exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2002-06-19

apache-chunked.txt
Posted Jun 19, 2002
Authored by Mark Litchfield, Apache developers | Site httpd.apache.org

Apache Advisory - A vulnerability found in the chucked encoding implementation of the Apache 1.3.24 and 2.0.36 and below servers can under some conditions be used to remotely execute code on systems running this software.

advisories | CVE-2002-0392
SHA-256 | 3576dbeaf81b78b50b61214cbe4d286dbbfd04b6af6a433d492bc3bd471c2dfc
apache-chunked-xforce.txt
Posted Jun 19, 2002
Authored by ISS | Site iss.net

ISS reported a vulnerability found in the chucked encoding implementation of the Apache 1.3.24 and 2.0.36 and below servers that under some conditions can be used to remotely execute code on systems running this software. Note that the by ISS supplied patch, which is included in this advisory, does not fix this vulnerability.

advisories | CVE-2002-0392
SHA-256 | eda6ad9d37711b41b271339dd3102eebcf86b868e4acbe53efdd0b47ba875df1
tracesex.pl
Posted Jun 19, 2002
Authored by Stringz | Site snosoft.com

TrACESroute v6.0 gold local format string exploit exploit. Tested on Red Hat Linux release 7.2 (Enigma).

tags | exploit, local
systems | linux, redhat
SHA-256 | 14d19acb3a570221091bebb1f7f37f1e180242840c6fa9b621ec65b29374a9ed
icx2.c
Posted Jun 19, 2002
Authored by Bab Boon

Icecast v1.3.11 and below remote root exploit for linux/x86. Binds a shell to port 30464. Tested against SuSE 7.2, Debian 2.2r2, and Slackware 8.0.

Changes: Fixes some issues with the child friendliness of the original exploit.
tags | exploit, remote, shell, x86, root
systems | linux, suse, slackware, debian
SHA-256 | 766b53ac8f37a9dae4525d7da3fbb07b12711f55801b3625d281dc809594f972
Wellenreiter-v14.tar.gz
Posted Jun 19, 2002
Authored by Team Remote-exploit.org | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. It has an embedded statistics engine for the common parameters provided by wireless drivers, enabling you to view details about the consistency and signal strength of the network. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. Records the network location with GPS support. The unique essid-brute forcer helps to get the essid of low-traffic networks. Wellenreiter works on handhelds that can run GTK/Perl and Linux/BSD (such as iPaqs). All the major wireless cards are supported. Random MAC switching when joining a wireless network hides your real MAC to the access point, a unique feature.

Changes: GPS support has been added. Uncovers non-broadcasting networks by just waiting until a probe response passes the network (someone joins the network) or brute-forcing the ess! Full changelog available here.
tags | tool, perl, wireless
systems | linux, bsd
SHA-256 | a725e7f5891752efed8a64832a6a73b96ab9984333e66a484ac4e0b3987d8cc8
apache_1.3.26.tar.gz
Posted Jun 19, 2002
Site apache.org

Apache is the most popular webserver on the Internet, quite possibly the best in terms of security, functionality, efficiency, and speed. Changelog available here.

Changes: Fixed a remotely exploitable security vulnerability in chunked encoding.
systems | unix
advisories | CVE-2002-0392
SHA-256 | 5f2d4a7c51fa8824cf1f95fbecbc07656d4da08eb4757f885239745a762ccc70
CA-2002-17.apache
Posted Jun 19, 2002
Site cert.org

CERT Advisory CA-2002-17 - Apache v1.3.24 and 2.0.36 and below contains a remotely exploitable vulnerability in chunk encoded data support that is present by default. Remote code execution is possible on some platforms, denial of service attacks are possible against others. Fix available here.

tags | remote, denial of service, code execution
SHA-256 | 035e534f43dbafda96dff7b5b279ff95900947a1373bd9503afdd764aba7c3cd
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close