what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files from Securma Massine

Email addresssecurma at morx.org
First Active2002-10-21
Last Active2006-09-14
msn-xss-galore.txt
Posted Sep 14, 2006
Authored by Securma Massine | Site morx.org

Hotmail/MSN suffers from a slew of cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | fdce82a30bb280fb585e168012d410d3eaa28083187e2b58bd2e9c1e24b1822c
vcap.txt
Posted Sep 13, 2006
Authored by Securma Massine | Site morx.org

The vCAP Calendar server versions 1.9.0 Beta and below suffer from denial of service and directory traversal vulnerabilities.

tags | exploit, denial of service, vulnerability
SHA-256 | fcf14fec53b897407562c5f3d3d9dc7cbf943f38eb9d639ce1c7c0a039ae19f4
rev.txt
Posted Mar 9, 2006
Authored by Securma Massine | Site morx.org

Revilloc MailServer and Proxy version 1.21 remote proof of concept exploit for the USER directive heap overflow. Binds a shell to port 9191.

tags | exploit, remote, overflow, shell, proof of concept
SHA-256 | 3c9ad856259ed9d850a7e48cd14c79377eb82fa3483a9cd37f035a2880eedc5a
RevilloC-poc.pl.txt
Posted Mar 8, 2006
Authored by Securma Massine | Site morx.org

exploit for a buffer overflow in RevilloC MailServer and Proxy version 1.21.

tags | exploit, overflow
SHA-256 | afff7d031624d10424b4a5bca421788cf97be945e85d898224f42ce78fe3d265
expl5.txt
Posted Feb 4, 2006
Authored by Securma Massine | Site morx.org

Remote exploit for eXchangepop3 that makes use of a buffer overflow attack.

tags | exploit, remote, overflow
SHA-256 | fdc180d92a58df7519a77e8c23a67af73ce3279b446f4560f4e15d95204a3c26
exchangepop3.txt
Posted Feb 4, 2006
Authored by Securma Massine | Site morx.org

The eXchangepop3 email gateway is susceptible to a buffer overflow attack.

tags | advisory, overflow
SHA-256 | e821244a8edad30fc1c760e66f2d57a74970d7f9058fd15ff23c1ad026a38793
mssql.7.0.dos.c
Posted Oct 1, 2004
Authored by Securma Massine

Mssql 7.0 remote denial of service buffer overflow exploit. Affects Mssql 7.0 Service Pack sp0, sp1, sp2, and sp3. Stops the service "mssqlserver".

tags | exploit, remote, denial of service, overflow
SHA-256 | 627c67ad919f0e71cfa638456a6f9ac1fd072fe0e7cb4d772043e59853c94378
Exch.pl
Posted Apr 19, 2004
Authored by Securma Massine

Kinesphere Corporation Exchange POP3 e-mail gateway remote exploit that makes use of a buffer overflow.

tags | exploit, remote, overflow
SHA-256 | aa21d34e23c056c9250ad35d4abf58eeff4391ebca64ff0ac12966a256d74237
hyperion.2.8.11.txt
Posted Dec 24, 2002
Authored by Securma Massine

The Hyperion FTP Server v2.8.11 and below for Windows 95/98/NT/2000 contains a buffer overflow in ftpservx.dll which allows remote code execution.

tags | advisory, remote, overflow, code execution
systems | windows
SHA-256 | a852a01717f525ea2029404cc63c43275bb34de7252eca8aec2116d4637f10b7
iispop.txt
Posted Nov 17, 2002
Authored by Securma Massine

The IISPop E-Mail Server from Curtiscomp.com is vulnerable to a denial of service attack via a simple buffer overflow on the listening daemon.

tags | denial of service, overflow
SHA-256 | f1e9f711eabd7012bda2d2d99a807a06d454bfa9e37157608e2983ae2f405a47
smartmail.dos.pl
Posted Nov 1, 2002
Authored by Securma Massine

Smartmail v1.0Beta10 and 2.0 remote denial of service exploit in perl.

tags | exploit, remote, denial of service, perl
SHA-256 | b2a5a46a5a2cc9670a85bb0503ac9279cfc04afd26501261ab2b854990c32dce
pfdos.pl
Posted Oct 22, 2002
Authored by Securma Massine

PowerFTP v2.24 and below remote denial of service exploit in Perl.

tags | remote, denial of service, perl
SHA-256 | 6c35bcb40ba1d5bd9322642847860c17eb6c904541ae79689c51f4513a733837
bop.pl
Posted Oct 21, 2002
Authored by Securma Massine

PlanetDNS v1.14 remote buffer overflow exploit which sends 6K of data to port 80 of PlanetWeb.

tags | exploit, remote, overflow
SHA-256 | f9b9023362601fc0dd91c3c2596c3a5dbacc94a522db51d9b2b684122fa16bb3
Page 1 of 1
Back1Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    16 Files
  • 18
    Jun 18th
    26 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    18 Files
  • 21
    Jun 21st
    8 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close