exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2002-05-24

suse.dhcpd.txt
Posted May 24, 2002
Authored by SuSE Security, FJ Serna | Site suse.com

SuSE Linux Security Announcement SuSE-SA:2002:019 - ISC DHCPD v3.0 to 3.0.1rc8 is vulnerable to a remote root format string bug attack when reporting the result of a dns-update request. This affects SuSE distributions based upon 7.2, 7.3 and 8.0.

tags | remote, root
systems | linux, suse
SHA-256 | f689ab8829be49e2e200eda31af2d7bc7329c4feb1a4cc87cf59afb317e1112c
cisco-ip-telephone.txt
Posted May 24, 2002
Site cisco.com

Cisco Security Advisory - Multiple Vulnerabilities in Cisco IP Telephones. Bugs found in the Cisco IP Telephones can result in denial of service conditions and allow unauthorized access to the configuration settings of the Cisco IP Phone models 7910, 7940, and 7960.

tags | denial of service, telephony, vulnerability
systems | cisco
SHA-256 | dd0911b414f95a26e4d9aee568de32cb04390ea61ff26de79b9c52d60d61fa83
MDKSA-2002:033
Posted May 24, 2002
Authored by Mandrake Linux Security Team | Site mandrakesecure.net

Mandrake Security Advisory MDKSA-2002:033 - A vulnerability found in all versions of Webmin prior to v0.970 allows remote users to login to Webmin as any user. The affected Mandrake versions are 7.1, 7.2, 8.0, 8.1, 8.2, Corporate Server 1.0.1 and Single Network Firewall 7.2.

tags | remote
systems | linux, mandrake
SHA-256 | 7b53ede13b33631621686fe27cf7981287d076bdaa27520dcebdca3a089ccfac
boegADT_beta-1.0.tar.gz
Posted May 24, 2002
Authored by Gabriel Maggiotti | Site qb0x.net

BoegADT is a unix-based library which attempts to make it easy to write buffer overflow exploits. Uses the GNU debugger and perl. Tested on RedHat, Slackware, and Solaris.

tags | overflow, perl, library
systems | linux, redhat, unix, solaris, slackware
SHA-256 | 73dd16b8129243a412998c7e54f1bc2f3f7d4c0044c82b44ac7c1247483b5af1
lcrzoex-4.10-src.tgz
Posted May 24, 2002
Authored by Laurent Constantin | Site laurentconstantin.com

Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex. Windows binaries available here.

Changes: Bugs and memory leaks fixed.
tags | udp, spoof, tcp, protocol, library
systems | linux, windows, solaris, freebsd
SHA-256 | a384a45ce71daec1fdd7e64ad261d5f740002055695451abe6d04c6f9a2e334d
servletexec-4.1.txt
Posted May 24, 2002
Authored by Matt Moore | Site westpoint.ltd.uk

NewAtlanta ServletExec ISAPI v4.1 contains three vulnerabilities. Remote users can read any file in the webroot, crash the server, and display the physical path of the web root. Patch available here.

tags | exploit, remote, web, root, vulnerability
SHA-256 | fc28cc03d24fa98eb266f32deaf3daa32abc63bfc958831609ba5849b34c2d4a
raccess-0.7.tar.gz
Posted May 24, 2002
Authored by Angel Ramos | Site salix.org

"Remote Access Session" is a security tool to analyze the integrity of systems. The program tries to gain access to a system using the most advanced techniques of remote intrusion. It can either work in normal mode (which is fast) or hard mode (which is more intensive). There is a big difference between "Remote Access Session" and other remote security audit tools as "Nessus" or "Internet Scanner" - If "Remote Access Session" finds a remote vulnerability that gives a user account or root, it will try to exploit it and it will return a shell. In my honest opinion, this is the only way to discard false positives of remote vulnerabilities, and the only way to demonstrate that the danger is real to upper management. "Remote Access Session" is not a hacker tool. It has been designed for system administrators and security engineers, and does not attempt any kind of stealth.

Changes: Ported to BSD and Solaris, added network scanning mode, improved performance, and ported some of the exploits.
tags | tool, remote, shell, root, scanner, vulnerability
systems | unix
SHA-256 | df48138333e674aea7b76f00ca67fccae74af9972ddd421c1c959ea2aaa34a50
neatdocs.tgz
Posted May 24, 2002
Authored by Mixter | Site 1337.tsx.org

NEAT is a script language driven exploit/vulnerability management tool that does active penetration testing. This is a pre-release with documentation and code snippets. NEAT is similar to raccess but is more sophisticated.

SHA-256 | 3504b18ed44995a578ca6d94d649f0788ec9ab3b7e95519729b758e51dae3931
Next Generation Security Advisory 2002.3
Posted May 24, 2002
Authored by FJ Serna, NGSSoftware | Site ngsec.com

Next Generation Advisory NGSEC-2002-3 - Sun Solaris in.talkd is vulnerable to a remote root format string bug. An attacker can request a talk session with a especially crafted user field able to write memory and gain control of the flow of the in.talkd.

tags | remote, root
systems | solaris
SHA-256 | 7fa8d1d538e9e06e7e46c09cb39e2c8630bd909c9fbb9f637606a8b0e9b96d44
Wellenreiter-v12.tar.gz
Posted May 24, 2002
Authored by Max Moser | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. It has an embedded statistics engine for the common parameters provided by wireless drivers, enabling you to view details about the consistency and signal strength of the network. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. Records the network location with GPS support. Wellenreiter works on handhelds that can run GTK/Perl and Linux/BSD (such as iPaqs). All the major wireless cards are supported. Random MAC switching when joining a wireless network hides your real MAC to the access point, a unique feature.

Changes: Added a "Wellenreiter on ipaq howto", added an export menu item to save scans as a gpsdrive waypoints file, comma delimited text file, or netstumbler format, added the possibility to force the scannerwindow to stay on one channel, and much more. Full changelog available here.
tags | tool, perl, wireless
systems | linux, bsd
SHA-256 | c516ea342b2470327fe3ac93c60d52d7e904708f1d0b9311e7cf6162147c1290
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close