exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2002-03-14

apache_1.3.22+ssl_1.47.tar.gz
Posted Mar 14, 2002
Site apache-ssl.org

Apache-SSL is a set of patches for Apache to create a secure Webserver, based on SSLeay/OpenSSL. It is designed to be small, secure, and efficient.

Changes: A buffer overflow that could be exploited if client certificates are in use was fixed. More info on this bug is here.
tags | encryption
SHA-256 | dfadf144d08e8538be36b7d59b6b23856b5ca250427d66c0c7ce7f8bd8277811
apache_1.3.23.tar.gz
Posted Mar 14, 2002
Site apache.org

Apache is the most popular webserver on the Internet, quite possibly the best in terms of security, functionality, efficiency, and speed.

Changes: Fixed quite a few minor bugs. Changelog available here.
systems | unix
SHA-256 | 2b731f71284a31b28d8e553fb5f4917293c1d21e065467b39a50706466f88438
ucd-snmp.c
Posted Mar 14, 2002
Authored by Jove

UCD-snmp v4.2.1 and below remote root exploit for the long community string overflow on Linux/x86. Tested against Slackware 8.0, includes instructions for finding more offsets. Binds a shell to tcp port 10000.

tags | exploit, remote, overflow, shell, x86, root, tcp
systems | linux, slackware
SHA-256 | eb4a50c9c0dd410d730f1d07d223ab85c80cc864aeca71b53ef5631777dff41f
netbsd.2002-004.openbsd
Posted Mar 14, 2002
Site netbsd.org

NetBSD Security Advisory 2002-004 - An off by one overflow has been discovered in the channel code of OpenSSH versions 2.0 - 3.0.2 can be used to execute code on systems running vulnerable OpenSSH clients and servers. NetBSD fixed this vulnerability in versions 1.5 - 1.5.2 and announced that the fix will be included in NetBSD 1.5.3.

tags | overflow
systems | netbsd
SHA-256 | 35d64679ad8b60205c3868196bf86fd85e46f45ac237b9994146c212404c430f
netbsd.2002-002.gzip
Posted Mar 14, 2002
Site netbsd.org

NetBSD Security Advisory 2002-002 - A buffer overflow found in Gzip can under certain conditions be used to execute shellcode with elevated privileges, for example through certain FTP servers. NetBSD fixed this vulnerability for CURRENT, 1.5 - 1.5.2 and 1.4 - 1.4.3.

tags | overflow, shellcode
systems | netbsd
SHA-256 | 0711d864488b65c071d0b4fba53663aada9d306b2d2e0f03d43b2c5e7db33503
phpnukeEKO.txt
Posted Mar 14, 2002
Authored by Patryk K. | Site nyshock.hypermart.net

PHP Nuke 5.X path disclosure vulnerability through modules.php.

tags | exploit, php
SHA-256 | 449ce4c727ea19f1f0a054b166eb8e1f6d5390c8d988b1c57504ebfc6d2c717a
openssh-3.0.2p1rk.tgz
Posted Mar 14, 2002
Authored by TheFinn | Site circuit4.net

OpenSSH v3.0.2p1 backdoor. The version displayed and magic password is editable.

tags | tool, rootkit
systems | unix
SHA-256 | 0261baf78b29d58daa6f9ebc47e470ec7ad0274dd81dfac55ee5236c9bad1ba8
steghide-0.4.5.tar.gz
Posted Mar 14, 2002
Site steghide.sourceforge.net

Steghide is steganography program which hides bits of a data file in some of the least significant bits of another file in such a way that the existence of the data file is not visible and cannot be proven. Steghide is designed to be portable and configurable and features hiding data in bmp, wav and au files, blowfish encryption, MD5 hashing of passphrases to blowfish keys, and pseudo-random distribution of hidden bits in the container data. It is able to embed data in BMP, WAV, and AU files.

Changes: The package has been internationalized. French and German translations have been added.
tags | encryption, steganography
SHA-256 | 04b1b8dc075d3506a28add758eaf34d83c76ee20d61776afd2582e7a5d347f71
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close