what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Chopsui-cide

First Active2000-03-04
Last Active2000-06-21
argo1002.pl
Posted Jun 21, 2000
Authored by Chopsui-cide | Site midgets.box.sk

This will cause Argosoft Mail Server 1.0.0.2 to page fault if the finger daemon is running.

tags | exploit
SHA-256 | e01d95a6d4d2b309e2c61d3c09e2f8620c89e655c56fb4ad2cdf23408434bf3f
imesh102.pl
Posted Jun 21, 2000
Authored by Chopsui-cide | Site midgets.box.sk

A buffer overflow exists in iMesh 1.02 that allows the execution of arbitrary code. When the iMesh client connects to a server, the server is able to exploit the vulnerability and execute arbitrary code on the system the client is running on.

tags | exploit, overflow, arbitrary
SHA-256 | e17197918b7dfd84c2c0a16f3423027c7159f2121709d674836753908335652a
sftp02b.c
Posted Apr 28, 2000
Authored by Chopsui-cide | Site midgets.box.sk

Smart FTP v0.2 Beta denial of service.

tags | exploit, denial of service
SHA-256 | 7e53b450c8cd258654a90a3b865dcd89ba6cc7dc9badc0a0181198ea984c848f
cgimail.txt
Posted Apr 20, 2000
Authored by Chopsui-cide

Anyone who can execute CGIMailer (anyone who can use the forms that use CGIMailer) can specify what configuration file to use and this can be any file on the system CGIMailer is running on. This allows for the existance of private files to be detected. There are more dangerous implications though: this vulnerability could possibly be exploited to obtain private files from the target system. If there is an FTP server running on the target system on which an attacker has upload priviledges, he/she could upload a malicious configuration file, and then run it using CGIMailer. Configuration files can be used to send files to the attacker via e-mail (among other things).

tags | exploit
SHA-256 | 93e43f717e47063b7aa4ac1264f4e1f4436a2587838dfecd4a1ffd48d2008703
mailform.txt
Posted Apr 7, 2000
Authored by Chopsui-cide | Site midgets.box.sk

MailForm v1.91 for Windows 95 and NT 4.0 allows potentially dangerous parameters to be specified by anyone who can execute it. The web interface allows remote users to execute arbitrary commands. Exploit code included.

tags | exploit, remote, web, arbitrary
systems | windows
SHA-256 | ec1657d7a461dfc355e9839059244543b53c114292ec4f73a2596f3a0c87c20c
sps3.c
Posted Mar 4, 2000
Authored by Chopsui-cide | Site midgets.box.sk

sps3.c - Spaghetti Proxy Server 3.0 DoS attack. It does not appear as though arbitrary code could be execute using this vulnerability.

tags | exploit, arbitrary
SHA-256 | 680f512523df1c01ddcba29dfb4caf73bb78cf523c949bcc773afb2b6dfa4066
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close