exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files from Securma Massine

Email addresssecurma at morx.org
First Active2002-10-21
Last Active2006-09-14
msn-xss-galore.txt
Posted Sep 14, 2006
Authored by Securma Massine | Site morx.org

Hotmail/MSN suffers from a slew of cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | fdce82a30bb280fb585e168012d410d3eaa28083187e2b58bd2e9c1e24b1822c
vcap.txt
Posted Sep 13, 2006
Authored by Securma Massine | Site morx.org

The vCAP Calendar server versions 1.9.0 Beta and below suffer from denial of service and directory traversal vulnerabilities.

tags | exploit, denial of service, vulnerability
SHA-256 | fcf14fec53b897407562c5f3d3d9dc7cbf943f38eb9d639ce1c7c0a039ae19f4
rev.txt
Posted Mar 9, 2006
Authored by Securma Massine | Site morx.org

Revilloc MailServer and Proxy version 1.21 remote proof of concept exploit for the USER directive heap overflow. Binds a shell to port 9191.

tags | exploit, remote, overflow, shell, proof of concept
SHA-256 | 3c9ad856259ed9d850a7e48cd14c79377eb82fa3483a9cd37f035a2880eedc5a
RevilloC-poc.pl.txt
Posted Mar 8, 2006
Authored by Securma Massine | Site morx.org

exploit for a buffer overflow in RevilloC MailServer and Proxy version 1.21.

tags | exploit, overflow
SHA-256 | afff7d031624d10424b4a5bca421788cf97be945e85d898224f42ce78fe3d265
expl5.txt
Posted Feb 4, 2006
Authored by Securma Massine | Site morx.org

Remote exploit for eXchangepop3 that makes use of a buffer overflow attack.

tags | exploit, remote, overflow
SHA-256 | fdc180d92a58df7519a77e8c23a67af73ce3279b446f4560f4e15d95204a3c26
exchangepop3.txt
Posted Feb 4, 2006
Authored by Securma Massine | Site morx.org

The eXchangepop3 email gateway is susceptible to a buffer overflow attack.

tags | advisory, overflow
SHA-256 | e821244a8edad30fc1c760e66f2d57a74970d7f9058fd15ff23c1ad026a38793
mssql.7.0.dos.c
Posted Oct 1, 2004
Authored by Securma Massine

Mssql 7.0 remote denial of service buffer overflow exploit. Affects Mssql 7.0 Service Pack sp0, sp1, sp2, and sp3. Stops the service "mssqlserver".

tags | exploit, remote, denial of service, overflow
SHA-256 | 627c67ad919f0e71cfa638456a6f9ac1fd072fe0e7cb4d772043e59853c94378
Exch.pl
Posted Apr 19, 2004
Authored by Securma Massine

Kinesphere Corporation Exchange POP3 e-mail gateway remote exploit that makes use of a buffer overflow.

tags | exploit, remote, overflow
SHA-256 | aa21d34e23c056c9250ad35d4abf58eeff4391ebca64ff0ac12966a256d74237
hyperion.2.8.11.txt
Posted Dec 24, 2002
Authored by Securma Massine

The Hyperion FTP Server v2.8.11 and below for Windows 95/98/NT/2000 contains a buffer overflow in ftpservx.dll which allows remote code execution.

tags | advisory, remote, overflow, code execution
systems | windows
SHA-256 | a852a01717f525ea2029404cc63c43275bb34de7252eca8aec2116d4637f10b7
iispop.txt
Posted Nov 17, 2002
Authored by Securma Massine

The IISPop E-Mail Server from Curtiscomp.com is vulnerable to a denial of service attack via a simple buffer overflow on the listening daemon.

tags | denial of service, overflow
SHA-256 | f1e9f711eabd7012bda2d2d99a807a06d454bfa9e37157608e2983ae2f405a47
smartmail.dos.pl
Posted Nov 1, 2002
Authored by Securma Massine

Smartmail v1.0Beta10 and 2.0 remote denial of service exploit in perl.

tags | exploit, remote, denial of service, perl
SHA-256 | b2a5a46a5a2cc9670a85bb0503ac9279cfc04afd26501261ab2b854990c32dce
pfdos.pl
Posted Oct 22, 2002
Authored by Securma Massine

PowerFTP v2.24 and below remote denial of service exploit in Perl.

tags | remote, denial of service, perl
SHA-256 | 6c35bcb40ba1d5bd9322642847860c17eb6c904541ae79689c51f4513a733837
bop.pl
Posted Oct 21, 2002
Authored by Securma Massine

PlanetDNS v1.14 remote buffer overflow exploit which sends 6K of data to port 80 of PlanetWeb.

tags | exploit, remote, overflow
SHA-256 | f9b9023362601fc0dd91c3c2596c3a5dbacc94a522db51d9b2b684122fa16bb3
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close