.</a> By <a class=fd href="mailto:teddi@linux.is">Digit</a></td></tr><tr bgcolor=#CCCCCC><td class=fl width=40% nowrap><a class=fl href=/0107-exploits/cfingerd0x69.c>cfingerd0x69.c</a></td><td class=fl align=center width=10>5647</td><td class=fl align=center nowrap><nobr>Jul 12 00:28:25 2001</nobr></td><td class=fl align=center width=10>4b97d06d5fd883f3f606f5c5bab3b932</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>Cfingerd v1.4.3 and below Linux/x86 local root buffer overflow exploit. By <a class=fd href="mailto:qitest1@cercaband.com">Qitest1</a></td></tr><tr bgcolor=#CCCCCC><td class=fl width=40% nowrap><a class=fl href=/0107-exploits/cobalt.webmail.txt>cobalt.webmail.txt</a></td><td class=fl align=center width=10>774</td><td class=fl align=center nowrap><nobr>Jul 12 06:01:17 2001</nobr></td><td class=fl align=center width=10>73faac454049acd5190bea40a1ba809a</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>Webmail on the Cobalt Cube contains a directory traversal vulnerability which allows users with mailboxes to read any file on the system. Exploit URL's included. Verified to work against the Sun Cube III as well. By <a class=fd href="mailto:dotslash@snosoft.com ">KF</a></td></tr>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -