exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2002-05-25 to 2002-05-26

fenris-0.05.tgz
Posted May 25, 2002
Authored by Michal Zalewski | Site razor.bindview.com

Fenris is a multipurpose tracer, stateful analyzer and partial decompiler intended to simplify bug tracking, security audits, code, algorithm, protocol analysis and computer forensics by providing a structural program trace, general information about internal constructions, execution path, memory operations, I/O, conditional expression info, and much more. A small demonstration how this tool works can be found here.

Changes: Interactive debugging capabilities introduced and added burneye tracing.
tags | protocol
SHA-256 | e14cf365038e3721d3bd54233921777299724de0333f64d9953c009fe8fe0887
RHSA-2002:092-11
Posted May 25, 2002
Site redhat.com

Red Hat Security Advisory RHSA-2002:092-11 - A buffer overflow vulnerability has been found in the WU-IMAP daemon prior to v2001a which can be used to remotely execute code via malformed requests if the attacker has a valid IMAP account. This affects Red Hat 6.2, 7.0, 7.1 and 7.2.

tags | overflow, imap
systems | linux, redhat
SHA-256 | 8d45247f59e45aa7710cc18e1b02e6c3ff3cbb8aaa5b104fbe33cc6357f3cdd0
CLA-2002:489
Posted May 25, 2002
Site distro.conectiva.com.br

Conectiva Security Advisory CLA-2002:489 - A cross-site scripting vulnerability found in Mailman v2.0.11 affects Conectiva Linux versions 6.0, 7.0 and 8.

tags | xss
systems | linux
SHA-256 | c312b52df2014bfc1612eda13a4fcd1f748a4c1c2e9f72655b4463a62f58ab9f
sendmail-flock-sploit.txt
Posted May 25, 2002
Authored by Zillion | Site safemode.org

Local exploit for the Sendmail 8.12.3 and below flock denial of service vulnerability.

tags | exploit, denial of service, local
SHA-256 | bbaf654cf0fc0e59bbd9e31ec8803d66b440dda134c4511d4ff41af8c42ac323
sendmail-flock-advisory.txt
Posted May 25, 2002
Authored by lumpy, Gregory Neil Shapiro | Site sendmail.org

Sendmail v8.12.3 and below contains a local denial of service vulnerability in the file locking functions. Corrected in sendmail v8.12.4.

tags | denial of service, local
SHA-256 | e64298819b62733db3180865cab4773b25d136f7d83b128e11755507d1949304
cisco-ata-186.txt
Posted May 25, 2002
Site cisco.com

Cisco Security Advisory - A vulnerability found in the web interface that comes with the Cisco ATA 186 Analog Telephone Adaptor be used to remotely disclose passwords by retrieving the router config via a specially crafted POST request.

tags | web, telephony
systems | cisco
SHA-256 | 055867c0b6b1881f66a086900cbd9d16bf99338974b67736d20018ad873f9255
cisco-cbos-dos.txt
Posted May 25, 2002
Site cisco.com

Cisco Security Advisory - Three new denial of service vulnerabilities involving large packets have been found in Cisco routers that are running the CBOS software. This affects the following Cisco devices: 605, 626, 627, 633, 673, 675, 675e, 676, 677, 677i and 678.

tags | denial of service, vulnerability
systems | cisco
SHA-256 | 90f3170e3df5235aeed1ca9f10ff1951dc46a2724378626d35c4f953ce6b98bc
Open-Net-Free-LNX-sh.c
Posted May 25, 2002
Authored by Zillion | Site safemode.org

This is Intel shellcode that does an execve of /bin/sh and works on OpenBSD, NetBSD, FreeBSD and Linux. More information can be found here.

tags | shellcode
systems | linux, netbsd, freebsd, openbsd
SHA-256 | f4c43ae66ec56a546fd302bf5e8a101723bcc899e973aec9b3341bacc7c05e60
Wellenreiter-v13.tar.gz
Posted May 25, 2002
Authored by Team Remote-exploit.org | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. It has an embedded statistics engine for the common parameters provided by wireless drivers, enabling you to view details about the consistency and signal strength of the network. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. Records the network location with GPS support. Wellenreiter works on handhelds that can run GTK/Perl and Linux/BSD (such as iPaqs). All the major wireless cards are supported. Random MAC switching when joining a wireless network hides your real MAC to the access point, a unique feature.

Changes: Bugfix - BSD port integration has broken ad-hoc detection. Added wifi0 device support (For newer cisco drivers), BSD Cisco cards now work well with the new ancontrols. Updated the config script better matching of the cisco bsd drivers. Full changelog available here.
tags | tool, perl, wireless
systems | linux, bsd
SHA-256 | e0a7d974fecd991d9ef2ec06c996d5cee7d1b9fa571bbd7a2697a303a34853a5
Page 1 of 1
Back1Next

File Archive:

September 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    23 Files
  • 2
    Sep 2nd
    12 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    0 Files
  • 5
    Sep 5th
    10 Files
  • 6
    Sep 6th
    8 Files
  • 7
    Sep 7th
    30 Files
  • 8
    Sep 8th
    14 Files
  • 9
    Sep 9th
    26 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    5 Files
  • 13
    Sep 13th
    28 Files
  • 14
    Sep 14th
    15 Files
  • 15
    Sep 15th
    17 Files
  • 16
    Sep 16th
    9 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    12 Files
  • 20
    Sep 20th
    15 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    13 Files
  • 23
    Sep 23rd
    12 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    30 Files
  • 27
    Sep 27th
    27 Files
  • 28
    Sep 28th
    8 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close