what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2002-03-14

apache_1.3.22+ssl_1.47.tar.gz
Posted Mar 14, 2002
Site apache-ssl.org

Apache-SSL is a set of patches for Apache to create a secure Webserver, based on SSLeay/OpenSSL. It is designed to be small, secure, and efficient.

Changes: A buffer overflow that could be exploited if client certificates are in use was fixed. More info on this bug is here.
tags | encryption
SHA-256 | dfadf144d08e8538be36b7d59b6b23856b5ca250427d66c0c7ce7f8bd8277811
apache_1.3.23.tar.gz
Posted Mar 14, 2002
Site apache.org

Apache is the most popular webserver on the Internet, quite possibly the best in terms of security, functionality, efficiency, and speed.

Changes: Fixed quite a few minor bugs. Changelog available here.
systems | unix
SHA-256 | 2b731f71284a31b28d8e553fb5f4917293c1d21e065467b39a50706466f88438
ucd-snmp.c
Posted Mar 14, 2002
Authored by Jove

UCD-snmp v4.2.1 and below remote root exploit for the long community string overflow on Linux/x86. Tested against Slackware 8.0, includes instructions for finding more offsets. Binds a shell to tcp port 10000.

tags | exploit, remote, overflow, shell, x86, root, tcp
systems | linux, slackware
SHA-256 | eb4a50c9c0dd410d730f1d07d223ab85c80cc864aeca71b53ef5631777dff41f
netbsd.2002-004.openbsd
Posted Mar 14, 2002
Site netbsd.org

NetBSD Security Advisory 2002-004 - An off by one overflow has been discovered in the channel code of OpenSSH versions 2.0 - 3.0.2 can be used to execute code on systems running vulnerable OpenSSH clients and servers. NetBSD fixed this vulnerability in versions 1.5 - 1.5.2 and announced that the fix will be included in NetBSD 1.5.3.

tags | overflow
systems | netbsd
SHA-256 | 35d64679ad8b60205c3868196bf86fd85e46f45ac237b9994146c212404c430f
netbsd.2002-002.gzip
Posted Mar 14, 2002
Site netbsd.org

NetBSD Security Advisory 2002-002 - A buffer overflow found in Gzip can under certain conditions be used to execute shellcode with elevated privileges, for example through certain FTP servers. NetBSD fixed this vulnerability for CURRENT, 1.5 - 1.5.2 and 1.4 - 1.4.3.

tags | overflow, shellcode
systems | netbsd
SHA-256 | 0711d864488b65c071d0b4fba53663aada9d306b2d2e0f03d43b2c5e7db33503
phpnukeEKO.txt
Posted Mar 14, 2002
Authored by Patryk K. | Site nyshock.hypermart.net

PHP Nuke 5.X path disclosure vulnerability through modules.php.

tags | exploit, php
SHA-256 | 449ce4c727ea19f1f0a054b166eb8e1f6d5390c8d988b1c57504ebfc6d2c717a
openssh-3.0.2p1rk.tgz
Posted Mar 14, 2002
Authored by TheFinn | Site circuit4.net

OpenSSH v3.0.2p1 backdoor. The version displayed and magic password is editable.

tags | tool, rootkit
systems | unix
SHA-256 | 0261baf78b29d58daa6f9ebc47e470ec7ad0274dd81dfac55ee5236c9bad1ba8
steghide-0.4.5.tar.gz
Posted Mar 14, 2002
Site steghide.sourceforge.net

Steghide is steganography program which hides bits of a data file in some of the least significant bits of another file in such a way that the existence of the data file is not visible and cannot be proven. Steghide is designed to be portable and configurable and features hiding data in bmp, wav and au files, blowfish encryption, MD5 hashing of passphrases to blowfish keys, and pseudo-random distribution of hidden bits in the container data. It is able to embed data in BMP, WAV, and AU files.

Changes: The package has been internationalized. French and German translations have been added.
tags | encryption, steganography
SHA-256 | 04b1b8dc075d3506a28add758eaf34d83c76ee20d61776afd2582e7a5d347f71
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    18 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    6 Files
  • 28
    May 28th
    12 Files
  • 29
    May 29th
    31 Files
  • 30
    May 30th
    22 Files
  • 31
    May 31st
    18 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close