Coreography is an open source utility for browsing memory images on a Pentium based Linux system. It allows users to search through core dumps, ELF executables, libraries, object files, and even currently running processes. It was designed with simplicity in mind but is very versatile at the same time.
1e63b015698902272ebde05e271b34a69542d5e15d34573e080a53cc5f488286
Packet Storm new exploits for February, 2003.
56b6ce1737cf291ed367043a6093f98c942e2ffafe4f83b8be26a04711cc0ad8
IBM DB2 local root from bin exploit that makes use of the fact that /usr/IBMdb2/V7.1/lib is left world writable after a default installation.
af0f255f31a50691e25984454e0d874e5554b1017742155e36928b25e81ea632
realpath(3) lukemftpd remote exploit for FreeBSD 4.8 that makes use of the off-by-one error.
97c90d5b2ccc417562521347fcbe9c9fa3363dd44b3ea5d475b6f7b255d0c086
The D-Link 704p router with firmware version 2.70 is susceptible to multiple denial of service attacks via excessively populated URLs.
259dfe21c118eba6461f050b76150dcde4b4c110bda548460ad171c05429eaea
Local root exploit for slocate on Linux-Sparc.
4120fc3b286e38064f2f473b07a64a039c06d26733b33dc3ed74f8aa307fa14c
CERT Advisory CA-2003-20 - CERT announces that the exploitation of the RPC/DCOM vulnerability on Windows has now taken the form of a worm known as the W32/Blaster worm. This worm retrieves a binary that is then used to launch further attacks and is poised to launch a denial of service against windowsupdate.com.
d0e25a4a85c54bd50ad5e142ccb2f76e9828730a435bc2804f3ba2ff79e33d2a
Half-Life client version 1.1.1.0 and below remote exploit that binds a cmd.exe on port 61200.
3f14ae28b795a3f58ee2ba95559f9d3f1d23e8d1fa3c96ba0a630644c8a96623
SADoor is a non-listening remote administration tool for Unix systems. It sets up a listener in non-promiscuous mode for a specific sequence of packets arriving to the interface before allowing command mode. The commands are sent Blowfish encoded in the TCP payload and decoded and passed on to system(3). First non-beta release.
ffc45768392cf09fe2900f34b446cd2d7cea37006a4380209f4b224ae58e4b13
VBulletin version 3.0 Beta 2 is susceptible to a cross site scripting vulnerability in its new member page (register.php).
82b507f123b10ff88ea31cb0f462ee386a7460f3528905be6623a60bcc1ae7b8
Xprobe2 is a fuzzy remote OS fingerprinting tool with functionality that is heavily based on Xprobe, but also uses other OS fingerprinting techniques.
39ae8f922b7ad534dc831806dfe878af00f52f8ad85783f7631269f2cfe573b5
Information regarding one variant of the Microsoft Windows DCOM worm that is circulating around the Internet.
59735ded0ae61947b297bce4cc8893aacbe08a99ba65ee013fdc60b7b6f1617c