exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 41 RSS Feed

Files from Nine:Situations:Group

First Active2008-05-28
Last Active2010-12-31
Computer Associates ARCserve D2D r15 Web Service Code Execution
Posted Dec 31, 2010
Authored by Nine:Situations:Group | Site retrogod.altervista.org

Computer Associates ARCserve D2D r15 Web Service Apache Axis2 world-accessible servlet code execution vulnerability proof of concept exploit.

tags | exploit, web, code execution, proof of concept
SHA-256 | 9d0586e0c75ea154f8652912c58f4f946928e474cb239b0b08baebf63d06c2f3
EPSON Status Monitor 3 Privilege Escalation
Posted Jul 30, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

EPSON Status Monitor 3 suffers from a local privilege escalation vulnerability.

tags | exploit, local
SHA-256 | bdd59a07432408d0d4b87e1fa1270c97e9c24ead8095fa5897699959c52a76b1
Adobe Privilege Escalation
Posted Jul 20, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

Adobe related service suffers from a privilege escalation vulnerability due to improper permissions.

tags | exploit
SHA-256 | da9bb4ee3eabf0b74cbc1c0859895471d878edbd11d6da4c968ad411dc2a9097
PeaZIP 2.6.1 Command Injection
Posted Jun 5, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

PeaZIP versions 2.6.1 and below compressed filename command injection proof of concept exploit.

tags | exploit, proof of concept
SHA-256 | 7a1031d528d4e736b853742268e21241be84465070b23c6c7e45071ee9944dcd
ICQ 6.5 File Processing
Posted May 30, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

ICQ 6.5 URL Search Hook / ICQToolBar.dll .URL file processing Windows Explorer remote buffer overflow proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
systems | windows
SHA-256 | 7db4ef3b45e02ee4e93761483eb3e15822ea237e62bf8f3e0332ef68373ae5f0
Dokuwiki 2009-02-14 File Inclusion
Posted May 27, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

Dokuwiki version 2009-02-14 suffers from a remote temporary file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 325797fcaa798d398eff7aace204be01243d3c306797a3ab4010456a4fc404fb
COWON America jetCast 2.0.4.1109 Overflow
Posted May 27, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

COWON America jetCast version 2.0.4.1109 local overflow exploit that creates a malicious .mp3 file.

tags | exploit, overflow, local
SHA-256 | 3b7b819b6aeac7328ca7c5e500ba8227f30b5bb7f059dd591326b42c209d55b2
Pinnacle Studio 12 Directory Traversal
Posted May 13, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

Pinnacle Studio 12 "Hollywood FX Compressed Archive" (.hfz) directory traversal proof of concept exploit.

tags | exploit, proof of concept, file inclusion
SHA-256 | 140e18b7f263c208877fbd4b9e099be7be793ab75d118fc919ff39ed4291ab12
Bitweaver 2.6 Code Execution
Posted May 13, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

Bitweaver versions 2.6 and below /boards/boards_rss.php / saveFeed() remote code execution exploit.

tags | exploit, remote, php, code execution
SHA-256 | c6e6458bc379630566edb13719dab179c4f4e4f7429501040bdeea0557510f62
Symantec WinFax Pro 10.03 Buffer Overflow
Posted Apr 29, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

Symantec Fax Viewer Control in WinFax Pro version 10.03 (DCCFAXVW.DLL) remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 2aed8b7e6e6ce96375af28dd2e4580c2567f748fbb45706ec2ce25127c08a6f9
Zoom Player Pro 3.30 Buffer Overflow
Posted Apr 28, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

Zoom Player Pro version 3.30 buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow
SHA-256 | a5c7a28ce0db08ccec2de12b144fae199b979e23302efae721abf993654b85c0
Icewarp Merak Mail Server 9.4.1 Overflow
Posted Apr 24, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

Icewarp Merak Mail Server version 9.4.1 Base65FileEncode() buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | 59dae0c32108366fa1a61fb75f0fadb241ad621ce1c71c06297158373bccd1d7
Geeklog 1.5.2 SQL Injection
Posted Apr 16, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

Geeklog versions 1.5.2 and below savepreferences()/*blocks[] remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 01f186f7d9475a21bd6726d4df16f0d0bb6421ab3a8a03f626b9833f14455435
ftpdmin 0.96 Buffer Overflow
Posted Apr 14, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

ftpdmin version 0.96 RNFR remote buffer overflow exploit for XP SP3.

tags | exploit, remote, overflow
SHA-256 | 14f9582635a04a183b0c1e61df98e2ba135bc5eb659e5c49b2daa8a46af6e98c
Geeklog 1.5.2 SQL Injection
Posted Apr 9, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

Geeklog versions 1.5.2 and below SEC_authenticate() remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 9289d8cb946255c3e09f10474f3767b6c11d5d133f66a2107765e2d20994e7ef
glFusion 1.1.2 SQL Injection
Posted Apr 3, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

glFusion versions 1.1.2 and below COM_applyFilter()/cookies blind SQL injection exploit.

tags | exploit, sql injection
SHA-256 | 76c3a33c1103cadd63c4f1742f22cdb230b4876086835a15891e8dba8cd5ccda
glFusion 1.1.2 SQL Injection
Posted Mar 30, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

glFusion versions 1.1.2 and below COM_applyFilter()/order SQL injection exploit.

tags | exploit, sql injection
SHA-256 | 0d052959a67255c2e45321b7cf1bd2b09df0473ac3c5ee52fd046ce1cf9e3042
PHPizabi 0.848b Privilege Escalation
Posted Mar 25, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

PHPizabi version 0.848b C1 HFP1 proc.inc.php remote privilege escalation exploit that uses SQL injection.

tags | exploit, remote, php, sql injection
SHA-256 | f19fa58eccb848bc5470bef28dbbf0086ee2285a4e51e3d5c796b1c703fb0ef2
BS.Player 2.34 .bsl Buffer Overflow
Posted Mar 23, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

BS.Player versions 2.34 Build 980 and below local buffer overflow exploit that creates a malicious .bsl file.

tags | exploit, overflow, local
SHA-256 | bbd96e9f073356e0b12a5ecfeb3103c430963df93c0bb8111141d6519e1b5a78
CDex 1.70b2 Buffer Overflow
Posted Mar 19, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

CDex version 1.70b2 local buffer overflow exploit that creates a malicious .ogg file. Written for Windows XP SP3.

tags | exploit, overflow, local
systems | windows
SHA-256 | 6d0c8e995537a042fda7cdf197ba95b487e7911b7642726ab07e6fac1a6597bf
PPLive 1.9.21 Argument Injection
Posted Mar 16, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

PPLive versions 1.9.21 and below suffer from a URI handler argument injection vulnerability.

tags | exploit
SHA-256 | 6b519876a5ddbbf84a7a7e31fbfb4c67cf6f9a2868b6168a7fd4a8c09fb223fa
GeoVision LiveAudio Memory Access
Posted Mar 13, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

GeoVision LiveAudio GetAudioPlayingTime() Active-X control remote freed-memory access exploit.

tags | exploit, remote, activex
SHA-256 | 1e56e0f385f0433ae8f52b18f89640bc0e9625d7e3a85748f3bd7e80ab96fb8c
SupportSoft DNA Editor Module Code Execution
Posted Mar 5, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

SupportSoft DNA Editor module code execution exploit that leverages dnaedit.dll.

tags | exploit, code execution
SHA-256 | b4f171a5e1092d8dd52b815a5ccb43eebcf3330cbda106d95b211bbf4af57c9b
Sopcast SopCore Control Command Execution
Posted Mar 3, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

Sopcast SopCore Control SetExternalPlayer() user assisted command execution exploit that leverages sopocx.ocx version 3.0.3.501.

tags | exploit
SHA-256 | c8ad28db3188f7a8c3d2dc7d08602bb8f80dfcb9040c262bf8287c712a696860
Sopcast Sopcore Active-X Code Execution
Posted Feb 26, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

Sopcast SopCore Control Active-X SetExternalPlayer() code execution proof of concept exploit that leverages sopocx.ocx version 3.0.3.501.

tags | exploit, code execution, activex, proof of concept
SHA-256 | 5fa2489d39dd257067a34cb4a4c40c6ecee84847500eac51b5077ce71cb1fbe3
Page 1 of 2
Back12Next

File Archive:

November 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    16 Files
  • 2
    Nov 2nd
    17 Files
  • 3
    Nov 3rd
    17 Files
  • 4
    Nov 4th
    11 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    3 Files
  • 8
    Nov 8th
    59 Files
  • 9
    Nov 9th
    12 Files
  • 10
    Nov 10th
    6 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    1 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    9 Files
  • 15
    Nov 15th
    33 Files
  • 16
    Nov 16th
    53 Files
  • 17
    Nov 17th
    11 Files
  • 18
    Nov 18th
    14 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    26 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    10 Files
  • 24
    Nov 24th
    9 Files
  • 25
    Nov 25th
    11 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    20 Files
  • 29
    Nov 29th
    9 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close