exploit the possibilities
Showing 1 - 5 of 5 RSS Feed

Files from Behrang Fouladi

Email addressbehrang at hat-squad.com
First Active2003-12-29
Last Active2004-11-05
000077.txt
Posted Nov 5, 2004
Authored by Behrang Fouladi | Site hat-squad.com

Hat Squad Advisory - Helm Web Hosting Control Panel is susceptible to cross site scripting and SQL injection vulnerabilities. Versions 3.1.19 and below are affected.

tags | advisory, web, vulnerability, xss, sql injection
MD5 | 78f326a40bba8360a83c0d4572bfe5d3
101_ypops.cpp
Posted Oct 13, 2004
Authored by class101, Behrang Fouladi

YahooPOPS version 1.6 and prior SMTP port buffer overflow exploit version 0.1. Binds a shell to port 101.

tags | exploit, overflow, shell
MD5 | 0d5056eaf4d9cdc2944e37a93bdd4e78
yahooPOPS.txt
Posted Oct 1, 2004
Authored by Behrang Fouladi, Nima Majidi

Remote buffer overflows in both the POP3 and SMTP services of the YahooPOPs application can allow for arbitrary code execution. Exploit included.

tags | exploit, remote, overflow, arbitrary, code execution
MD5 | f002a2cc9c2caf0a8929abe9b6f23386
hatsquad.txt
Posted May 11, 2004
Authored by Behrang Fouladi | Site hat-squad.com

Hat-Squad Advisory - A remote heap overflow has been discovered in MailEnable Professional Edition versions 1.5 to 1.7. Sending an HTTP request with more than 4045 bytes to MEHTTPS service will cause a heap buffer overflow while logging is enabled. It is possible for a remote attacker to execute code as SYSTEM.

tags | advisory, remote, web, overflow
MD5 | e8cbedf18c0432171619a7f7f9c9f925
mdaemon-raw.txt
Posted Dec 29, 2003
Authored by Pejamn Davarzani, Behrang Fouladi | Site hat-squad.com

Alt-N Technologies MDaemon Mail Server versions 6.52 to 6.85 suffer from a remote buffer overflow in its raw message handler. Sending more than 153 bytes in the From field to FROM2Raw.exe creates a raw file, that when processed by mdaemon, will cause a stack buffer overflow.

tags | exploit, remote, overflow
MD5 | 74de9bd4c75e8a57e115b87b3aff2516
Page 1 of 1
Back1Next

File Archive:

December 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    1 Files
  • 2
    Dec 2nd
    16 Files
  • 3
    Dec 3rd
    17 Files
  • 4
    Dec 4th
    23 Files
  • 5
    Dec 5th
    11 Files
  • 6
    Dec 6th
    9 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close