exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 84 of 84 RSS Feed

Files Date: 2009-11-18 to 2009-11-19

XM Easy Personal FTP Server 5.8.0 APPE / DELE Denial Of Service
Posted Nov 18, 2009
Authored by zhangmc

XM Easy Personal FTP Server version 5.8.0 remote denial of service exploit that makes use of APPE and DELE.

tags | exploit, remote, denial of service
SHA-256 | 92bddfff3321a2348f936f14081552ac3b85b3594271dd1ad057eba37550e2ad
Linux unix_stream_connect() Denial Of Service
Posted Nov 18, 2009
Authored by Tomoki Sekiyama

Proof of concept code that demonstrates the denial of service vulnerability in the Linux kernel unix_stream_connect() function.

tags | exploit, denial of service, kernel, proof of concept
systems | linux
SHA-256 | b2346c5121005fe334d9fce476edda6043810b304af209d2dad200c7d1b7764a
Thunderbird / Seamonkey Denial Of Service
Posted Nov 18, 2009
Authored by Marcin Ressel

Mozilla Thunderbird version 2.0.0.23 and Seamonkey version 2.0 suffer from a null pointer dereference denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 9818409ac58b963655daac1ce56a25d83dee37dd7cbc574fc25f1b897f1935d2
JBS 2.0 Administrative Bypass / File Upload
Posted Nov 18, 2009
Authored by blackenedsecurity | Site blackenedsecurity.blogcu.com

JBS version 2.0 and JBSX suffer from administrative bypass and malicious file upload vulnerabilities.

tags | exploit, vulnerability, file upload
SHA-256 | 092c59d7727c807680a4bc50474f4a7561f0383f9205a01df20ff8dca747c3ac
Microsoft Windows EOT Font Table Directory Integer Overflow
Posted Nov 18, 2009
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits an integer overflow flaw in the Microsoft Windows Embedded OpenType font parsing code located in win32k.sys. Since the kernel itself parses embedded web fonts, it is possible to trigger a BSoD from a normal web page when viewed with Internet Explorer.

tags | exploit, web, overflow, kernel
systems | windows
advisories | CVE-2009-2514
SHA-256 | ff7cac37f0fc0381971b0be66dfede47d6023d4693a45fab58f977f64831e3b8
Microsoft Excel Memory Corruption
Posted Nov 18, 2009
Authored by Nicolas Joly | Site vupen.com

Microsoft Office Excel suffers from various heap overflow and memory corruption vulnerabilities.

tags | advisory, overflow, vulnerability
advisories | CVE-2009-3130, CVE-2009-3131, CVE-2009-3132, CVE-2009-3133
SHA-256 | 274806e33d6ff76c0300184727853d711f01ac8661624226967d7b8aa075e277
Gimp BMP Image Parsing Integer Overflow
Posted Nov 18, 2009
Authored by Stefan Cornelius | Site secunia.com

Secunia Research has discovered a vulnerability in Gimp, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused by an integer overflow error within the "ReadImage()" function in plug-ins/file-bmp/bmp-read.c. This can be exploited to cause a heap-based buffer overflow by e.g. tricking a user into opening a specially crafted BMP file. Version 2.6.7 is affected.

tags | advisory, overflow
advisories | CVE-2009-1570
SHA-256 | 85f0dc9e18157639fcbd9378b0285371a6aa9be92f500f354cfb55b30a5693ba
Windows XP Pro SP2 English Message-Box Shellcode
Posted Nov 18, 2009
Authored by Aodrulez

16 bytes small Message-Box shellcode for Windows XP Pro SP2 English.

tags | shellcode
systems | windows
SHA-256 | f046a00167a3d5df6fafed0240e15d80066760352ef619dfb8420328a41f0d07
Novell eDirectory 8.8 SP5 Denial Of Service
Posted Nov 18, 2009
Site hackattack.com

Novell eDirectory version 8.8 SP5 for Windows suffers from a denial of service vulnerability.

tags | exploit, denial of service
systems | windows
SHA-256 | b68a24d0d40fc09e83fd2fae8a79e0ef3561167e69aed97335098d210f59e9d4
Page 4 of 4
Back1234Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close