📄 indexdate.shtml
字号:
<tr height=1 bgcolor=#26264D><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#000000><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#000066><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#3333CC><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#000066><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#333366><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#000000><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#333333><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#D1D1D1><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=20 bgcolor=#999999><td height=20 colspan=9 valign=center nowrap><center><font face=verdana size=1><b><A class=top href="/pssabout.html">about</a> | <A class=top href="http://209.100.212.5/cgi-bin/cbmc/forums.cgi">forums</a> | <A class=top href="/assess.html">assessment</a> | <A class=top href="/defense.html">defense</a> | <A class=top href="/papers.html">papers</a> | <A class=top href="/magazines.html">magazines</a> | <A class=top href="/misc.html">miscellaneous</a> | <A class=top href="/links.html">links</a></b></font></center></td></tr> <tr height=1 bgcolor=#666666><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#333333><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=4 bgcolor=#000000><td colspan=9><spacer type=block height=4 width=1></td></tr> </table> </form> <center><p><br><p><table border=0 cellspacing=1 cellpadding=1 width=90%><tr><td align=left class=fm></td><td align=right class=fd>To change sort order, click on the category. Sorted By: Last Modified.</td></tr></table><table bgcolor=#99CCFF border=0 cellpadding=1 cellspacing=0 width=90%><tr><td bgcolor=#99CCFF><table bgcolor=#99CCFF border=0 cellpadding=1 cellspacing=0 width=100%><tr><td bgcolor=#99CCFF background="/images/bg_area2.gif" class=fm><b>.: 0107-exploits</b></td></tr><tr><td bgcolor=#99CCFF><table bgcolor=black border=0 cellpadding=0 cellspacing=0 width=100%><tr><td bgcolor=black><table bgcolor=black border=0 cellpadding=1 cellspacing=1 width=100%><td class=fh bgcolor=white align=left width=40%><a class=fh href=/0107-exploits/index.shtml>File Name</a></td><td class=fh bgcolor=white width=10 align=center nowrap><nobr><a class=fh href=/0107-exploits/indexsize.shtml>File Size</a></nobr></td><td class=fh bgcolor=white align=center nowrap><nobr><a class=fh href=/0107-exploits/indexdate.shtml>Last Modified</a></nobr></td><td class=fh bgcolor=white width=10 align=center nowrap><nobr>MD5 Checksum</nobr></td></tr><tr bgcolor=#CCCCCC><td class=fl><a class=fl href=/0107-exploits/0107-exploits.tgz>0107-exploits.tgz</a></td><td class=fl align=center width=10>81081</td><td class=fl align=center nowrap><nobr>Aug 2 2001 13:09:51</nobr></td><td class=fl align=center width=10>da3cb1438250539d8be8380e15486d7d</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>Packet Storm new exploits for July, 2001.</td></tr><tr bgcolor=#CCCCCC><td class=fl><a class=fl href=/0107-exploits/spadv03.txt>spadv03.txt</a></td><td class=fl align=center width=10>5094</td><td class=fl align=center nowrap><nobr>Jul 30 2001 02:12:09</nobr></td><td class=fl align=center width=10>34db49ab75ca4fc3edbb7aa09d278554</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>The Windows 2000 telnetd service is vulnerable to a remote denial of service attack. The service crashes when scanned for the recent AYT telnetd vulnerability discovered by <a class=fd href="mailto:scut@www.team-teso.net">Scut</a>. Includes SPtelnetAYT.c, a scanner for the AYT vulnerability in telnet daemons build upon the BSD source. Homepage: <a class=fd href=http://www.secpoint.com target=newbrowser>http://www.secpoint.com.</a> By <a class=fd href="mailto:info@secpoint.com">Security Point</a></td></tr><tr bgcolor=#CCCCCC><td class=fl><a class=fl href=/0107-exploits/pileup-xpl.c>pileup-xpl.c</a></td><td class=fl align=center width=10>3489</td><td class=fl align=center nowrap><nobr>Jul 29 2001 04:07:36</nobr></td><td class=fl align=center width=10>7db2fa47bb548a4281aad6708c157b54</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>/usr/bin/pileup local root exploit. Tested against Debian 2.2. By Core</td></tr><tr bgcolor=#CCCCCC><td class=fl><a class=fl href=/0107-exploits/squidmap.pl>squidmap.pl</a></td><td class=fl align=center width=10>1499</td><td class=fl align=center nowrap><nobr>Jul 29 2001 03:30:54</nobr></td><td class=fl align=center width=10>3072c26d039e563fde8246ed1e61f590</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>Squid can be used to port scan if set up as a httpd accelerator (reverse proxy). Tested on Redhat 7.0. By <a class=fd href="mailto:pnasrat@uk.now.com">Paul Nasrat</a></td></tr><tr bgcolor=#CCCCCC><td class=fl><a class=fl href=/0107-exploits/ibm-db2.c>ibm-db2.c</a></td><td class=fl align=center width=10>1841</td><td class=fl align=center nowrap><nobr>Jul 29 2001 02:28:44</nobr></td><td class=fl align=center width=10>3de9be6028bd648021d753ebaaf12c72</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>IBM DB2 (which works under W98/NT/2000) Proof of concept Denial of Service. Sending 1 byte to port 6789 or 6790 IBM DB2 crashes, as described in <a class=fd href="http://packetstormsecurity.org/0107-exploits/ibm.db2.dos.txt">ibm.db2.dos.txt</a>. By <a class=fd href="mailto:honoriak@mail.ru">Honoriak</a></td></tr><tr bgcolor=#CCCCCC><td class=fl><a class=fl href=/0107-exploits/pic-lpr-remote.c>pic-lpr-remote.c</a></td><td class=fl align=center width=10>5320</td><td class=fl align=center nowrap><nobr>Jul 27 2001 02:30:12</nobr></td><td class=fl align=center width=10>b872ac8b739399184c12ab501762793c</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>Pic / LPRng format string remote exploit. Pic is part of the groff package. It is used by troff-to-ps.fpi as uid lp when perl, troff and LPRng are installed. Tested against Redhat 7.0 (groff-1.16-7). By <a class=fd href="mailto:zen-parse@gmx.net">zen-parse</a></td></tr><tr bgcolor=#CCCCCC><td class=fl><a class=fl href=/0107-exploits/mambo_advisorie.txt>mambo_advisorie.txt</a></td><td class=fl align=center width=10>2945</td><td class=fl align=center nowrap><nobr>Jul 26 2001 12:04:43</nobr></td><td class=fl align=center width=10>407a1020f4107e848ced585227bc294c</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>The Mambo Site Server v3.0.0 - 3.0.5 contains a vulnerability which allows users to gain administrative privileges by changing global variables via URL parsing. Homepage: <a class=fd href=http://www.reverseonline.com target=newbrowser>http://www.reverseonline.com.</a><a class=fd href="mailto:postmaster@reverseonline.com">Ismael Peinado Palomo</a></td></tr><tr bgcolor=#CCCCCC><td class=fl><a class=fl href=/0107-exploits/ida-exploit.sh>ida-exploit.sh</a></td><td class=fl align=center width=10>6176</td><td class=fl align=center nowrap><nobr>Jul 23 2001 21:42:25</nobr></td><td class=fl align=center width=10>00e34a156bbe3fe1825c7cec62b3b266</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>Windows 2000 remote IIS .ida exploit - Spawns a shell on port 8008. Tested on Win2k with no service pack and SP2. Includes instructions on finding the offset. Homepage: <a class=fd href=http://monkey.org/~mat target=newbrowser>http://monkey.org/~mat.</a> By <a class=fd href="mailto:mat@monkey.org">Mat</a></td></tr><tr bgcolor=#CCCCCC><td class=fl><a class=fl href=/0107-exploits/attqt.pl>attqt.pl</a></td><td class=fl align=center width=10>2823</td><td class=fl align=center nowrap><nobr>Jul 23 2001 12:20:12</nobr></td><td class=fl align=center width=10>3215b593ce0c0f6a1dfd711c637436be</td></tr><tr bgcolor=#003366><td colspan=4 class=fd>Attqt.pl is a tool for sending banned attachments through SMTP gateways by adding an invalid character to the filename. This is known to work on MailMarshall and TrendMicro Scanmail, others are probably vulnerable. By <a class=fd href="mailto:aidan.ok@oceanfree.net">Aidan</a></td></tr>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -