what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2002-06-20

ani_ii_assignments.htm
Posted Jun 20, 2002
Site nanpa.com

Number Resource Information: ANI II Digit Assignments. This is a breakdown of what the code after your phone number means when you call an ANI2 number such as 101-073-217-709-889-664.

tags | paper
SHA-256 | 3cd8c0b6bd68e5944d8b6b91421c9055e97de63c2a78ba45754359c7f115b80e
httptype-1.2.3.tar.gz
Posted Jun 20, 2002
Site staff.ncst.ernet.in

Httptype is a program that returns the http host software of a website. It is written in Perl.

Changes: New stable version.
tags | web, perl
SHA-256 | 81ef8494eee7dbdd9498c1667188dd13b32279d91685256a3833d86200ff133c
FreeBSD-SN-02:04.apache
Posted Jun 20, 2002
Site freebsd.org

FreeBSD Security Notice FreeBSD-SN-02:04 - FreeBSD ports of apache 1.3.24 and below contain a remote vulnerability. Also affects apache+ssl, mod_ssl, and apache 2.x below 2.0.39. Vulnerability number CVE-2002-0392. The following software included with FreeBSD contains security vulnerabilities if it is older than: Bind9 v9.2.1, courier-imap-1.4.3_1, ethereal-0.9.4, fakebo-0.4.1_1, fragroute-1.2_1, ghostscript-6.53, icmpmonitor-1.11_1, imap-uw (all versions), mnews (all versions), nn-6.6.2_1, sharity-light-1.2_1, slurp-1.10_1, and xchat-1.8.9.

tags | remote, vulnerability, imap
systems | freebsd
SHA-256 | 190de2f8e77f94c2146ebab36857701379d3cdb57d6662945eb03a7ba2a9ec3d
apache-scalp.c
Posted Jun 20, 2002
Authored by Gobbles Security | Site bugtraq.org

Openbsd/x86 Apache remote exploit for the chunking vulnerability. Spawns a shell. Tested on OpenBSD 3.0 and 3.1 running Apache v1.3.20, 1.3.22, 1.3.23, and 1.3.24. Brute force mode can exploit other versions without targets, including some OpenBSD 2.8 versions.

tags | exploit, remote, shell, x86
systems | openbsd
SHA-256 | 27015d30e73adc35e03cd319117cbd02bd4650cb0af6169cf8ce03433990dc20
apachefun.tar.gz
Posted Jun 20, 2002
Authored by Dave Aitel | Site immunitysec.com

Apachefun is Spike script which exploits the new apache chunked data vulnerability. Tested on Apache-AdvancedExtranetServer/1.3.23. Causes a segmentation fault.

tags | exploit
SHA-256 | 9ed9fcf633dfcf3b3a1be428ab70c47b438e1a4d1d7914f38023343154914d01
cisco-vpn-client.txt
Posted Jun 20, 2002
Site cisco.com

Cisco Security Advisory - A buffer overflow in the Cisco VPN Clients for Linux, Solaris, and Mac OS X platforms can be exploited locally to gain local root access. This is fixed in v3.5.2.

tags | overflow, local, root
systems | cisco, linux, solaris, apple, osx
SHA-256 | ef73a328b8f9b09032f81940611868f3dd493833dfba7deb4c0654cc3058b521
angrypacket-cisco-vpnclient.txt
Posted Jun 20, 2002
Site sec.angrypacket.com

AngryPacket Security Advisory - A vulnerability found in the Cisco VPN client for Linux can allow local users to gain root level privileges. This vulnerability affects VPN client v3.5.1 and below.

tags | local, root
systems | cisco, linux
SHA-256 | 3f0616261733901823c963b777907ca611ed3bca722aab3941413458f07acfc2
vpnKILLient.c
Posted Jun 20, 2002
Site sec.angrypacket.com

Cisco VPN client v3.5.1rel-k9 (Linux version) buffer overflow exploit which spawns a root shell.

tags | exploit, overflow, shell, root
systems | cisco, linux
SHA-256 | 633f9a2103f78fbe980489511980039e5e2dc812f61513bd2d269345191b799a
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close