what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 22 of 22 RSS Feed

Files from Adam Zabrocki

Email addresspi3ki31ny at wp.pl
First Active2003-08-11
Last Active2013-03-10
LCG Disk Pool Manager SQL Injection
Posted Mar 10, 2013
Authored by Adam Zabrocki

LCG Disk Pool Manager (DPM) suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | c09db0699a877aaa44c50f0e0b466403ccf2000c38640bf54a52c32b5d1f0385
Lighttpd 1.4.30 / 1.5 Denial Of Service
Posted Dec 26, 2011
Authored by Adam Zabrocki

Lighttpd versions before 1.4.30 and 1.5 before SVN revision 2806 out-of-bounds read segmentation fault denial of service exploit.

tags | exploit, denial of service
advisories | CVE-2011-4362
SHA-256 | a78ebddef1ff446f752bc857193d5fc6a7bb8cdaa8a66f37a2fd64a80504bfe7
OpenSSH Resource Exhaustion Via GSSAPI
Posted Aug 2, 2011
Authored by Adam Zabrocki

OpenSSH with gssapi-with-mic support suffers from a resource exhaustion vulnerability. It is possible to provide any value to the xmalloc() function, which is a simple wrapper to the malloc() function. This forces an application to allocate a huge amount of the memory (4GB?) and naturally exhausts available resources. Repeating this attack, by simply open many session, can kill the server.

tags | advisory
SHA-256 | 65e738aed80888821cfc7b7291b21f403013fd57e28e24c9a17233bbb9662c26
Torque Server Buffer Overflow
Posted Jul 14, 2011
Authored by Adam Zabrocki, Bartlomiej Balcerek, Maciej Kotowicz

Torque Server versions prior to 2.4.1.4 and 3.0.[0,1] suffer from a buffer overflow vulnerability.

tags | advisory, overflow
advisories | CVE-2011-2193
SHA-256 | d42dea2627d928ed2511106108e44d93bc90572f0feebc4a43a5e9fbfbcc8c7b
FreeBSD 8.0 ftpd Off-By-One Proof Of Concept
Posted May 28, 2010
Authored by Adam Zabrocki, Maksymilian Arciemowicz

FreeBSD version 8.0 ftpd off-by-one proof of concept exploit.

tags | exploit, proof of concept
systems | freebsd
advisories | CVE-2010-1938
SHA-256 | a17d270d62782bdb0279584ea2dad8c8fe353c35767657f09ffda201da15d4f5
Mod_proxy From Apache 1.3 Integer Overflow
Posted Jan 27, 2010
Authored by Adam Zabrocki

Mod_proxy from Apache 1.3 suffers from an integer overflow. Full details and proof of concept provided.

tags | exploit, overflow, proof of concept
SHA-256 | 11dd93d3866b4c509284c60e2c79acc4279efc7fb07033aa2aaf0688759ed0f2
Xpdf Integer Overflow
Posted Oct 17, 2009
Authored by Adam Zabrocki

Xpdf allows local and remote attackers to overflow a buffer on the heap via an integer overflow vulnerability. Xpdf is prone to a NULL pointer dereference attack. Proof of concept pdf included.

tags | exploit, remote, overflow, local, proof of concept
SHA-256 | f018780c48e64bea6962cec1802929ee779c256f795667d18cd48ba561b20f2e
mtr-overflow.txt
Posted May 20, 2008
Authored by Adam Zabrocki

Mtr suffers from a local and remote stack overflow vulnerability.

tags | advisory, remote, overflow, local
SHA-256 | b5aaeddc9d0203578469fd018747dc56aa4cb6f38fd0d0cff0a0cf01e4b890b2
IRIX-p_sh-asm.c
Posted Jun 14, 2007
Authored by Adam Zabrocki

IRIX MIPS processor shellcode. Tested on R12000 process with system IRIX64 6.5.26m.

tags | shellcode
systems | irix
SHA-256 | a44477ca1f8cd02261ab5c90a11b65a2d02cc650a4771be9db30638bfc80f798
Samotny_pi3.c
Posted Jun 6, 2007
Authored by Adam Zabrocki | Site pi3.int.pl

Port scanner that can perform SYN, FIN, NULL, and XMAS scans with options to perform them very slowly and in decoy mode.

tags | tool, scanner
systems | unix
SHA-256 | 2bcf0d84a7c42318177d48b119992c9c9bd61b342e62e2177213a4f763875e11
fcron.txt
Posted Feb 2, 2006
Authored by Adam Zabrocki

Fcron (convert-fcrontab) allow users to corruption on heap section.

tags | advisory
SHA-256 | 307ba9a0f7b0232313ae1444b91ef1bddb17413092dccb371e43e011fc3bd6c5
gnats.txt
Posted Jul 7, 2005
Authored by Adam Zabrocki | Site pi3.int.pl

GNATS, the GNU problem report management system, allows attackers to overwrite any files when installed setuid root. Versions 4.1.0 and 4.0 are confirmed vulnerable.

tags | exploit, root
SHA-256 | 4031dc7bd80756c01de19fbd5c5b10ed61647fcf3d7a8d671efe64383ea17a13
p_wu.c
Posted Mar 3, 2005
Authored by Adam Zabrocki | Site pi3.int.pl

Exploit for wu-ftpd that makes use of the globbing denial of service flaw.

tags | exploit, denial of service
SHA-256 | 77b446fb929c57c3b6eb8452ee7f7f4034c86535094cd0eb6f01b548f2c92aea
iDEFENSE Security Advisory 2005-02-25.t
Posted Feb 28, 2005
Authored by iDefense Labs, Adam Zabrocki | Site idefense.com

iDEFENSE Security Advisory 02.25.05 - Remote exploitation of an input validation vulnerability in version 2.6.2 of WU-FPTD could allow for a denial of service of the system by resource exhaustion.

tags | advisory, remote, denial of service
advisories | CVE-2005-0256
SHA-256 | b773a75845596f1ab351ab1c13be23ca2743bbbe9b69eb4ece8d77d6739e7afb
p_exim.c
Posted Feb 6, 2005
Authored by Adam Zabrocki | Site pi3.int.pl

Remote proof of concept exploit for the buffer overflow vulnerability discovered in Exim 4.41 by iDEFENSE.

tags | exploit, remote, overflow, proof of concept
SHA-256 | 753d89e248ed9f5367270763d2d68d1468737e48ae16a35a50dcfe7aa88d72f4
atari800.txt
Posted Dec 11, 2004
Authored by Adam Zabrocki | Site pi3.int.pl

Exploit for the Atari800 atari emulator. Allows for local privilege escalation to root six different ways.

tags | exploit, local, root
SHA-256 | 760cd8cf8696f135ffda0b2089c0d717801c12d775ac0adf04bfd86a5a846d7a
p_xfree.c
Posted Apr 20, 2004
Authored by Adam Zabrocki | Site pi3.int.pl

XFree version 4.3.x local root exploit that makes use of the vulnerability that exists in the use of the CopyISOLatin1Lowered() function with the 'font_name' buffer.

tags | exploit, local, root
SHA-256 | 5f80619f3d14965d61bcf967f0b26ae2e5d1de37280e8076979c4872b7760af0
overkill.txt
Posted Feb 2, 2004
Authored by Adam Zabrocki | Site pi3.int.pl

The game 0verkill is susceptible to multiple buffer overflows. Remote exploit for the client attached.

tags | exploit, remote, overflow
SHA-256 | 7d2eb5c5920c68dd27c52a9f04b753988fd9871025110681a75d6a2a2c80d2d5
pi3.c
Posted Sep 18, 2003
Authored by Adam Zabrocki | Site pi3.int.pl

Simple shellcode that prints a URL, setuid(0), setgid(0), exec /bin/sh, and then exit(0).

tags | shellcode
SHA-256 | 26b2e829da4fc284b1722992a44397e4bd90960f25e56c8d8f43f3c680af91e7
p_kon.c
Posted Aug 11, 2003
Authored by Adam Zabrocki | Site pi3.int.pl

Local root exploit for kon version 0.3.9b-16 that makes use of a buffer overflow discovered in the -Coding switch.

tags | exploit, overflow, local, root
SHA-256 | 1586b70f358e651d05f55592aa0f4e846738771a8dd29314ac025f542afa01e6
pi3_dos.c
Posted Aug 11, 2003
Authored by Adam Zabrocki | Site pi3.int.pl

Denial of service exploit for the Pi3 web server version 2.0.2 that makes use of a malformed GET request.

tags | exploit, web, denial of service
SHA-256 | a8f85d35b6797d09c4202c3b2fb8795e1815a65b2aacffdf8e99139fd252c0cd
Page 1 of 1
Back1Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close