exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-09-11

debian.horde.imp.txt
Posted Sep 11, 2000
Site debian.org

Debian Security Advisory - Imp, a webmail interface, did not check the $from variable which contains the sender address for shell metacharacters. This could be used to run arbitrary commands on the server running imp. To fix this horde (the library imp uses) and imp itself has been modified to sanitize user input.

tags | arbitrary, shell
systems | linux, debian
SHA-256 | 97d64ae7d8dcbc7d8f70877848129bc89275bed5a3d1f84c53f57e75fc362482
debian.xpdf.txt
Posted Sep 11, 2000
Site debian.org

Debian Security Advisory - Xpdf has two security problems - Tempfiles were created insecurely, and when handling URLs in documents no checking was done for shell metacharacters before starting the browser. This makes it possible to construct a document which cause xpdf to run arbitrary commands when the user views an URL. Both problems have been fixed in version 0.90-7, and we recommend you upgrade your xpdf package immediately.

tags | arbitrary, shell
systems | linux, debian
SHA-256 | e56990f7174ae5f59fb7c1fa5969013a7c59b4c17eb4b2d38c8deea23a6726b8
statdx-scan.tar.gz
Posted Sep 11, 2000
Authored by Bionic

statdx-scan contains some bash shell scripts to make it easy to scan large numbers of hosts for the rpc.statd vulnerability.

tags | tool, shell, scanner, bash
systems | unix
SHA-256 | de24b65684ce4df514b49c7404958227f210d2c8669662d1666842b48029d26b
anyportal-0.1.txt
Posted Sep 11, 2000
Authored by Zorgon | Site nightbird.free.fr

Anyportal v0.1 allows remote users to read any file on the webserver by submitting modified forms.

tags | exploit, remote
SHA-256 | e1ec85ae33fed5f71b59bb5010d7c3248c2ba5c473dd1c55908c4be4e6a1ee39
phpPhotoAlbum.txt
Posted Sep 11, 2000
Authored by Kostas Petrakis | Site synnergy.net

phpPhotoAlbum v0.99 and below for Windows and Unix allows remote users to read any file on the system with priviledges as the httpd. Fix available here.

tags | exploit, remote
systems | windows, unix
SHA-256 | 1fd5dac557c53d92324e640ef142c13d6504f28411ca172131ea0b05a2852c6e
SRADV00001.txt
Posted Sep 11, 2000
Authored by Secure Reality | Site securereality.com.au

Secure Reality Pty Ltd. Security Advisory #1 - PHP's handling of uploads permits a remote attacker to manipulate PHP applications into opening arbitrary files on the server with the permission level of the user running the server. Almost any PHP program which provides upload capability is vulnerable.

tags | exploit, remote, arbitrary, php
SHA-256 | aeaf6e2aa7063b4ff85dd2c6645bd2a6aa56552e8a26b759f5817c1bbd0a2039
FPipe_2.04.zip
Posted Sep 11, 2000
Authored by Foundstone Labs | Site foundstone.com

FPipe version 2.4 is a TCP source port forwarder/redirector that can be used to force a TCP stream to always connect using a specific source port. This tool can be used to get around firewalls that only accept traffic originating from common source ports.

tags | tcp
SHA-256 | d0eff452959037ffd1b6d1745db0de980ab8d88b67cb2476d7e142788ad15cb4
A090800-1
Posted Sep 11, 2000
Site atstake.com

@stake Advisory A090800-1 - Application: Mobius DocumentDirect for the Internet 1.2, Platform: Windows NT 4.0, Severity: There are several buffer overflow conditions that could result in execution of arbitrary code or a denial of service.

tags | denial of service, overflow, arbitrary
systems | windows
SHA-256 | e18e06ec635a16b0cea92f28e5a5084f01741c21323819a63b4517ac55736635
horde.txt
Posted Sep 11, 2000

The $from-bug is in the horde library file 'horde.lib', (on debian systems installed in /usr/share/horde/lib/horde.lib) in line 1108 belonging to function "mailfrom". In this file there is a call to "popen" with an unchecked "from:"-line as argument. Bug found and exploited by Jens "atomi" Steube, fixed and documentated by Christian "thepoet" Winter

tags | exploit
systems | linux, debian
SHA-256 | 26f093926bfd1dd43f634cf8d0562c202fcf591bde428c8157fc922d25f3a850
websitepro.txt
Posted Sep 11, 2000
Authored by Crono

WebSite Pro is a Web Server for Win95/98/NT platforms. The vulnerability (or bad server administration) allows any user to create arbitrary files with arbitrary text on the victim machine, from the Internet web browser. By a default installation, any user can create or uploads files to the victim machine running a vulnerable version of WebSite Pro. The problem is a bad "protection access" of the main directories on the machine.

tags | exploit, web, arbitrary
systems | windows
SHA-256 | bd5cdf4a6fed674aba622112ecb317033d101e50f0c57a16cba894aadc40d73e
netsec29.txt
Posted Sep 11, 2000
Site net-security.org

Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the news the past week. In this issue: Novell directory services problem, @Stake Advisory on DocumentDirect for the Internet, Mailman 1.1 + external archiver vulnerability, SuSE Security Announcement on Apache, buffer overflow in Net.Data DB2WWW, SuSE Apache CGI source code viewing, still image service priviledge escalation patched, and segfaulting Interbase 6 SS Linux.

tags | overflow, cgi
systems | linux, suse
SHA-256 | 1d4e15b1255386f1db5ef76fb528bce8ead790f0cd5cbd36794cf9c3f97266bc
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    5 Files
  • 22
    Oct 22nd
    12 Files
  • 23
    Oct 23rd
    23 Files
  • 24
    Oct 24th
    9 Files
  • 25
    Oct 25th
    10 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close