Apache Advisory - A vulnerability found in the chucked encoding implementation of the Apache 1.3.24 and 2.0.36 and below servers can under some conditions be used to remotely execute code on systems running this software.
3576dbeaf81b78b50b61214cbe4d286dbbfd04b6af6a433d492bc3bd471c2dfc
ISS reported a vulnerability found in the chucked encoding implementation of the Apache 1.3.24 and 2.0.36 and below servers that under some conditions can be used to remotely execute code on systems running this software. Note that the by ISS supplied patch, which is included in this advisory, does not fix this vulnerability.
eda6ad9d37711b41b271339dd3102eebcf86b868e4acbe53efdd0b47ba875df1
TrACESroute v6.0 gold local format string exploit exploit. Tested on Red Hat Linux release 7.2 (Enigma).
14d19acb3a570221091bebb1f7f37f1e180242840c6fa9b621ec65b29374a9ed
Icecast v1.3.11 and below remote root exploit for linux/x86. Binds a shell to port 30464. Tested against SuSE 7.2, Debian 2.2r2, and Slackware 8.0.
766b53ac8f37a9dae4525d7da3fbb07b12711f55801b3625d281dc809594f972
Wellenreiter is a GTK/Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. It has an embedded statistics engine for the common parameters provided by wireless drivers, enabling you to view details about the consistency and signal strength of the network. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. Records the network location with GPS support. The unique essid-brute forcer helps to get the essid of low-traffic networks. Wellenreiter works on handhelds that can run GTK/Perl and Linux/BSD (such as iPaqs). All the major wireless cards are supported. Random MAC switching when joining a wireless network hides your real MAC to the access point, a unique feature.
a725e7f5891752efed8a64832a6a73b96ab9984333e66a484ac4e0b3987d8cc8
Apache is the most popular webserver on the Internet, quite possibly the best in terms of security, functionality, efficiency, and speed. Changelog available here.
5f2d4a7c51fa8824cf1f95fbecbc07656d4da08eb4757f885239745a762ccc70
CERT Advisory CA-2002-17 - Apache v1.3.24 and 2.0.36 and below contains a remotely exploitable vulnerability in chunk encoded data support that is present by default. Remote code execution is possible on some platforms, denial of service attacks are possible against others. Fix available here.
035e534f43dbafda96dff7b5b279ff95900947a1373bd9503afdd764aba7c3cd