what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files from Marco van Berkum

First Active2001-01-06
Last Active2011-10-12
ABUS TVIP 11550/21550 File Read / File Upload / Command Execution
Posted Oct 12, 2011
Authored by Marco van Berkum

ABUS TVIP 11550/21550 suffers from arbitrary file read, file upload, and command execution vulnerabilities.

tags | exploit, arbitrary, vulnerability, file upload
SHA-256 | 2f51d4760c8bd61052e7053ffd77dd4337c961386e2656f7ff4271440419c1b2
limehack.pl
Posted Mar 27, 2005
Authored by Marco van Berkum | Site jammerjoh.xs4all.nl

Limewire directory traversal exploit. Exploits bug in versions 4.1.2 - 4.5.6, inclusive.

tags | exploit
SHA-256 | a0dfa08e39acd486c6491f79f378b661f19d8d1edb4b5a89ab50190a58682691
mailmgr.txt
Posted Feb 13, 2004
Authored by Marco van Berkum

mailmgr version 1.2.3 is vulnerable to symlink attacks. If the utility is run as root, any file on the system can be overwritten.

tags | advisory, root
SHA-256 | 93ee7bc51fe3ac504ce9e5a8fdfd64f5776ac41c90200f5e29296b8b1bab4e7e
majordomo_leakage.txt
Posted Feb 4, 2003
Authored by Marco van Berkum, Jakub Klausa

Majordomo, the popular mailing list utility, defaults which_access to open in the configuration file. A list of email accounts for a mailing list can be compromised by this de-facto setting by sending which @. Patch included.

tags | exploit
SHA-256 | 8efeb015e6583cfd9603c53d758fcd752e89c4d7096f788f8d997d1a1b2f0abe
hackbot-2.15.tgz
Posted Nov 17, 2002
Authored by Marco van Berkum | Site ws.obit.nl

Hackbot v2.15 is an host exploration tool and banner grabber. It scans hosts for FTP banners, SSH banners, Open Relays, EXPN and VRFY options, more than 200 common CGI vulnerabilities and common indexable directories, NT unicode vulnerabilities and NT nimda infections.

Changes: Added an option to change the loglevel. Hackbot has been made more silent by default.
tags | tool, cgi, scanner, vulnerability
systems | unix
SHA-256 | 585541a710f53e77b36a655588a546bd1b454b40761f3c43c42fd4f3dd1de912
hackbot-2.14.tgz
Posted Oct 19, 2002
Authored by Marco van Berkum | Site ws.obit.nl

Hackbot v2.14 is an host exploration tool and banner grabber. It scans hosts for FTP banners, SSH banners, Open Relays, EXPN and VRFY options, more than 200 common CGI vulnerabilities and common indexable directories, NT unicode vulnerabilities and NT nimda infections.

tags | tool, cgi, scanner, vulnerability
systems | unix
SHA-256 | 1a35fc593b830443865629022963080c2a7ec60a4bc217fd12e1071e7e4610db
groupwise.6.0.1.txt
Posted Jul 30, 2002
Authored by Marco van Berkum | Site ws.obit.nl

Novell GroupWise Internet Agent 6.0.1 sp1 contains a buffer overflow in the smtp service which can be exploited over port 25. Tested on Novell NetWare 5.1 sp3. Fix available here.

tags | overflow
SHA-256 | a176e4e5a0799c3a71f7a3f6764dbd5dc8b33db8e6a3951197adf2671d937e12
script.command.txt
Posted Dec 18, 2001
Authored by Marco van Berkum | Site ws.obit.nl

The script command overwrites hardlinks named typescript in the current directory.

tags | exploit
SHA-256 | d79023227c22e8ad95ff6441f4cb693f4c84fd87bea085fa786b664d343ebb48
majordomo.1.94.4.txt
Posted Sep 19, 2001
Authored by Marco van Berkum | Site ws.obit.nl

Majordomo v1.94.4 contains vulnerabilities which allow local users to obtain a uid=majordomo shell.

tags | exploit, shell, local, vulnerability
SHA-256 | f73ece74f87e2fff78d541fca10443ea2833f826616305f86792de0c8030f123
xlock.txt
Posted Apr 19, 2001
Authored by Marco van Berkum

Removing the SUID bit from xlock causes enter to work as a password to unlock the screen for all users except root. With no SUID bit it can no longer read /etc/shadow, creating a blank .xlockrc, causing enter to be a valid password.

tags | exploit, root
SHA-256 | 7a3fc00fea0ff0994ae858e317eefc68874f30058a8c8af694cc82126a795089
whois.pl
Posted Jan 13, 2001
Authored by Marco van Berkum

Whois.pl is a remote exploit for Fastgraf's whois.cgi perl script.

tags | exploit, remote, cgi, perl
SHA-256 | 805a20d41225bbbbdd659b9161bb4d4a47c0dad781d97b2378c5e7f8c4611a81
tar-symlink.txt
Posted Jan 8, 2001
Authored by Marco van Berkum | Site obit.nl

GNU tar follows symlinks blindly, a problem if you untar as root.

tags | exploit, root
SHA-256 | 941d4baa8400f1fbed234f9bd2533ce2860e8137e6ad91ba30b49a049594c4f6
whois.cgi.txt
Posted Jan 6, 2001
Authored by Marco van Berkum

Fastgraf's whois.cgi perl script lacks meta character checking, allowing remote users to execute arbitrary commands as uid of the webserver.

tags | exploit, remote, arbitrary, cgi, perl
SHA-256 | 5abaa53a2c6a8bbe911a2c4851d96061e1ccfb4c69892c8acb5e5a3ac920d6ed
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close